Veeam Certified Architect 2022 VMCA2022 Exam Questions

0
7

Are you looking forward to taking the Veeam Certified Architect 2022 exam? PassQuestion provides the latest Veeam Certified Architect 2022 VMCA2022 Exam Questions, which comprehensively cover all the exam objectives to give you a deep understanding of the material and familiarize you with the types of questions you will encounter on the exam. By using the PassQuestion Veeam Certified Architect 2022 VMCA2022 Exam Questions, you can hone your skills and boost your confidence, ensuring that you are fully prepared on exam day. These practice questions not only test your knowledge but also help you identify areas where you may need further study. With this targeted preparation, you can focus your efforts more effectively and improve your chances of passing the exam on your first try.

Veeam Certified Architect 2022

The Veeam Certified Architect (VMCA) Certification is the highest level of Veeam certification and demonstrates that an individual possesses a high level of both technical and business skill to design complex, enterprise-level Veeam deployments. This certification is recommended for IT professionals such as Senior Engineers and Architects responsible for creating architectures for Veeam environments.

Exam Information

Number of Questions: 40 multiple-choice
Passing score: 70%
Languages: English
Time limit: 90 minutes
Delivery: Pearson VUE test centers or via their Online Proctored Platform

Exam Outline

The following is an outline of the VMCA 2022 exam, detailing what you can expect to be tested on. The competencies have been developed by certification specialists and subject matter experts. The exam tests the candidate’s ability to effectively architect a Veeam solution following the Veeam Architecture Methodology used by Veeam’s own Solution Architects

Discovery (25%)

How to:
• Validate customer objectives, requirements and constraints
• Review preliminary data
• Identify assumptions and risks
• Analyze an existing environment
• Identify complexity in the environment

Conceptual design (25%)

How to:
• Group objects to share resources
• Identify additional requirements, constraints, assumptions and risks
• Address design challenges that go against requirements

Logical design (25%)

How to:
• Match products, components and features with requirements
• Calculate component quantity sizing
• Make recommendations for configuration and features
• Create high level design and data flow

Physical design (15%)

How to:
• Convert logical design into a physical design
• Secure by design
• Harden the Veeam deployment (focus on repository)
• List physical Veeam backup components

Deployment and evaluation (10%)

How to:
• Guide implementation specifics
• Recommend how to validate the design
• Develop the design according to a modification scenario

View Online Veeam Certified Architect 2022 VMCA2022 Free Questions

1. In order to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful, which of the following should Veeam Life and Indemnity do?
A. Implement a strong password security policy on shared administrative accounts
B. Remove all remote access from Veeam administrators.
C. Ensure that none of then Veeam components are on the production Active Directory domain
D. Protect the Veeam components on the production Active Directory Forest with multi-factor authentication
Answer: D

2. During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun.
How should these systems be configured for backups?
A. Deploy Veeam agents configured for failover clustering.
B. Perform a regular virtual machine backup without application aware processing.
C. Enable application aware processing on the virtual machine backup job.
D. Deploy Veeam agents in server mode.
Answer: A

3. When deciding on the design of the primary backup repository, which option best fits the requirements in the case study?
A. Dedupe appliance leveraging vendor API for access
B. Public cloud storage with S3 object-lock for immutability
C. Windows repository using ReFS integration, single-use credential and persistent VSS snapshot
D. Linux Repository using XFS integration, single-use credentials, and immutability
Answer: D

4. Based on the customer’s security requirements around restore capabilities, which components should be deployed?
A. Veeam Business view with RBAC policies defined
B. The Veeam Backup & Replication console with RABC policies defined
C. Veeam Oracle integrations
D. Enterprise Manager with granular RABC policies defined
Answer: D

5. Based on customer recovery requirements, which component will help them meet their stated objectives?
A. Add a Windows server and enable encryption of backups to ensure alternative decryption capabilities.
B. Deploy and configure Enterprise Manager with RBAC policies.
C. Deploy Veeam Backup & Replication console and set RBAC policies to Administrator Role
D. Add a Windows and Linux server, enable indexing of backups and ensure authenticated users are configured to appropriate RBAC policies.
Answer: B

6. What assumption can be made for the conceptual design?
A. All new backup storage should utilize Windows ReFS block cloning.
B. Tape backups of all servers will be used for ransomware protection.
C. Veeam Agent backups of sale staff laptops should be managed by the backup server.
D. VMware tagging will be used to enable dynamic scoping of backups.
Answer: C

7. Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective.
Which of the following would be the recommended method to replicate VMware virtual machines?
A. Veeam backup copy with immediate mode
B. Veeam Continuous Data Protection.
C. Veeam Image-based replication
D. Custom PowerShell scripting.
Answer: B

8. The customer states that Veeam Backup & Replication is on the production domain.
What direct risks does this present?
A. Unable to use two-factor authentication.
B. Compromised Domain Admin could gain access.
C. Cannot access the REST interface.
D. Compromised Domain User could gain access.
Answer: B

9. In order to improve the likelihood that a ransomware attack on the Veeam infrastructure will not be successful, which of the following should Veeam University Hospital do?
A. Remove all remote access from Veeam administrators.
B. Implement a strong password security policy on shared administrative accounts.
C. Ensure that none of the Veeam components are on the production Active Directory domain.
D. Protect the Veeam components on the production Active Directory Forest with multi-factor authentication.
Answer: D

10. Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective.
Which of the following would be the recommended method to replicate VMware virtual machines?
A. Veeam Continuous Data Protection.
B. Veeam image-based replication.
C. Custom PowerShell scripting.
D. Veeam Backup Copy with immediate mode.
Answer: A