1/12 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
6/13 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 |
1. Storing backup copies of data and files at the same physical location as the original data source.
2. A backup conducted by the organization's own IT department using locally accessible resources.
3. A type of backup that captures and stores only the modifications made to data since the previous complete backup, resulting in faster execution and lower storage requirements.
4. A storage medium that employs magnetic tape for backing up data, commonly used to store vast amounts of information at a low cost for extended periods.
5. The process of ensuring that backups can be restored successfully and that the data restored is accurate and complete.
6. The process of verifying the integrity and completeness of backup data to ensure its reliability for restoration purposes.
7. A backup process that records the entire state of a virtual machine, including its data, configuration settings, and system state.
8. The complete reinstatement of a system, encompassing the operating system, applications, and user data, starting from the beginning.
9. A computer server located at a different physical location than the user, accessible via a network or the internet.
10. The process that involves restoring data and systems to a functional state following a catastrophic event, such as a natural disaster or cyber attack.
11. The process of backing up data to a remote server or cloud-based storage over the internet.
12. The process of backing up data to physical storage devices that are disconnected from the network.
13. The duration for which backups are stored, generally determined by regulatory demands and guidelines set by the organization.
14. An external service provider performs a backup that is not done in-house. This backup option can be more affordable and offer extra features, like automatic backups.
15. The storage of data on remote servers accessed through the internet, offering flexible and scalable storage solutions.
16. The process of applying encryption to backup files is implemented with the purpose of safeguarding them from unauthorized access and theft.