Retention+RecoveryVsDisaster+Agent+Encryption+Virtualization+ServerVsVm

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

What is Recovery & When is it used?

It means getting back a lost or damaged file, folder, or system. Used Small-issues like Software crash, Accidental file deletion.

2
New cards

Example of Recovery

You delete a file by mistake and restore it from yesterday’s backup — that’s recovery.

3
New cards

What is Disaster Recovery & When is it used?

It means bringing back full IT systems after a big problem. Used in cases like fire, flood, power crashes or hacking.

4
New cards

Example of Disaster Recovery

Imagine your office servers are physically destroyed in a fire. Still You recover everything using cloud backup — that’s disaster recovery.

5
New cards

Recovery vs Disaster Recovery - Scope & Frequency & Goal

Recovery fixes small things by restoring particular files & folders and happens often. Disaster Recovery handles full system failures & rebuilds everything to keep the business running. and happens very rare.

6
New cards

What is Agent-Based Backup?

Backup Tools that uses small software or agent which are already installed inside the system to collect files and send backups to local, network or cloud storages.

7
New cards

How does Agent-Based Backup work?

So Basically it’s a kind of approach where the user installs lightweight software on each virtual machine (VM) they want to protect and perform backups.

8
New cards

Agent-Based Backup Like ?

Like placing a security guard inside each room who watches and reports everything to the control room.

9
New cards

What is Agentless Backup?

Backup Tools that doesn’t require any preinstalled software or agent inside the system. Instead they connect remotely to pull data for backup

10
New cards

How does Agentless Backup work?

It connects from outside and uses built-in tools like file-sharing, remote access, or backup settings to collect and save data.

11
New cards

Agentless Backup Like ?

Like flying a drone outside a building to watch through windows and record — without entering inside the building

12
New cards

When to use Agentless vs Agent-Based Backup?

Agentless is best for virtual/cloud servers where setup needs to be fast and lightweight.

Agent-Based is best for physical systems or where deep app-level control is needed.

13
New cards

What is Backup Encryption?

It means protecting your backup data by locking it with a password or secret key.

Even if someone tries to steal the backup, they can’t read it without the key.

It’s like putting your backup in a locked suitcase. Even if someone takes the suitcase, they can’t open it without the key.

14
New cards

Why is Backup Encryption important ?

Backup is Important due to 2 to 3 major reasons starting with

(Data Protection)
Even if your backup is stolen (like from a lost USB)
The data stays safe as a key is required to unlock the data.

(Protects sensitive info)

For businesses, backups may contain personal, medical, or financial data — because of which encryption is necessary to keep it confidential.

(Safe cloud storage)
Cloud backups without encryption are easy targets for hackers — encryption adds a strong protection layer.

15
New cards

Why is Backup Encryption important

16
New cards

Why is Backup Encryption important (

17
New cards

Real-life example of Backup Encryption

Your company backs up customer data to Google Cloud.

Without encryption = hacker can read the files.

With encryption = the files are just random code which requires a secret key for unlocking it.

18
New cards

What is Virtualization?

Virtualization is a technology that allows you to run multiple virtual machines (VMs) on a single physical machine. Each VM acts like a real computer with its own OS, CPU, RAM, and storage, but all share the physical server's hardware.

19
New cards

Real-world Example of Virtualization

Imagine one big server in your office. Using virtualization, you divide it into multiple small computers (VMs): one for email, one for web hosting, one for databases, and one for backup. Each VM does a separate job on the same hardware.

20
New cards

Why Do We Use Virtualization? - Cost Saving

You don't need to buy separate physical machines for each service. Instead you save money by running multiple services on one server.

21
New cards

Why Do We Use Virtualization? - Better Resource Utilization

Resources are not wasted like in underutilized physical machines. Instead we can use CPU, RAM, and storage more efficiently through Virtualization.

22
New cards

Why Do We Use Virtualization? - Easier Management

You can create, delete, or move VMs easily without touching the physical hardware.

23
New cards

Why Do We Use Virtualization? - High Availability & Backup

VMs are easier to back up, clone, and restore quickly compared to physical systems.

24
New cards

Key Component: Hypervisor

The hypervisor is software that creates and manages VMs. on one physical computer.

It shares CPU, memory, storage between the physical machine and virtual machine.

25
New cards

Key Component: Virtual Machine (VM)

A virtual machine is a software-based computer that runs on the hypervisor and behaves like a real computer.

26
New cards

Type 1 Hypervisor (Bare Metal)

Installed directly on the physical server. Examples: VMware ESXi, Microsoft Hyper-V. Offers better performance and is used in data centers.

27
New cards

Type 2 Hypervisor (Hosted)

Installed like an application on top of a host OS (like Windows/Linux). Examples: Oracle VirtualBox, VMware Workstation. Used mostly for testing or learning.

28
New cards

What is a Physical Server?

A physical server is a real, tangible computer (hardware) located in a data center or server room. It runs one operating system directly on powerful hardware components like CPU, RAM, and storage.

29
New cards

Real-World Example of a Physical Server

Imagine a single powerful computer in a company that runs different services like websites, file storage, and databases.

This computer is the physical server.

30
New cards

What is a Virtual Machine (VM)?

A virtual machine is a software-based computer that runs inside a physical server using virtualization. It behaves like a real computer with its own OS, CPU, RAM, and storage.

31
New cards

Simple Example of a VM

Think of the physical server as a building. Each VM is a separate apartment with its own furniture (OS and apps) but shares the same building and resources.

32
New cards

What is Backup Retention?

Backup Retention is the policy that defines how long backup data is stored before it is deleted or overwritten. Simple Example: It’s like deciding how long to keep photos in your phone—1 month, 1 year, or forever.

33
New cards

Why is Retention Important in Backup?

Retention is important because it ensures old backups are available when needed. It protects against data loss, meets basic legal requirements as per Industry Standard, manages storage space, and allows recovery from ransomware attacks.

34
New cards

How does Backup Retention help with Data Loss Protection?

Retention keeps old backups so if something is accidentally deleted or if a system fails, you can restore the data from an earlier saved point. Simple Example: If you saved a backup on July 1st and your system crashes on July 2nd , you can recover the July 1st backup because of retention.

35
New cards

How does Backup Retention help with Compliance?

Some industries have legal rules requiring companies to keep backups for a certain period. Simple Example: A hospital may need to keep patient data backups for 5 years to follow healthcare data retention laws.

36
New cards

How does Backup Retention manage Storage Space?

Retention policies automatically delete old backups after a set time to save storage space. Simple Example: If you set daily backups for 7 days, backups older than 7 days get deleted automatically.

37
New cards

How does Backup Retention help during Ransomware Attacks?

Retention allows you to restore data from a time before the ransomware attack happened. Simple Example: You took a backup on July 19th and on July 20th an attacker Corrupts your files, you can still bring those files back from July 19th backup.

38
New cards

Real-World Example of Backup Retention Policy

Imagine you’re an IT Admin: You set daily backups of company data and configure a 30-day retention policy. Each day’s backup is kept for 30 days. After 30 days, the oldest backups are automatically deleted.