Section 12.0 Managing Disaster Recovery and Business Continuity

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

Backup as a service (BUaaS)

Get a hint
Hint

Helps small and medium-sized organizations use traditional backup services to protect data and store that data in cloud storage designed specifically for that purpose

Usually slower, have higher capacity, and are much less expensive

Get a hint
Hint

Storage as a Service (STaaS)

Get a hint
Hint

Primarily used for accessible, flexible, and cost-effective storage solutions in the cloud.

Card Sorting

1/59

Anonymous user
Anonymous user
flashcard set

Earn XP

Description and Tags

0

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

Backup as a service (BUaaS)

Helps small and medium-sized organizations use traditional backup services to protect data and store that data in cloud storage designed specifically for that purpose

Usually slower, have higher capacity, and are much less expensive

2
New cards

Storage as a Service (STaaS)

Primarily used for accessible, flexible, and cost-effective storage solutions in the cloud.

3
New cards

Full Backups

Complete backups of the system. They often take a relatively long time, especially when there is a lot of data on the server

Restoral process is relatively quick because only one backup job needs to be used

4
New cards

Synthetic Full Backups

Create a full backup by combining the latest full backup with subsequent incremental backups, instead of reading data directly from the source, resulting in faster backups and restores

5
New cards

Incremental Backups

Only copies modified data since the last backup

Quicker than differentials, but the restoral process is slower

6
New cards

Differential Backups

Backs up all data changed since the last full backup, meaning each subsequent differential backup includes all changes since that initial full backup

Backups are slower as the week progresses, but restorals are faster

7
New cards

Snapshot

Capture a system's state at a specific point in time, offering fast recovery to that stat

Usually most useful for retaining system setting

8
New cards

Archives

Retain data for long periods and are optimized for storage space efficiency

Offer long-term data retention for legal or regulatory purposes

9
New cards

System-State Backups

Duplicate the essential operating system (OS) configurations. These configurations can then be restored quickly to the same machine in case of corrupted system files or misconfigurations

Small and fast

10
New cards

Application-Level Backups

Focus on a single program, backing up essential configuration files, executables, and supporting files

11
New cards

Filesystem Backups

Protect user data

Gnerally run every 24 hours

12
New cards

Database Dumps

Gathers metadata into a series of SQL statements that can recreate a failed or corrupted database

Can back up or move database contents or extract the contents to a new location for analysis and additional research

13
New cards

3-2-1 Backup Rule

Three copies of data on two different media types and one copy stored offsite

14
New cards

Tape Media

Often have a good cost-to-capacity ratio, have excellent long-term archive ability, and are easy to move and store

15
New cards

Disk Media

Quite fast (for both backup and restore), are often easy to move and store, and are efficient for general backup use

16
New cards

Object Storage

Allows for greater scalability and cost savings

Distributes data and related metadata across storage space for efficient storage

Best for data that is written once and does not change often

17
New cards

User data

Must be backed up frequently enough to recover file versions

18
New cards

Configuration files

Must be backed up any time you make edits or configuration changes

19
New cards

System-state configurations

Server and operating system backups run when major version changes occur or major configuration changes are made

20
New cards

Data Retention

Policies cover active data stored in files, databases, and other locations

Govern how long the data must be stored (minimum time) and the maximum time data can be retained

21
New cards

Cloud backup retention policy best practices include the following:

Maintain compliance with industry regulations and legal requirements.

Be aware of and compliant with data sovereignty considerations.

Classify data to help maintain retention compliance.

Automate data deletion and backup purging to remain compliant and manage storage costs

22
New cards

Data Replication

Copying data to another server or site to retain business continuity and scalability or keep data near users

23
New cards

Asynchronous Replication

Sends data to the primary storage (a database, for example)

The client machine receives confirmation that the data was written. The data is then replicated to the second database server, which responds to the first database server with a confirmation

24
New cards

Synchronous replication

The client machine is only informed that the transaction was successful once both servers have a copy of the data

25
New cards

In transit encryption

Mitigates threats to data as it moves across the network. The network connection might be within a LAN, between LANs over a WAN, or between the on-premises LAN and the cloud service provider's data cente

26
New cards

At rest encryption

Helps protect data residing on storage media in the private or public cloud environment

27
New cards

Recoverability

The ability to successfully restore information, services, and systems from a backup

