00:00

QUESTION 26

What feature is only available with the Veeam Agent for Linux?

Correct Answer: C
The feature that is unique to Veeam Agent for Linux and not available in other Veeam Agent configurations is C: Backup from native snapshots. Veeam Agent for Linux includes the ability to leverage native snapshot capabilities of the Linux kernel, such as LVM (Logical Volume Manager) snapshots or Btrfs subvolume snapshots, to create consistent point-in-time copies of data. This capability allows for application-consistent backups even in complex Linux environments, ensuring that data is captured in a consistent state without the need for custom scripting or downtime. Native snapshot support in Veeam Agent for Linux enhances the flexibility and reliability of backups, particularly in environments where Linux-based applications and databases are critical to business operations.

QUESTION 27

A company has an application on a VMware VM that stores customer photos. Customers may request their photos be removed at any time. The server needs to be restored from last week's backup. What Veeam restore process allows for custom scripting to be run to automatically remove any required photos before the server is returned to production?

Correct Answer: C
The Veeam restore process that allows for custom scripting to be run before returning a server to production is Staged Restore. This feature enables administrators to perform necessary operations, like running a script to remove customer photos, during the restore process before the VM is brought back online.References: Veeam Backup & Replication User Guide, Veeam Staged Restore Guide

QUESTION 28

What happens if there are more than five unsuccessful attempts to enter the confirmation code during MFA login?

Correct Answer: B
In Veeam Backup & Replication, if there are multiple unsuccessful attempts to enter a confirmation code for Multi-Factor Authentication (MFA), the system will lock the user account to prevent unauthorized access. Based on standard security practices, and while it may vary, a lockout for 24 hours after exceeding the maximum number of failed attempts is a common approach to protect against brute force attacks. Please note that specific lockout policies can vary by system configuration and the policies set by the system administrator. It's always best to consult the actual system settings or documentation for the precise behavior in a given environment.

QUESTION 29

In the war against ransomware, a company decided to implement tape backup. The infrastructure contains Hyper-V VMs. What is the correct approach to getting all servers onto tape?

Correct Answer: D
The correct approach for backing up Hyper-V VMs to tape in a ransomware protection strategy is to create media pools first and then configure backup to tape jobs. This method ensures organized and efficient tape management while securing VM backups on tape media.References: Veeam Backup & Replication User Guide, Veeam Tape Backup Configuration Guide

QUESTION 30

A company’s infrastructure includes a Fibre Channel SAN where the VMware VMs are located. The administrator wants to create a backup that minimizes the impact on the production environment. What proxy transport mode should be used?

Correct Answer: C
For a VMware environment on a Fibre Channel SAN, the most efficient proxy transport mode to minimize impact on the production environment is Direct Storage Access. This mode allows the backup proxy to directly interact with the SAN, bypassing the production network and reducing load on the ESXi hosts.References: Veeam Backup & Replication Best Practices, Veeam VMware Backup Proxy Guide