Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Based on the requirements, what should be factored into the physical design when implementing the virtual machine replication between sites?

A.

Use virtual servers on separate ESXi hosts for the Veeam backup proxies.

B.

Use physical servers for Veeam backup proxies at each site.

C.

Ensure the proper firewall ports are open between the proxies at each site.

D.

Configure Veeam Backup Enterprise Manager on the same virtual machine as your Veeam Backup & Replication server.

What information is necessary to design the disaster recovery solution and must be identified during discovery? (Choose 3)

A.

The number of virtual machines to be replicated.

B.

The available bandwidth between locations.

C.

The required amount of backups to be storage off site.

D.

The number of vLANs per site.

E.

Which sites will be the source of replication and which sites will be the targets for recovery.

During a proof of concept deployment at Veeam University Hospital, it is noted that only some of the backup files in a specific Scale-out Backup Repository are immutable. What can cause this behavior?

A.

The ReFS extents do not have immutable enabled.

B.

Not all XFS extents in the Scale-out Backup Repository performance tier have the required flag enable.

C.

All extents in the Scale-out Backup Repository performance tier are ReFS.

D.

Not all EXT in the Scale-out Backup Repository performance archive tier have the required flag enabled.

Immutability of the offsite backups is a constraint on this project. Which of the following requirements does this impact?

A.

Backups must be verified and scanned for malware before restoring.

B.

All data must be retained for three years.

C.

Backup must be storage in logical, scalable storage systems on site.

D.

Backup must take advantage of public cloud storage for long-term retention.

Which of the following is risk for this project?

A.

The backup solution must support VMware encrypted datastores.

B.

End-user laptop backups must have a recovery time objective of 30 minutes.

C.

Data must be replicate with one-hour recovery point objective.

D.

Linux and Windows files server backups must be searchable during a self-service restore.

Veeam University Hospital perform a proof of concept of the design outline in the architecture. Backups completed successfully, but it is determined that backup copy jobs between sites are not completing in the required timeframe. During the result analysis, it was discovered that the bandwidth between sites was heavily saturated. What adjustments within the Veeam infrastructure would best address this issue?

A.

Increase the proxy computer resources at each site.

B.

Increase the computer resources on the repository servers at each site.

C.

Add WAN accelerators to each site.

D.

Have the customer implement Quality of Service on their WAN connections.

Based on the customer Windows and Linux file server backup requirements, which component will help them meet their stated objectives?

A.

Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role.

B.

Add Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policy.

C.

Add a Windows Server, enable indexing of backups and ensure authenticated users are configured to appropriate AD Groups policies.

D.

Use Backup Enterprise Manager with indexing enabled on virtual machine and Agent backups with RBAC policies.

For any replicated virtual workloads, the data must not be more than one hour old. What could be a potential risk to the SLA for the offsite disaster recovery aspect of this requirement?

A.

The quantity of network hops.

B.

Data change rate.

C.

Average virtual machine size

D.

Local area network bandwidth.

Veeam University Hospital has been testing the potential to keep their existing NFS storage at each site: however, they have encountered poor backup throughput performance between sites. What would be an effective way to improve the performance?

A.

Have a mount server at each location.

B.

Ensure the Gateway Server is located close to the NFS backup storage.

C.

Place the backup proxy and Gateway Server together at the source site.

D.

Ensure you use location tags at the target location.

In order to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful, which of the following should Veeam University Hospital do?

A.

Remove all remote access from Veeam administrators.

B.

Implement a strong password security policy on shared administrative accounts.

C.

Ensure that none of the Veeam components are on the production Active Directory domain.

D.

Protect the Veeam components on the production Active Directory Forest with multi-factor authentication.