Veeam Certified Architect v12 온라인 연습
최종 업데이트 시간: 2025년08월19일
당신은 온라인 연습 문제를 통해 VEEAM VMCA_v12 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 VMCA_v12 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 151개의 시험 문제와 답을 포함하십시오.
정답:
Explanation:
• Veeam CDP is a technology that helps you protect mission-critical VMware virtual machines when data loss for seconds or minutes is unacceptable12.
• Veeam CDP leverages vSphere APIs for I/O filtering (VAIO) to constantly replicate I/O operations performed on VMs without creating snapshots12.
• Veeam CDP allows you to configure the RPO per second and achieve near-zero RPO, which means almost no data loss12.
• Veeam CDP also provides minimum recovery time objective (RTO) in case of a disaster, as CDP replicas are in a ready-to-start state1.
Veeam image-based replication is not the best option, as it relies on snapshots and has a higher RPO than CDP3. Custom PowerShell scripting is not a reliable or scalable solution, as it requires manual coding and maintenance. Veeam Backup Copy with immediate mode is not suitable for replication, as it is designed for copying backup files, not VM replicas4.
References:
1: Continuous Data Protection (CDP) - User Guide for VMware vSphere
2: Veeam v11: Continuous Data Protection (CDP) configuration
3: Replication - User Guide for VMware vSphere
4: Backup Copy Modes - User Guide for VMware vSphere
정답:
Explanation:
• MFA is a security method that requires users to provide two or more pieces of evidence to verify their identity, such as a password, a code, a token, or a biometric factor3.
• MFA adds an extra layer of protection against ransomware attacks, as it prevents attackers from accessing the Veeam components even if they manage to steal or guess the passwords of the administrative accounts12.
• MFA also helps to prevent unauthorized changes or deletions of backup data, as well as unauthorized restores or failovers of VMs or applications12.
The other options are not as effective or feasible, as they either do not provide enough security, limit the functionality, or disrupt the integration of the Veeam infrastructure.
References:
1: 6 Best Practices For Ransomware Protection | Veeam
2: Ransomware Prevention Best Practices - Veeam
3: Multi-factor authentication - Wikipedia
정답:
Explanation:
• Use Hardened Repositories as the primary target, which are Linux-based repositories that support
immutability and prevent ransomware from accessing or deleting backup files12.
• Use backup copy jobs to create a second copy of the backups to a different site, which will provide additional protection and redundancy in case of a disaster or data loss34.
• Use Veeam Backup & Replication servers at one location, which will simplify the management and monitoring of the backup infrastructure and reduce the operational costs.
The other configurations are not as effective or secure, as they either do not use immutability, do not create a second copy of the backups, or do not leverage the benefits of Veeam Backup & Replication servers.
References:
1: Protect against Ransomware with Immutable Backups - Veeam
2: Hardened Repository - User Guide for VMware vSphere
3: Backup Copy Modes - User Guide for VMware vSphere
4: Backup copy jobs - Veeam Backup & Replication Best Practice Guide: Veeam Backup & Replication Architecture Overview
정답:
Explanation:
To design a solution that meets the backup and replication requirements for Veeam University Hospital, you need to consider some of the components that are needed for the on-premises design. This will help you to ensure the performance and reliability of the backup and replication operations, as well as the scalability and manageability of the backup infrastructure.
According to the Veeam Backup & Replication Best Practice Guide1, some of the components that are needed for the on-premises design are:
• Backup server. This is the core component of Veeam Backup & Replication that controls and coordinates backups, replication, recovery verification, and restore tasks. It also manages backup infrastructure components, such as proxy servers, repository servers, WAN accelerators, etc. You need to have a backup server at each site, as recommended by the best practice guide2.
• Backup proxy. This is a component that retrieves data from the source host, processes it and transfers to the backup repository. It also performs data compression, deduplication, encryption, etc. You need to have at least one backup proxy at each site, as recommended by the best practice guide3.
