Veeam Financial Services performed a proof of concept of the design outlined in the architecture. Backups completed successfully, but it was determined that the offloading of data to public cloud storage is consuming all available bandwidth on several branch sites and business applications are lacking performance as a result. What adjustments within the Veeam Infrastructure would best address this issue?
Answer : A
Network traffic rules are settings that allow you to control the network traffic transferred between backup infrastructure components, such as backup proxies, repositories, and WAN accelerators.You can use network traffic rules to throttle or encrypt the network traffic, or to specify preferred networks for data transfer1.
By configuring network traffic rules, you can reduce the bandwidth consumption for the offloading of data to public cloud storage, and avoid affecting the performance of business applications on the branch sites.You can set limits for the network traffic speed, or schedule the offloading tasks to run during off-peak hours2.You can also select the optimal network routes for the offloading tasks, and avoid congested or slow networks3.
You can find more information about network traffic rules and how to configure them in the following resources:
Configuring Network Traffic Rules
Enabling Traffic Throttling
Specifying Preferred Networks
You are examining the requirement: ''If possible, the data written must be unchangeable to prevent ransomware attacks.'' Which types of jobs do not support using immutability from S3 Object Lock or hardened repositories? (Choose two)
Answer : A, D
The types of jobs that do not support using immutability from S3 Object Lock or hardened repositories are NAS backups and Agent for Mac backups. These types of jobs do not have the option to enable immutability in their settings, unlike VMware, Hyper-V, Linux Agent, or Windows Agent backup jobs. Therefore, they cannot leverage the immutability feature of S3 Object Lock or hardened repositories to protect their backups from ransomware or malicious deletion.
What can be done to validate that the design meets target SLAs and does not exceed repository growth protections?
Answer : A
The method that can be used to validate that the design meets target SLAs and does not exceed repository growth projections is to ensure job throughput matches extensions and cross-compare with available network throughput, disk speed and initial sizing calculations. Job throughput is the measure of how much data is processed and transferred by a backup job per unit of time. Job throughput can be affected by various factors such as network bandwidth, disk performance, compression, deduplication, encryption, etc. By ensuring job throughput matches extensions, you can verify that your backup jobs are running as expected and meeting the SLAs. By cross-comparing job throughput with available network throughput, disk speed and initial sizing calculations, you can identify any bottlenecks or discrepancies that might affect your backup performance or storage consumption.
While reviewing the technical requirements for gold tier backups requiring periodic backups every hour, you determine this goes against one of the other requirements and you need to get clarification on which on has priority. Which of the following does the recovery point objective requirement directly conflict with?
Answer : A
The recovery point objective (RPO) requirement of periodic backups every hour for gold tier virtual machines directly conflicts with the technical requirement of all backups must complete within the hours of 5 p.m. to 8 a.m. local time. This is because these two requirements are mutually exclusive, as hourly backups would need to run during the daytime as well as the nighttime, while the backup window only allows backups to run during the nighttime. Therefore, you need to get clarification from the customer on which requirement has priority and how to adjust the other one accordingly.
examining the list of requirements, you notice that it is necessary to have backups encrypted. If you use Veeam's native encryption, which repository type will be the most impacted?
Answer : A
The repository type that will be most impacted by using Veeam's native encryption is dedupe repositories. Dedupe repositories are backup repositories that use deduplication appliances or software to reduce backup size and optimize storage utilization. However, if you use Veeam's native encryption for backup jobs that target dedupe repositories, you will lose most of the deduplication benefits, as encrypted data blocks cannot be deduplicated effectively. Therefore, it is recommended to use either the encryption feature of the deduplication device or software, or avoid encryption altogether for dedupe repositories.
Veeam University Hospital is considering using Veeam ONE to collect alarms from the virtual and backup infrastructure. What option is available for integrating the solution with ticketing systems?
Answer : A
Veeam University Hospital is considering using Veeam ONE to collect alarms from the virtual and backup infrastructure. Veeam ONE is a powerful monitoring and reporting tool that provides visibility and insight into the performance, configuration, and utilization of your backup and virtual infrastructure. Veeam ONE can also alert you about any issues or problems that may affect the availability or reliability of your data protection and recovery processes.
One of the options that is available for integrating Veeam ONE with ticketing systems is A. Configure Veeam ONE to send SNMP traps to the ticketing system.
This option means that:
* SNMP (Simple Network Management Protocol) is a protocol that allows network devices to communicate and exchange information with each other.
* SNMP traps are messages that are sent by network devices to notify a management system about events or conditions that require attention or action.
* Veeam ONE can be configured to send SNMP traps to a ticketing system when an alarm is triggered or resolved. This allows you to automate the creation and update of tickets based on the alarm data, such as the alarm name, severity, status, description, etc.
* To configure Veeam ONE to send SNMP traps to a ticketing system, you need to enable SNMP notifications in the Veeam ONE settings, as well as specify the SNMP server address, port, community string, and trap format. You also need to configure the ticketing system to receive and process the SNMP traps from Veeam ONE.
This option is a good choice for integrating Veeam ONE with ticketing systems, as it allows you to leverage the benefits and features of both solutions, such as:
* You can use Veeam ONE to monitor and analyze your backup and virtual infrastructure, as well as to detect and alert you about any issues or problems that may affect your data protection and recovery processes.
* You can use the ticketing system to manage and track the resolution of the issues or problems that are reported by Veeam ONE, as well as to assign and prioritize tickets to the appropriate staff or team members.
To demonstrate SLA compliance during audits and protection against exposure to personally identifiable information, which configuration would verify this is possible in the event of exposure?
Answer : C
The configuration that would verify the SLA compliance during audits and protection against exposure to personally identifiable information in the event of exposure is to create a virtual lab environment and periodically perform staged restores with custom scripts. A virtual lab is an isolated environment where you can run your backups or replicas without affecting the production environment. A staged restore is a process that allows you to run custom scripts on the restored data before publishing it to the production environment. By using these features, you can demonstrate that your backups are recoverable and compliant with legal regulations, as well as remove or mask any sensitive data before restoring it.