Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Gold tier virtual machines have a recovery point objective of one hour for image backup. Which transport mode could you use during the redesign? (Choose 2)

A.

Virtual Appliance (HotAdd)

B.

Direct SAN Access

C.

Network mode (NBDSSL)

D.

Direct NFS Access

E.

Backup from Storage Snapshots

In order to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful, which of the following should Veeam Life and Indemnity do?

A.

Implement a strong password security policy on shared administrative accounts

B.

Remove all remote access from Veeam administrators.

C.

Ensure that none of then Veeam components are on the production Active Directory domain

D.

Protect the Veeam components on the production Active Directory Forest with multi-factor authentication

What things can you do to validate that the design meets target SLAs and reduces the headcount required to manage the solution? (Choose 3)

A.

Export the configuration with scripts, schedule a recurring review to discuss status and configuration drift.

Document restore operations to streamline service desk engagement.

B.

Use tagging and scripts to auto-generate backup jobs, set the start time and windows, letting the backup server manage resource allocation.

C.

Use inventory information to group jobs, use backup chaining and fine tune to fit within the backup window.

D.

Explain how to detect configuration changes, reporting and using backup job templates to maintain consistency. Document self-service restore the streamline service desk engagement.

E.

Review the design so that there is no bottleneck going forward.

F.

Review the design so that the slowest part of the infrastructure is fast enough to meet backup window requirements.

During planning, Veeam Financial Services decides to change their backup window from 12 hours to 14 hours. What can be changed in the design based on this?

A.

Proxies will require more resources.

B.

Mount servers will require fewer resources.

C.

Proxies will require fewer resources.

D.

Repositories will require more storage space.

After further discussion, it was determined that the customer has taken sufficient steps to secure the NFS network so that in-flight encryption is no longer required. You have decided to deploy VMware backup proxies as virtual machines per cluster to satisfy the scale out-requirement for proxies. Which processing modes are preferred for the NFS datastores? (Choose 2)

A.

Backup from Storage Snapshots

B.

Network (NBD) mode

C.

Virtual Appliance (HotAdd) mode

D.

Network mode with Encryption (NBDSSL)

E.

Direct NFS

It has been determined that the onsite repositories need to be immutable. Which configuration would ensure SLA compliance and provide protection against ransomware?

A.

Provide a Veeam Backup & Replication server with Veeam replication and enable XFS with immutability on NFS targets.

B.

Leverage hardened repositories at both primary and secondary sites, and offload to object storage in a public cloud with immutability enabled.

C.

Leverage ReFS repositories as a primary target with a backup copy to a second site and offload to object storage in a public cloud with immutability enabled.

D.

Provide Veeam Backup & Replication servers at two locations and leverage object storage.

What additional information is necessary for sizing the backup solution and must be gathered

during further discovery? (Choose 2)

A.

The available bandwidth per site

B.

The amount of virtual machines to be protected

C.

The total amount of production storage provisioned space

D.

Repository storage file system

E.

The replication schedule

Which Veeam feature can be used to help achieve compliance with privacy regulations?

A.

Preferred networks.

B.

Location tags on Veeam Backup & Replication servers.

C.

Location tags on the subnets.

D.

Location tags on repositories.

A remote office has an eight-node vSphere cluster with VSAN storage. After performing the sizing

calculations, it is determined that the proxy role will require 64 CPUs and 128 GB of RAM to meet the stated backup SLAs. How should these proxies be deployed?

A.

Deploy a single physical server with 64 CPUs and 128 GB of RAM.

B.

Deploy two physical proxies with 32 CPUs and 64 GB of RAM.

C.

Deploy four virtual proxies with 16 CPUs and 32 GB of RAM.

D.

Deploy eight virtual proxies with eight CPUs and 16 GB of RAM.

It has been determined that the onsite repositories need to be immutable. How should the repositories be configured to easily allow for additional capacity to be added?

A.

Stand-alone repositories using NTFS.

B.

Scale-out Backup Repositories consisting of hardened ReFS repositories.

C.

Stand-alone repositories using the XFS file system.

D.

Scale-out Backup Repositories consisting of hardened repositories.