• Backup repository. This is a server where Veeam Backup & Replication keeps backup files, backup copies and metadata of replicated VMs. It can be a Windows or Linux server, a NAS device, a deduplication appliance, etc. You need to have at least one backup repository at each site, as recommended by the best practice guide4.
• Mount server. This is a component that mounts backup files from the backup repository to the backup proxy during restore operations. It also performs data decompression, deduplication, decryption, etc. You need to have a mount server at each site where you plan to perform restores, as recommended by the best practice guide5.
• Gateway server. This is a component that acts as a data mover between the backup proxy and the backup repository when they are located in different sites or networks. It also performs data encryption and decryption for secure data transfer. You need to have a gateway server at each site where you have a backup repository that is accessed by a remote backup proxy, as recommended by the best practice guide.
Therefore, based on these components, the answer that describes which components are needed for the on-premises design is D. Backup server, backup proxy, backup repository, mount server, gateway server.
정답:
Explanation:
To design a disaster recovery solution that meets the needs and requirements of Veeam University Hospital, you need to identify some information during the discovery phase. This information will help you to understand the scope and scale of the replication and failover processes, the network andstorage resources and limitations, and the recovery time objectives and recovery point objectives.
According to the Veeam Backup & Replication Best Practice Guide, some of the information that is necessary to design the disaster recovery solution and must be identified during discovery are:
• The number of virtual machines to be replicated. This information will help you to determine the number and size of the replication jobs, as well as the replication performance and scalability, based on the number and type of virtual machines.
• The available bandwidth between locations. This information will help you to estimate the network bandwidth and throughput that are available for replication traffic, as well as the impact of replication activities on the network performance and latency.
• Which sites will be the source of replication and which sites will be the targets for recovery. This information will help you to plan and configure the replication infrastructure, such as the proxy servers, repository servers, WAN accelerators, and failover plans, based on the source and target locations.
정답:
Explanation:
The gateway is a component that acts as a data mover between the backup proxy and the backup repository. If the gateway does not have enough CPU, RAM and task slots assigned, it may not be able to handle the incoming data from the backup proxy efficiently, and cause a bottleneck at the target. By increasing the resources and task slots for the gateway, you can improve its performance and throughput, and reduce the load on the target2
정답:
Explanation:
To make backup files immutable in a Scale-out Backup Repository, you need to use XFS extents with the reflink attribute enabled. This attribute allows Veeam Backup & Replication to create immutable backup files using the fast clone technology. If some of the XFS extents do not have this attribute enabled, they will not support immutability and the backup files stored on them will not be protected from deletion or modification1
정답:
Explanation:
Based on the customer Windows and Linux file server backup requirements, the best component to help them meet their stated objectives is Backup Enterprise Manager with indexing enabled on virtual machine and Agent backups with RBAC policies.
This is because:
• Backup Enterprise Manager allows the customer to manage and monitor backup jobs across multiple backup servers from a single web-based interface1.
• Indexing enables the customer to perform file-level recovery from the backups of Windows and Linux servers, as well as search for files across all backups2.
• RBAC policies allow the customer to delegate permissions to different users and groups for performing file-level recovery, based on their roles and restore scopes3.
References:
1: Veeam Backup Enterprise Manager Guide
2: Veeam Backup & Replication User Guide
3: Veeam Backup Enterprise Manager Guide > Configuring Accounts and Roles
정답:
Explanation:
Veeam University Hospital is considering using Veeam ONE to collect alarms from the virtual and backup infrastructure. Veeam ONE is a powerful monitoring and reporting tool that provides visibility and insight into the performance, configuration, and utilization of your backup and virtual infrastructure. Veeam ONE can also alert you about any issues or problems that may affect the availability or reliability of your data protection and recovery processes.
One of the options that is available for integrating Veeam ONE with ticketing systems is
A. Configure Veeam ONE to send SNMP traps to the ticketing system.
This option means that:
• SNMP (Simple Network Management Protocol) is a protocol that allows network devices to communicate and exchange information with each other.
• SNMP traps are messages that are sent by network devices to notify a management system about events or conditions that require attention or action.
