VEEAM Certified Architect 2022 VMCA2022 Exam Practice Test

Page: 1 / 14
Total 108 questions
Question 1

What can be done to validate that the design meets target SLAs and does not exceed repository growth protections?



Answer : A

The method that can be used to validate that the design meets target SLAs and does not exceed repository growth projections is to ensure job throughput matches extensions and cross-compare with available network throughput, disk speed and initial sizing calculations. Job throughput is the measure of how much data is processed and transferred by a backup job per unit of time. Job throughput can be affected by various factors such as network bandwidth, disk performance, compression, deduplication, encryption, etc. By ensuring job throughput matches extensions, you can verify that your backup jobs are running as expected and meeting the SLAs. By cross-comparing job throughput with available network throughput, disk speed and initial sizing calculations, you can identify any bottlenecks or discrepancies that might affect your backup performance or storage consumption.


Question 2

The company has committed to providing the numbers for source in-use data for gold tier virtual machines. In order to attempt to collect metrics for hourly gold tier backups, which of the following additional metrics are need for proxy sizing?



Answer : B


Question 3

In order to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful, which of the following should Veeam Life and Indemnity do?



Answer : D

The action that Veeam Life and Indemnity should take to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful is to protect the Veeam components on the production Active Directory Forest with multi-factor authentication. Multi-factor authentication (MFA) is a security mechanism that requires users to provide two or more pieces of evidence to prove their identity before accessing a system or resource. MFA can prevent unauthorized access to the Veeam components even if the user credentials are compromised by ransomware or other means.


Question 4

Based on the customer's security requirements around restore capabilities, which components should be deployed?



Answer : D

The component that should be deployed based on the customer's security requirements around restore capabilities is Enterprise Manager with granular RBAC policies defined. Enterprise Manager is a web-based interface that allows centralized management of multiple Veeam backup servers. It also provides granular RBAC policies that enable control over user permissions and access to restore data. For example, you can assign different roles to different users or groups based on their responsibilities and needs, such as backup administrator, restore operator, security officer, etc. You can also define custom scopes and rules for each role to limit their access to specific objects, jobs, or actions.


Question 5

Veeam Life and Indemnity informs you that they have experienced issues with the time to back up file data from the existing legacy NAS backup. The NAS is being backed up at file level with a low change rate. The source capacity to back up is 12 TB connected to a 10 GbE switch over eight hours. What assumptions about the current environment could you draw from this?



Answer : D


Question 6

The customer decides to add extra proxy in anticipation of an acquisition that is planned for 12 months out, rather than wait until the acquisition is completed to expand the Veeam Infrastructure. What will be the immediate result of adding the extra proxy server?



Answer : A

Thank you for your question. I'm glad to help you with your VMCA 2022 project.

To design a solution that meets the needs and requirements of Veeam University Hospital, you need to consider the impact and benefit of adding extra proxy servers to your backup infrastructure. This will help you to optimize the performance and efficiency of your backup and restore operations, as well as to prepare for future growth and expansion.

According to the web search results, a proxy server is a component that retrieves data from the source host, processes it and transfers to the backup repository. It also performs data compression, deduplication, encryption, etc. You can deploy backup proxies both in the primary site and in remote sites1.

The immediate result of adding the extra proxy server is A. The time for backup to complete could be reduced.

This result means that:

* The time for backup to complete is a metric that measures how long it takes to perform a backup job from start to finish. It depends on various factors, such as the size and type of data, the backup method and frequency, the network bandwidth and latency, etc.

* Adding an extra proxy server can reduce the time for backup to complete, by distributing the backup workload between available proxy servers. This can improve the backup performance and efficiency, as well as reduce the impact on the production environment.

* Reducing the time for backup to complete can also help you to meet your backup window and recovery point objective (RPO) requirements, as well as to free up more resources for other tasks or jobs.


Question 7

The customer states that Veeam Backup & Replication is on the production domain. What direct risks does this present?



Answer : B

The direct risk of having Veeam Backup & Replication on the production domain is that a compromised Domain Admin could gain access to the backup server and its data. This could pose a serious security threat to the backup infrastructure and the customer data, as a malicious Domain Admin could delete, modify, or encrypt the backups, or restore them to a compromised environment. Therefore, it is recommended to isolate the backup server from the production domain and use a separate local administrator account for managing it.


Page:    1 / 14   
Total 108 questions