A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.
What type of data protection method is this called’?
A . Agent-based
B. Backup as a service
C. Local replication
D. Image-based
Answer: D
Explanation:
This is an example of an image-based data protection method. With image-based data protection, a proxy server regularly takes Point-in-Time (PIT) snapshots of the virtual machine (VM) that is being protected. These snapshots are then stored in a secure location, allowing the user to quickly restore access to the VM in the event of a hardware failure. This type of data protection is effective for preserving the state of the VM, as well as any data stored on it, making it a reliable and secure way to protect data.
Latest DEA-1TT5 Dumps Valid Version with 122 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund