Start learning 50% faster. Sign in now
Incremental Backup offers the best balance between minimizing storage usage and meeting a specific Recovery Point Objective (RPO). An incremental backup only saves the changes made since the last backup (whether full or incremental), reducing the amount of storage required. This strategy allows for faster backups while ensuring that data can be recovered efficiently to a recent state. While incremental backups require all previous increments for a full restore, modern backup management systems mitigate this complexity with streamlined recovery processes, providing a good trade-off between efficiency and recovery needs. Why Other Options are Incorrect: A) Full Backup: Full backups are the safest but consume the most storage and time, making them less efficient for frequent backup needs. C) Differential Backup: Differential backups save all changes since the last full backup, leading to increased storage usage over time compared to incremental backups. D) Continuous Data Protection (CDP): CDP captures every change in real-time, which is ideal for near-zero RPO but comes with significant storage and resource overhead. E) Snapshot Backup: Snapshots are useful for point-in-time recovery but do not provide as granular data recovery options as incremental backups.
In which of the following topology computers and devices are connected to a closed loop cable?
The first page of a website is termed as:
Which recently launched platform aims to empower marginalized artisans with global exposure and e-marketing?
Recently Raksha Mantri Shri Rajnath Singh gives away RM Awards for Excellence in defence & aerospace sector for the year ____?
A device that separates network segments within a single logical network is _______.
The process of trying out a new product by independent users before it is finally manufactured/ developed is known as?
...Four levels of address are used in an internet employing the TCP/IP protocols- Physical address, Logical address, Port address & Application/process...
What term describes a transaction that has executed all operations successfully and is now permanently recorded in the database system?
What does Li-Fi technology primarily use for data transmission?
Which agency is responsible for responding to cybersecurity incidents in India?