• Veeam ONE can be configured to send SNMP traps to a ticketing system when an alarm is triggered or resolved. This allows you to automate the creation and update of tickets based on the alarm data, such as the alarm name, severity, status, description, etc.
• To configure Veeam ONE to send SNMP traps to a ticketing system, you need to enable SNMP notifications in the Veeam ONE settings, as well as specify the SNMP server address, port, community string, and trap format. You also need to configure the ticketing system to receive and process the SNMP traps from Veeam ONE.
This option is a good choice for integrating Veeam ONE with ticketing systems, as it allows you to leverage the benefits and features of both solutions, such as:
• You can use Veeam ONE to monitor and analyze your backup and virtual infrastructure, as well as to detect and alert you about any issues or problems that may affect your data protection and recovery processes.
• You can use the ticketing system to manage and track the resolution of the issues or problems that are reported by Veeam ONE, as well as to assign and prioritize tickets to the appropriate staff or team members.
정답:
Explanation:
To design a solution that meets the offsite copies and archives requirements for Veeam University Hospital, you need to clarify some of the assumptions and expectations of the customer. This will help you to avoid any misunderstandings or conflicts that may arise during the implementation or operation of the solution.
According to the Veeam Backup & Replication Best Practice Guide, offsite copies and archives are two different concepts that serve different purposes. Offsite copies are backups that are stored in a different location than the primary backup storage, and are used for disaster recovery purposes. Archives are backups that are stored for a longer retention period than the regular backups, and are used for compliance or historical purposes.
Based on these definitions, the requirement that needs additional information to help clarify the customer expectation is C. Backups must take advantage of public cloud storage for long term archival purposes.
정답:
Explanation:
To perform backup from storage snapshots for a Fibre Channel SAN, you need to deploy one or more physical servers that will act as backup proxies and connect them to the SAN fabric. This is because Veeam Backup & Replication needs to access the storage system over the Fibre Channel protocol, which is not supported by virtual machines. The backup proxies will read data from the storage snapshots and transfer it to the backup repositories1
정답:
Explanation:
• Backup copy jobs with GFS enabled. This type of job does not support using immutability from S3 Object Lock because it uses synthetic full backups, which require modifying existing backup files. Synthetic full backups are not compatible with immutability settings, as they violate the principle of not changing the backup files.
정답:
Explanation:
WAN accelerators are dedicated components that Veeam Backup & Replication uses for WAN acceleration. WAN accelerators are responsible for global data caching and data deduplication, which reduce the amount of data that needs to be transferred over the network. By adding WAN accelerators to each site, you can improve the performance of backup copy jobs between sites, and reduce the bandwidth consumption and network traffic3
References:
1: Gateway Server - User Guide for VMware vSphere
2: Gateway Server - User Guide for VMware vSphere
3: WAN Accelerators - User Guide for VMware vSphere
정답:
Explanation:
According to the Veeam Backup & Replication Best Practice Guide1, one of the possible ramifications of shortening the backup window to eight hours is that the CPU and memory requirements of the proxies will be increased.
This is because:
• The proxies are responsible for retrieving data from the source and sending it to the target. They perform data compression, deduplication, encryption, and other tasks that consume CPU and memory resources.
• To shorten the backup window, the proxies need to process more data in less time, which means they need more CPU cores and memory to handle concurrent tasks and avoid bottlenecks.
• The backup window can also be affected by other factors, such as the network bandwidth, the storage throughput, the backup methods, and the backup settings. Therefore, it is important to consider all these aspects when designing a backup solution.
References: 1: Proxy - Veeam Backup & Replication Best Practice Guide
정답:
Explanation:
Option A follows the 3-2-1 rule by having three copies of data (the original production data, the backup at the primary site, and the backup copy at the secondary site), two different media types (local disk and object storage), and one copy off-site (the backup copy at the secondary site). This option also reduces the amount of traffic sent over the network by using existing backups as seeds for backup copies, and reduces the storage costs by using cloud tier to move older backups to cheaper and unlimited cloud storage1
Reference: What is the 3-2-1 backup rule? - Veeam