Free VMCA2022 Exam Braindumps (page: 8)

Page 7 of 28
View Related Case Study

Based on the customer's security requirements around restore capabilities, which components should be deployed?

  1. Veeam Business view with RBAC policies defined
  2. The Veeam Backup & Replication console with RABC policies defined
  3. Veeam Oracle integrations
  4. Enterprise Manager with granular RABC policies defined

Answer(s): D

Explanation:

The component that should be deployed based on the customer's security requirements around restore capabilities is Enterprise Manager with granular RBAC policies defined. Enterprise Manager is a web-based interface that allows centralized management of multiple Veeam backup servers. It also provides granular RBAC policies that enable control over user permissions and access to restore data. For example, you can assign different roles to different users or groups based on their responsibilities and needs, such as backup administrator, restore operator, security officer, etc. You can also define custom scopes and rules for each role to limit their access to specific objects, jobs, or actions.



View Related Case Study

During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?

  1. Deploy Veeam agents configured for failover clustering.
  2. Perform a regular virtual machine backup without application aware processing.
  3. Enable application aware processing on the virtual machine backup job.
  4. Deploy Veeam agents in server mode.

Answer(s): A

Explanation:

The best way to configure backups for a group of MSSQL systems running in an Always-On cluster and sensitive to virtual machine stun is to deploy Veeam agents configured for failover clustering. Veeam agents can provide application-aware processing and transaction log backup for MSSQL servers, as well as support for failover clustering and cluster shared volumes. Veeam agents can also reduce the impact of virtual machine stun by performing backups at the guest OS level, without using VMware snapshots.



View Related Case Study

To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?

  1. Implement Veeam Backup & Replication servers at one location and leverage hardened repositories as a primary target with a backup copy to a second site.
  2. Create secure restore to ensure malware-free backups.
  3. Create a virtual lab environment and periodically perform staged restores with custom scripts.
  4. Scan backups with Veeam ONE to remove personally identifiable information.

Answer(s): C

Explanation:

The configuration that would verify the SLA compliance during audits and protection against exposure to personally identifiable information in the event of exposure is to create a virtual lab environment and periodically perform staged restores with custom scripts. A virtual lab is an isolated environment where you can run your backups or replicas without affecting the production environment. A staged restore is a process that allows you to run custom scripts on the restored data before publishing it to the production environment. By using these features, you can demonstrate that your backups are recoverable and compliant with legal regulations, as well as remove or mask any sensitive data before restoring it.



View Related Case Study

Considering the security, throughput, and retention requirements, what would be part of an acceptable backup repository design? (Choose 2)

  1. Use a backup job directly to an object storage appliance
  2. Use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data.
  3. Use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site.
  4. Use Backup copy jobs to Hardened Windows ReFS-based repositories at the secondary site.
  5. Use a backup job directly to a deduplication appliance.

Answer(s): B,C

Explanation:

The backup repository design that would meet the security, throughput, and retention requirements is to use backup jobs to Hardened Linux XFS-based repositories at the same site as the source data and use Backup copy jobs to Hardened Linux XFS-based repositories at the secondary site. A Hardened Linux repository is a type of backup repository that provides immutability and ransomware protection for backup files by using XFS file system features and Linux access control mechanisms. A Backup copy job is a type of backup job that copies backups from one repository to another, either on-site or off-site, with different retention settings. By using these features, you can ensure that your backups are secure, efficient, and compliant with regulatory and business needs.






Post your Comments and Discuss VEEAM VMCA2022 exam with other Community members:

VMCA2022 Discussions & Posts