Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What information is necessary for designing a solution and must be gathered during discovery? (Choose 3)

Size of the backup create by the incumbent backup solution.

A.

Operating systems used to run the workloads.

B.

Allowed backup windows.

C.

Size of IT team.

D.

Amount of used disk space.

E.

Amount of disk space provisioned.

Full Access
Question # 5

Based on the customer Windows and Linux file server backup requirements, which component will help them meet their stated objectives?

A.

Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role.

B.

Add Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policy.

C.

Add a Windows Server, enable indexing of backups and ensure authenticated users are configured to appropriate AD Groups policies.

D.

Use Backup Enterprise Manager with indexing enabled on virtual machine and Agent backups with RBAC policies.

Full Access
Question # 6

During architecture review, the engineers who will be implementing the designed architecture ask how they should proceed to fully meet the requirements for Oracle backup. How should the rellout be handled to meet these requirements?

A.

Install and configure the RMAN plugin.

B.

Create pre-freeze and post-thaw scripts for all Oracle backups.

C.

Implement and configure Veeam Backup Enterprise Manager, and configure RMAN so that only Oracle administrators have access to the Oracle backups.

D.

Deploy agents to all Oracle servers and ensure that application aware processing is configured.

Full Access
Question # 7

Immutability of the offsite backups is a constraint on this project. Which of the following requirements does this impact?

A.

Backups must be verified and scanned for malware before restoring.

B.

All data must be retained for three years.

C.

Backup must be storage in logical, scalable storage systems on site.

D.

Backup must take advantage of public cloud storage for long-term retention.

Full Access
Question # 8

Consider the requirements regarding immutable or air gapped and different types of workloads. Which types of jobs do not support using immutability from S3 Object Lock or Hardened Repository and will need a different solution?

A.

Backup copy jobs with GFS enable.

B.

NAS backups.

C.

Backup Jobs.

D.

Scale-out Backup Repository offloads to Archive Tier to Amazon Glacier.

Full Access
Question # 9

Veeam University Hospital has been testing the potential to keep their existing NFS storage at each site: however, they have encountered poor backup throughput performance between sites. What would be an effective way to improve the performance?

A.

Have a mount server at each location.

B.

Ensure the Gateway Server is located close to the NFS backup storage.

C.

Place the backup proxy and Gateway Server together at the source site.

D.

Ensure you use location tags at the target location.

Full Access
Question # 10

Which environmental parameter is affected a possible SureBackup job design? (Choose 2)

A.

Veeam University Hospital has VMware clusters in all locations. For security purposes, each cluster is dedicated to the department that it serves.

B.

Virtual machines are stored on VMware encrypted datastores.

C.

Each site as a 10 GbE link to the public internet, and all traffic between sites routed through these connections via VPN.

D.

The current backups write to NFS storage.

E.

Each site has 20 vLANs in use, with 16 being used for VMware workloads.

Full Access
Question # 11

Upon additional investigation, it is uncovered that the virtual machines to be replicated with a one-hour time have several separate large VMDKs with a high change rate per virtual machine on the same datastore. What mitigating techniques might be required?

A.

Implement Wan accelerator.

B.

Use a dedicated Veeam Backup & Replication server just for replication.

C.

Recommend migrating some of the VMDKs to alternative datastore.

D.

Replicate to a single VMware datastore used just for replicas.

Full Access
Question # 12

Immutability of the offsite backups is a constraint on this project. Which of the following is

presumed to be an additional condition of your offsite backup?

A.

All data must be retained for you years.

B.

All gold and silver machine backups must be verified and scanned for malware before restoring.

C.

Backups must be stored in a Windows-based logical scalable storage system.

D.

A copy of backup data must reside in a public cloud local to each region.

Full Access
Question # 13

During Veeam deployment, Veeam Financial Services has determined that the latency encountered during backup of the virtualized stock trading application servers running on VSAN is too high. What is the

recommended step Veeam Financial Services can take to improve this?

