Free VEEAM VMCA2022 Exam Actual Questions

The questions for VMCA2022 were last updated On Jan 17, 2025

Question No. 1

Based on additional discovery, it was determined that a few critical workloads need to maintain a less than five-minute recovery point objective. Which of the following would be the recommended method to replicate VMware virtual machines?

Show Answer Hide Answer
Correct Answer: B

The recommended method to replicate VMware virtual machines with a less than five-minute RPO is Veeam Continuous Data Protection (CDP). CDP is a feature that allows near-continuous replication of VMware virtual machines to a secondary site or cluster with minimal data loss and downtime. CDP uses VMware vSphere APIs for I/O Filtering (VAIO) to capture every write operation from the source VMs and send them to the target VMs in near real-time. CDP can achieve RPOs as low as seconds and enable fast failover and failback in case of a disaster.


Question No. 2

Upon further discussions with the database administrador, it was discovered that they would preferent their transaction log backups to exist alongside their image-level SQL application aware backups residing on object storage. How can this be accomplished?

Show Answer Hide Answer
Correct Answer: B

* Virtual machine backup jobs with log shipping enabled allow you to create image-level backups of SQL Server databases and also back up the transaction logs periodically12.

* Scale-out Backup Repository is a logical entity that groups several backup repositories into a single pool of storage, allowing for better backup performance, scalability, and management3.

* Scale-out Backup Repository capacity tier is a feature that allows you to offload older backup files to a public cloud object storage, such as Amazon S3 or Azure Blob Storage .

The other options are not as effective or efficient, as they either do not use Veeam features, do not offload to object storage, or do not create image-level backups.


Question No. 3

What information related to sizing the NAS infrastructure is missing and must be collected during the discovery? (Choose 2)

Show Answer Hide Answer
Correct Answer: B, D

The information related to sizing the NAS infrastructure that is missing and must be collected during the discovery are the size of the source data set and the recovery point objective (RPO). These information are important for designing and sizing the NAS backup jobs and repositories. For example, you can use the size of the source data set to estimate how much storage space and network bandwidth are required for backing up NAS devices. You can also use the RPO to determine how frequently you need to run NAS backup jobs and how many restore points you need to keep on the backup repositories.


Question No. 4

Based on the requirements, what should be factored into the physical design when implementing the virtual machine replication between sites?

Show Answer Hide Answer
Correct Answer: C

Based on the requirements, one of the factors that should be considered in the physical design when implementing the virtual machine replication between sites is to ensure that the proper firewall ports are open between the proxies at each site. This is because Veeam Backup & Replication uses network ports to communicate with backup infrastructure components and transfer data during replication. You need to make sure that the required ports are not blocked by firewalls or other network devices. For a list of ports used by Veeam Backup & Replication, see this article2


Question No. 5

Based on the requirements, what should be factored into the physical design when implementing backup copy jobs between sites?

Show Answer Hide Answer
Correct Answer: C

The factor that should be considered in the physical design when implementing backup copy jobs between sites is to use physical servers for the Veeam backup proxies at each site. A Veeam backup proxy is a data mover component that performs data processing and transfer tasks for backup and backup copy jobs. A physical server is preferred over a virtual server for better performance, reliability, and isolation. A physical server can also leverage hardware encryption offload to reduce CPU load and network traffic encryption to secure data in transit.