For any replicated virtual workloads, the data must not be more than one hour old. What could be a potential risk to the SLA for the offsite disaster recovery aspect of this requirement?
Answer : B
To design a disaster recovery solution that meets the requirement of having the replicated virtual workloads data not more than one hour old, you need to consider some of the potential risks and challenges that may affect the service level agreement (SLA) for the offsite disaster recovery aspect of this requirement. This will help you to ensure the availability and reliability of the replication and failover processes, as well as the recovery time objective (RTO) and recovery point objective (RPO) of the organization.
According to the Veeam Backup & Replication Best Practice Guide, one of the potential risks to the SLA for the offsite disaster recovery aspect of this requirement is B. Data change rate.
This risk means that:
* The data change rate is the amount of data that is modified, added, or deleted in a given time period. It is usually measured in percentage or megabytes per hour.
* The data change rate affects the replication performance and efficiency, as it determines how much data needs to be transferred and processed between the source and target sites.
* The data change rate also affects the replication frequency and consistency, as it determines how often and how accurately the replicas are updated and synchronized with the source workloads.
* The data change rate may vary depending on the type and activity of the workloads, such as database, file server, web server, etc. Some workloads may have a high data change rate, while others may have a low data change rate.
* The data change rate may exceed the available bandwidth or storage capacity between the source and target sites, which may result in replication failures, delays, or errors. This may compromise the SLA for the offsite disaster recovery aspect of this requirement, as it may cause the replicated virtual workloads data to be more than one hour old.
This risk has some implications for designing a solution with Veeam products and features, such as:
* The customer or a third-party vendor must monitor and measure the data change rate of the workloads that need to be replicated, as well as the available bandwidth and storage capacity between the source and target sites. This will help to plan and optimize the replication infrastructure, such as the proxy servers, repository servers, WAN accelerators, and failover plans, based on the data change rate.
* The customer or a third-party vendor must configure and adjust the replication settings and policies, such as the replication method, schedule, frequency, retention, compression, deduplication, etc., based on the data change rate. This will help to improve the replication performance and efficiency, as well as to meet the SLA for the offsite disaster recovery aspect of this requirement.
To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?
Answer : C
The configuration that would verify the SLA compliance during audits and protection against exposure to personally identifiable information in the event of exposure is to create a virtual lab environment and periodically perform staged restores with custom scripts. A virtual lab is an isolated environment where you can run your backups or replicas without affecting the production environment. A staged restore is a process that allows you to run custom scripts on the restored data before publishing it to the production environment. By using these features, you can demonstrate that your backups are recoverable and compliant with legal regulations, as well as remove or mask any sensitive data before restoring it.
During deeper technical discovery it was uncovered that that the customer also has a Fibre Channel SAN that needs protection. Veeam University Hospital asks about the option of performing backup from storage snapshots. What component(s) will this require?
Answer : B
To perform backup from storage snapshots for a Fibre Channel SAN, you need to deploy one or more physical servers that will act as backup proxies and connect them to the SAN fabric. This is because Veeam Backup & Replication needs to access the storage system over the Fibre Channel protocol, which is not supported by virtual machines. The backup proxies will read data from the storage snapshots and transfer it to the backup repositories1
The customer confirms that their database are Windows based. What assumption does using the script for the in-house database present?
Answer : C
To design a solution that meets the database requirements for Veeam University Hospital, you need to consider some of the assumptions and implications of using the script for the in-house database. This will help you to ensure the consistency and reliability of the database backups and restores, as well as the compatibility and supportability of the script with Veeam products and features.
According to the Veeam Backup & Replication Best Practice Guide, one of the assumptions that using the script for the in-house database presents is C. The script already exists and is solely managed by the customer.
This assumption means that:
* The script is not provided or maintained by Veeam, but by the customer or a third-party vendor. Therefore, Veeam is not responsible for the functionality or quality of the script, nor for any issues or errors that may arise from using it.
* The script is already tested and verified by the customer or a third-party vendor. Therefore, Veeam does not need to validate or certify the script, nor to provide any documentation or guidance on how to use it.
* The script is already integrated and configured with the in-house database. Therefore, Veeam does not need to modify or customize the script, nor to provide any support or troubleshooting for it.
This assumption has some implications for designing a solution with Veeam products and features, such as:
* The customer or a third-party vendor must ensure that the script is compatible and compliant with the latest versions and updates of Veeam Backup & Replication, as well as with the in-house database.
* The customer or a third-party vendor must provide Veeam with the necessary information and access to run the script before and after the backup or restore operations, such as the script location, parameters, credentials, etc.
* The customer or a third-party vendor must monitor and manage the script performance and results, as well as handle any exceptions or failures that may occur during or after the backup or restore operations.
During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?
Answer : A
The best way to configure backups for a group of MSSQL systems running in an Always-On cluster and sensitive to virtual machine stun is to deploy Veeam agents configured for failover clustering. Veeam agents can provide application-aware processing and transaction log backup for MSSQL servers, as well as support for failover clustering and cluster shared volumes. Veeam agents can also reduce the impact of virtual machine stun by performing backups at the guest OS level, without using VMware snapshots.
What information is necessary for designing a solution and must be gathered during discovery? (Choose 3)
Size of the backup create by the incumbent backup solution.
Answer : A, B, E
To design a solution that meets the needs and requirements of Veeam University Hospital, you need to gather some information during the discovery phase. This information will help you to understand the current state of the environment, the goals and expectations of the stakeholders, and the constraints and challenges of the project.
According to the Veeam Backup & Replication Best Practice Guide1, some of the information that is necessary for designing a solution and must be gathered during discovery are:
* Operating systems used to run the workloads. This information will help you to determine the compatibility and supportability of the workloads with Veeam products and features, as well as the licensing and configuration requirements.
* Allowed backup windows. This information will help you to plan and schedule the backup jobs according to the availability and performance of the workloads, as well as the service level agreements (SLAs) and recovery point objectives (RPOs) of the organization.
* Amount of used disk space. This information will help you to estimate the backup storage requirements, as well as the backup compression and deduplication ratios, based on the type and size of the data.
What is the retention requirement for gold tier virtual machines?
Answer : D
The retention requirement for gold tier virtual machines is that they must have 14 daily, eight weekly, three monthly and seven yearly backups. This requirement can be derived from the technical requirement of having eight weekly backups, three monthly backups, and seven yearly backups for regulatory purposes, as well as the business requirement of having daily backups for gold tier virtual machines.