Key Concepts 7.10 and 7.11 Implement recovery strategies/Implement disaster recovery processes Flashcards
Domain 7 (36 cards)
- Scope and requirements. Identifying critical data and systems that require backup
protection, which will influence the backup solutions selected. - Backup methodology. Selecting appropriate backup methods (e.g., full, incremental,
differential) based on recovery time objectives (RTO) and recovery point objectives (RPO). - Storage media. Implementing secure and redundant backup storage solutions (e.g., disk,
tape, cloud). - Periodic testing. Testing backup integrity and recoverability regularly to ensure effectiveness.
- Security. Encrypting backup data to protect against unauthorized access or disclosure.
Key Considerations for Backup Storage Strategies
is a backup strategy that automatically transfers data in bulk to an offsite
storage facility over a network connection, typically used for critical data that needs frequent
backups and provides quick recovery in case of data loss. Due to the quantity of data, data
may not be immediately available for recovery
Electronic vaulting
continuously records changes made to data in real-time and transmits these changes to a remote backup site, allowing for point-in-time recovery and maintaining
an up-to-date copy of data offsite.
Remote journaling
creates an exact copy of data at a remote location, either synchronously (in
real-time) or asynchronously (with a slight delay), providing a fully functional duplicate of the
primary system ideal for disaster recovery and high availability needs.
Remote mirroring
- A backup copies all selected files and data from your system.
- Frequency: Typically done less frequently due to size and time.
- Restore: Restoring data requires only the most recent full backup.
Full Backup
- Backs up only the data that has changed since the last backup, whether it was a full
or another incremental backup. - Frequency: Can be done more frequently because it’s smaller in size.
- Restore: Requires the most recent full backup plus all subsequent
backups to restore data fully.
Incremental Backup
Backs up all data that has changed since the last full backup.
* Frequency: More frequent than full but less than incremental in terms of data size
growth.
* Restore: Needs only the most recent full backup and the latest backup to
restore data, simplifying the restore process compared to incremental
Differential Backup
is essentially just data center space, power, and network
connectivity that’s ready and waiting for whenever you might need it. It’s essentially a
standby facility with no preinstalled hardware or software.
TO RECOVER: If disaster strikes, your engineering and logistical support teams can
readily help you move your hardware into the data center and get you back up and
running.
Cold Site
allows you to pre-install your hardware and pre-configure
your bandwidth needs. TO RECOVER: If disaster strikes, all you have to do is load your software and data to restore your business systems.
Warm Site
allows you to keep servers and a live backup site up and
running in the event of a disaster. You replicate your production environment in that data
center. TO RECOVER: This allows for an immediate cutover in case of disaster at your primary site. A hot site is a must for mission critical sites.
Hot Site
is a company that leases computer time. Own large server farms and often fields of workstations.
service bureau
sometimes called reciprocal agreements, provide
an inexpensive alternative to disaster recovery sites. It poses a risk to organizations
participating, as multiple organizations may also be shut down by the same disaster.
It raises confidentiality concerns. They are also considered difficult to enforce. For all these reasons, they are relatively uncommon.
Mutual assistance agreements (MAAs)
is any component that, if it fails, will cause the entire
system to fail. Identifying and eliminating it is crucial for improving availability
Single Point of Failure (SPOF)
This refers to a system’s ability to maintain acceptable performance levels during and after disruptions. It involves designing systems to adapt to changing conditions
and recover quickly from failures.
System Resilience
This refers to a system’s ability to continuously operate without experiencing
significant downtime. It’s achieved through redundancy and fault tolerance, ensuring that if
one component fails, another can take over seamlessly. This often involves redundancy and
rapid failover mechanisms.
High Availability
system continues to operate correctly even when one or more
of its components fail. This typically involves redundancy and the ability to detect and isolate
faults.
Fault Tolerance
Improves read/write performance through disk striping, but doesn’t offer redundancy.
RAID 0
Provides redundancy through disk mirroring.
RAID 1
Offers better storage efficiency with distributed parity.
RAID 5
Combines mirroring (RAID 1) and striping (RAID 0) for both performance and
redundancy.
RAID 10
Multiple servers work together as a single system. Clustering is a strategy commonly used with database servers
Clustering
Distributes workloads across multiple servers. It is
commonly used with web servers (HTTPS), but generally support other protocols
Load Balancing
involves creating alternate paths for network traffic, often using redundant
switches, routers, and connections. Two sources of internet connectivity for a facility,
entering the site at opposite ends of the facility, will reduce odds that both are impacted by a
single event.
Network Redundancy