28
New cards

Backup Data Integrity

Confirms the data has not undergone any unexpected changes, such as altered information by a malicious actor or file corruption during a transfer process

Normally managed using hashing to compare the information at two different points

29
New cards

In-Place/Overwrite Restoral

You may recover data in bulk back to its original location, overwriting whatever data currently resides there

30
New cards

Side-By-Side/Parallel Restoral

Recovering the original production server without overwriting the existing data on that server

31
New cards

Granular File Restoral

Allows you to explore the contents of the Virtual Disk files of a VM backup. That way you can easily restore specific files and folders from a VM backup without having to restore and attach the entire VM

32
New cards

Alternate Location Restoral

Restores backup data to a different system or path, allowing for testing of recovery procedures without affecting the production environment

33
New cards

Snapshot Restoral

Restored and associated with a VM instance for access to the recovered data.

Offer a view of file contents at a given point in time, which may be useful for troubleshooting or recovering specific versions of file

34
New cards

Availability zones

Are one or more data centers within a region offering fast network connectivity

Located within a logical regional area but are distant enough from each other to mitigate natural or man-made threats

35
New cards

Cloud Bursting

When on-premises or private cloud resources become overwhelmed, additional resources can be brought online from the public cloud environment

Company only pays for the extra services when needed and retains on-premises control of services otherwise

36
New cards

Edge Computing

Offers increased service and availability by moving compute resources nearer the point of data generation

Data is processed more quickly, helping to ensure adequate performance and data/service availability

37
New cards

Cloud monitoring

Includes checking for service and application performance and cost-effective management

Also includes maintaining availability and receiving alerts when resources become inaccessible

38
New cards

Availability monitoring characteristics include:

Downtime alerts.

Automation capabilities to react to failures or performance issues.

Tracking uptime and downtime for service level agreement and business objective compliance.

Long-term reporting and analytics that allow for planning and reliability

39
New cards

Prometheus

Open-source monitoring tool capable of managing applications, services, and infrastructure components

40
New cards

Grafana

Open-source visualization tool that integrates with Prometheus and other monitoring platforms

41
New cards

Azure Monitor

Monitoring utility provided with Microsoft's Azure cloud service

42
New cards

Network redundancy

Ensures data availability and connectivity to services

Ensure data availability and continuous connectivity by eliminating single points of failure in the network

43
New cards

NIC Teaming

Two or more NIC aggregated into a single channel link for fault tolerance and increased throughput. Also known as NIC bonding.

44
New cards

Hardware load balancer

This network appliance distributes a workload across servers. It resides between the client computers and the servers

45
New cards

Software load balancer

This is installed directly on the servers

46
New cards

Round-robin

Assigns connections in order

47
New cards

Weighted scheduling

Used when the server's hardware capabilities vary, allocating more connections to the more powerful servers

48
New cards

Hybrid cloud

Mix of private and public cloud services

49
New cards

Multi-cloud

Mix of public cloud resources from two or more vendors, such as Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP)

50
New cards

Multi-cloud solution

Allow companies to select the best cloud provider for specific services, such as using one provider for database capabilities and another for data backups

51
New cards

Multi-cloud environments

Avoid vendor lock-in, especially with provider outages. If your company's e-commerce website is hosted by a single CSP, it will become unavailable if that provider suffers an outage

52
New cards

Multi-cloud deployments

Very complex, requiring planning, monitoring, and management.

Not all cloud service providers offer compatible solutions or encourage working with other providers

53
New cards

Service level agreements (SLAs)

Set service requirements and expectations between a consumer and a provider

54
New cards

Recovery time objectives (RTOs)

The maximum time allowed to restore a system after a failure event.

55
New cards

Recovery point objectives (RPOs)

The longest period that an organization can tolerate lost data being unrecoverable

56
New cards

Mean time to recovery (MTTR)

A metric representing average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure.

57
New cards

Mean time between failures (MTBF)

A metric for a device or component that predicts the expected time between failures.

58
New cards

Warm Sites

An alternate processing location that is dormant or performs noncritical functions under normal conditions, but which can be rapidly converted to a key operations site if needed.

59
New cards

Hot Sites

Immediately take over operations in a disaster. They have all the equipment necessary for the business, including servers, workstations, network devices, office furniture, power, and Internet connectivity.

Costly

60
New cards

Cold Sites

Contain the necessary space without essential equipment like workstations, servers, network devices, and furniture. You must migrate data to the cold site