1 | 14 | 16 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 |
1. The process that involves restoring data and systems to a functional state following a catastrophic event, such as a natural disaster or cyber attack.
2. A storage medium that employs magnetic tape for backing up data, commonly used to store vast amounts of information at a low cost for extended periods.
3. The duplication of data in different physical or logical locations to ensure its availability in case of data loss or system failures.
4. Storing backup copies of data and files at the same physical location as the original data source.
5. The regularity of performing backups is determined by factors such as the quantity and importance of the data being backed up.
6. The process of verifying the integrity and completeness of backup data to ensure its reliability for restoration purposes.
7. The duration for which backups are stored, generally determined by regulatory demands and guidelines set by the organization.
8. The process of ensuring that backups can be restored successfully and that the data restored is accurate and complete.
9. A backup stored away from the original data to shield against physical harm to the original data.
10. "A backup method that utilizes storage in the cloud as its location, offering advantages such as adaptability, expandability, and economical efficiency."
11. Backup copies of data and files at a remote location, separate from the original data source.
12. The complete reinstatement of a system, encompassing the operating system, applications, and user data, starting from the beginning.
13. A type of backup that captures and stores only the modifications made to data since the previous complete backup, resulting in faster execution and lower storage requirements.
14. A backup conducted by the organization's own IT department using locally accessible resources.
15. The process of applying encryption to backup files is implemented with the purpose of safeguarding them from unauthorized access and theft.
16. A computer server located at a different physical location than the user, accessible via a network or the internet.
17. The process of reducing the size of backup files by removing redundant data and compressing the remaining data.