A.

Use backup from storage snapshot for the virtualized stock trading application servers.

B.

Implement Veeam Agent on the virtualized stock trading application servers.

C.

Use Veeam Replication to create replicas of the virtualized stock trading application servers at the remote site, then back up the replicas.

D.

Turn off application-aware processing for the virtualized stock trading application servers.

Full Access
Question # 14

Going through the discovery data, you examine the requirement for one-hour backups of gold tier virtual machines. Some of these servers have been identified as having large VMDK´s with large bursts of I/O. Which

requirement would you be breaking if you separated these virtual machines into their own backup jobs?

A.

Backups must be dynamically scoped to reduce administrative overhead.

B.

Gold tier machines have a recovery time objective of 30 minutes and a recovery point objective of one hour.

C Mission-critical applications must not be affected by backup processes.

C.

Alternative backup methods for virtual machines that are mission critical and susceptible to stunsmust be used.

Full Access
Question # 15

While examining the details for the remote sites each with a single server, you are trying to determine if a local repository will be needed or if backups can be transferred back to the central corporate site in the region. Which of the following requirements will act as a constraint on your decision?

A.

The backup solution must not require proprietary hardware or storage.

B.

All backups must complete between 8 p.m. and 6 a.m. local time.

C.

Data locality and privacy laws local to each branch office must be followed.

D.

A copy of backup data must reside in a public cloud local to each region.

Full Access
Question # 16

After further discussion, it was determined that the customer has taken sufficient steps to secure the NFS network so that in-flight encryption is no longer required. You have decided to deploy VMware backup proxies as virtual machines per cluster to satisfy the scale out-requirement for proxies. Which processing modes are preferred for the NFS datastores? (Choose 2)

A.

Backup from Storage Snapshots

B.

Network (NBD) mode

C.

Virtual Appliance (HotAdd) mode

D.

Network mode with Encryption (NBDSSL)

E.

Direct NFS

Full Access
Question # 17

What is the retention requirement for this project?

A.

12 weekly backups, six monthly backups and seven yearly backups.

B.

Have on-premises backups on hardened backup repositories.

C.

Have at least one copy of protected data on-premises.

D.

On-premises retention consists of 14 daily backups.

Full Access
Question # 18

Which Veeam feature can be used to help achieve compliance with privacy regulations?

A.

Preferred networks.

B.

Location tags on Veeam Backup & Replication servers.

C.

Location tags on the subnets.

D.

Location tags on repositories.

Full Access
Question # 19

What additional stakeholders would it be beneficial to talk to in order to collect business and technical requirements related to virtual infrastructure? (Choose 2)

A.

Database administrators

B.

Web design team

C.

Operations team

D.

Sales staff

E.

Laptop users

Full Access
Question # 20

It has been determined that the onsite repositories need to be immutable. Which configuration would ensure SLA compliance and provide protection against ransomware?

A.

Provide a Veeam Backup & Replication server with Veeam replication and enable XFS with immutability on NFS targets.

B.

Leverage hardened repositories at both primary and secondary sites, and offload to object storage in a public cloud with immutability enabled.

C.

Leverage ReFS repositories as a primary target with a backup copy to a second site and offload to object storage in a public cloud with immutability enabled.

D.

Provide Veeam Backup & Replication servers at two locations and leverage object storage.

Full Access
Question # 21

During architectural planning meetings, Veeam Financial Services inquires about reducing the recovery point objective for silver tier workloads from 24 hours to 12 hours while keeping the retention at 14 days. Which Veeam component(s) will change their sizing requirements as a result?

A.

Veeam repository and proxy roles.

B.

Veeam Backup & Replication server role.

C.

Veeam gateway servers.

D.

The Veeam mount server.

Full Access
Question # 22

Veeam Financial Services has expressed concern about ensuring backups are free of malware before data is restored. How would you accomplish this?

A.

Ensure a compatible antivirus solution is available in a virtual lab for a staged restore.

