While deciding which transport mode to use for the proxies, you notice that one of the requirements is support the encrypted datastore in VMware. Which processing modes can you leverage for the backup proxies? (Choose 3)
The customer has stated that synthetic operations and backups copy jobs must be completed in the desired window. Which components should be sized correctly to ensure that this will be successful?
while going through the discovery data for the NAS environment, you determine several key metrics are missing for later design and sizing. Which of the following should you collect from the customer about the data stored on the NAS per site? (Choose 2)
Upon additional investigation, it is uncovered that the virtual machines to be replicated with a one-hour time have several separate large VMDKs with a high change rate per virtual machine on the same datastore. What mitigating techniques might be required?
When talking to someone who works for the hospital, they mention they are working on a projectwith a major cloud provider that does not currently support immutability. After further conversations, the customer has decided that they would like daily immutable backups to be sent off-site. Which of the following is the best option to still satisfy the requirements for off-site immutable backups?
Which tier(s) of Veeam Financial Services’ backups will require SureBackup jobs?
One of Veeam Financial Services’ mission critical applications needs to be backed up daily. This Linux virtual machine is susceptible to snapshot stun. Based on business requirements, how should this be accomplished?
After further discussion, it was determined that the customer has taken sufficient steps to secure the NFS network so that in-flight encryption is no longer required. You have decided to deploy VMware backup proxies as virtual machines per cluster to satisfy the scale out-requirement for proxies. Which processing modes are preferred for the NFS datastores? (Choose 2)
What information related to the virtual infrastructure is missing and must be collected during the
discovery? (Choose 2)
What things can you do to validate that the design meets target SLAs and reduces the headcount required to manage the solution? (Choose 3)
It has been determined that the onsite repositories need to be immutable. Which configuration would ensure SLA compliance and provide protection against ransomware?
Based on documented requirements, which information is still needed for a complete architectural design?
Based on customer recovery requirements, which component will help them meet their stated objectives?
Veeam Financial Services has determined that the recovery point objective for disaster recovery is one minute for two business critical virtual machines. What Veeam components will be required at each site?
During deeper technical discovery it was uncovered that that the customer also has a Fibre Channel SAN that needs protection. Veeam University Hospital asks about the option of performing backup from storage snapshots. What component(s) will this require?
While looking through the requirements regarding database servers, you see native Oracle utilities must be available for backups and restores. To make sure the native tools can interface directly with Veeam, which option most closely matches the requirements?
In order to satisfy the customer´s data scrubbing requirement, what Veeam components will be required?
Considering the security, throughput, and retention requirements, what would be part of an acceptable backup repository design? (Choose 2)
The company has committed to providing the numbers for source in-use data for gold tier virtual machines. In order to attempt to collect metrics for hourly gold tier backups, which of the following additional metrics are need for proxy sizing?
What components can help meet the following requirement: “Alternative decryption capabilities on encrypted backups must be possible in the event of lost passwords”?
You are examining the requirement: “If possible, the data written must be unchangeable to prevent ransomware attacks.” Which types of jobs do not support using immutability from S3 Object Lock or hardened repositories? (Choose two)
While going through the discovery data for the NAS environment, you determine several key metrics are missing for later deign and sizing. Which of the following should you collect from the customer about the data stored on the on the NAS per site? (Choose 3)
In addition to scanning all backup for malware before restoring, what additional Veeam capabilities must be included in the conceptual design for gold level systems? (Choose 2)
The decision has been made to separate out proxies for gold tier and silver/bronze tier. Which reason below justifies the decision?
What can be done to validate that the design meets target SLAs and does not exceed repository growthprotections?
Looking at the existing error, you suspect that most of the issues could be resolved with different repositories. Assuming the repositories will be able to accomplish much higher throughput, what new issue might come up?
During discovery, it is determined that a group of MSSQL systems are running in an Always-On cluster and sensitive to virtual machine stun. How should these systems be configured for backups?