A backup administrator decided to move the Veeam Backup & Replication server and configuration database to new servers. Which configuration restore mode should be used?
Correct Answer:A
When moving the Veeam Backup & Replication server and its configuration database to new hardware or servers, the appropriate process to undertake is a configuration restore, denoted by option A: Restore. This process involves using the Veeam Backup & Replication Configuration Backup utility, which regularly backs up the configuration of the Veeam Backup & Replication server. In the event of a hardware migration or significant system change, this utility allows administrators to restore the server's configuration, including all settings, job configurations, and inventory, onto the new server setup. This ensures a seamless transition with minimal disruption to the backup operations and policies that were previously in place.
An engineer needs to back up the data on a NAS file share, located on the company’s main production site.
Which option would increase the performance of the job?
Correct Answer:A
Placing the backup proxy and cache repository on the same network as the NAS file share helps to increase the performance of the backup job due to reduced latency and higher network speeds. This configuration allows for faster communication and data transfer between the NAS and the backup components, leading to more efficient backup operations.References:
✑ Veeam Backup & Replication User Guide: Backup Proxy
✑ Veeam Best Practices: NAS Backup Performance
What does Veeam's Secure Restore functionality ensure during restores?
Correct Answer:D
Veeam's Secure Restore functionality is designed to provide an additional layer of security during the restore process, particularly to ensure that restored data is free from malware. The correct answer is D: Anti-virus scanning. Secure Restore integrates with antivirus software to scan the data being restored for malware, viruses, or other threats before it is brought back into the production environment. This capability is crucial in today's landscape, where data integrity and security are paramount, especially considering the increasing sophistication of cyber threats. By ensuring that restored data is scanned for threats, Veeam helps maintain the integrity and security of the IT environment, aligning with best practices for data protection and disaster recovery.
A request to protect some new domain controllers has been submitted in the ticketing system The engineer creates a backup job with the following steps:
* 1. Right-clicks on the Jobs navigation item on the left
* 2. Selects VMware vSphere from the menu
* 3. Enters a name for the job.
* 4. Selects workloads to protect.
* 5. Defines a job schedule.
* 6. Clicks the Finish button.
When testing restores, the engineer finds that the backups are crash-consistent. Which set of steps should the engineer use to avoid crash-consistent backups for the domain controllers?
Correct Answer:A
Application-aware processing is a feature in Veeam Backup & Replication that creates transactionally consistent backup images of VMs. For domain controllers, this feature ensures that backups are consistent with the applications running on the VM, like Active Directory services. To avoid crash-consistent backups and ensure application consistency, the engineer must enable the Application-Aware Processing option during the job configuration.References:
✑ Veeam Backup & Replication User Guide: Application-Aware Processing
✑ Veeam Best Practices: Protecting Active Directory Domain Controllers
Why is it recommended to have at least one backup proxy server in each site when defining a replica job?
Correct Answer:E
Having at least one backup proxy server in each site when defining a replica job is recommended because the backup proxy servers are responsible for data processing and transfer. Having proxies in both sites enables a stable connection for VM data transfer across sites, as they handle the data compression, deduplication, and transfer processes. This setup ensures that data is efficiently moved from one site to another, thereby making replication more resilient and reliable. Proxies do not automatically restart replication after failure (A), remove the need for VM snapshots during transit (B and F), or enable automatic WAN acceleration (D), although they can work in conjunction with WAN accelerators if configured to do so. They also don't directly deduplicate data during transit across the WAN (C), although they do compress and optimize it for transfer.