B.

Ensure the Veeam Data Integration API is accessible from a virtual lab for a secure restore.

C.

Ensure the Veeam Data Integration API is accessible on mount servers for staged restores.

D.

Ensure a compatible antivirus solution is available on mount servers for secure restores.

Full Access
Question # 23

The decision has been made to separate out proxies for gold tier and silver/bronze tier. Which reason below justifies the decision?

A.

Gold tier virtual machines are in their own VMware cluster

B.

Gold tier virtual machines run frequently and should not share resources with lower priority virtual machines

C.

Gold tier virtual machines are on their own VMware Datastores.

D.

Gold tier virtual machines require their own backup server

Full Access
Question # 24

Looking at the existing error, you suspect that most of the issues could be resolved with different repositories. Assuming the repositories will be able to accomplish much higher throughput, what new issue might come up?

A.

The bandwidth between sites might not be sufficient.

B.

The repository space consumption could decrease

C.

The production firewall could become a bottleneck

D.

The increased backup speed could completely bring down production storage.

Full Access
Question # 25

During Veeam deployment, Veeam Life and Indemnity has determined that the latency encountered during backup of the virtualized MSSQL Server database running on vSAN is too high. What is the recommended step Veeam Life and Indemnity can take to improve this?

A.

Turn off application-aware processing for the virtualized MSSQL Server database servers.

B.

Use backup from storage snapshot for the virtualized MSSQL Server database servers.

C.

Implement Veeam Agent for Microsoft Windows on the virtualized MSSQL Server database servers.

D.

Use Veeam Replication to create replicas of the virtualized MSSQL Server database servers at the remote site, then backup the replicas.

Full Access
Question # 26

Assuming that you put the backup repositories in the backup network only, what possible issue could arise?

A.

Laptop agents cannot communicate with the repository.

B.

The proxies cannot communicate with the repositories.

C.

Capacity Tier Could offload is no possible.

D.

SQL logs cannot be shipped to repository.

Full Access
Question # 27

examining the list of requirements, you notice that it is necessary to have backups encrypted. If you use Veeam’s native encryption, which repository type will be the most impacted?

A.

Dedupe repositories

B.

Immutable Linux Repository with XFS reflink cloning

C.

NFS share repository

D.

Windows ReFS with block cloning

Full Access
Question # 28

What components can help meet the following requirement: “Alternative decryption capabilities on encrypted backups must be possible in the event of lost passwords”?

A.

Veeam Backup & Replication’s Configuration Backups

B.

Veeam Backup Enterprise Manager

C.

Veeam Backup & Replication’s Extraction Explorer

D.

Veeam Backup & Replication’s Extract Utility

Full Access
Question # 29

Based on the requirements, what should be factored into the physical design when implementing backup copy jobs between sites?

A.

Ensure that the repositories leveraged have CPUs that support hardware encryption offload.

B.

Configure Veeam Backup Enterprise Manager on the same virtual machine as your Veeam Backup & Replication server

C.

Use physical servers for the Veeam backup proxies at each site

D.

Use virtual servers on separate ESXI host the Veeam backup proxies

Full Access
Question # 30

During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?

A.

Deploy Veeam agents configured for failover clustering.

B.

Perform a regular virtual machine backup without application aware processing.

C.

Enable application aware processing on the virtual machine backup job.

D.

Deploy Veeam agents in server mode.

Full Access
Question # 31

Based on the customer’s security requirements around restore capabilities, which components should be deployed?

A.

Veeam Business view with RBAC policies defined

B.

The Veeam Backup & Replication console with RABC policies defined

C.

Veeam Oracle integrations

D.

Enterprise Manager with granular RABC policies defined

Full Access
Question # 32

To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?

A.

Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.

B.

Create secure restore to ensure malware-free backups.

C.

Create a virtual lab environment and periodically perform staged restores with custom scripts.

D.

Scan backups with Veeam ONE to remove personally identifiable information.

Full Access