ExamGecko
Question list
Search
Search

Question 188 - D-ISM-FN-23 discussion

Report
Export

A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.

What type of data protection method is this called'?

A.
Agent-based
Answers
A.
Agent-based
B.
Backup as a service
Answers
B.
Backup as a service
C.
Local replication
Answers
C.
Local replication
D.
Image-based
Answers
D.
Image-based
Suggested answer: D

Explanation:

This is an example of an image-based data protection method. With image-based data protection, a proxy server regularly takes Point-in-Time (PIT) snapshots of the virtual machine (VM) that is being protected. These snapshots are then stored in a secure location, allowing the user to quickly restore access to the VM in the event of a hardware failure. This type of data protection is effective for preserving the state of the VM, as well as any data stored on it, making it a reliable and secure way to protect data.

asked 16/09/2024
Donna Brown
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first