What type of data protection method is this called’?

A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.

What type of data protection method is this called’?
A . Agent-based
B. Backup as a service
C. Local replication
D. Image-based

Answer: D

Explanation:

This is an example of an image-based data protection method. With image-based data protection, a proxy server regularly takes Point-in-Time (PIT) snapshots of the virtual machine (VM) that is being protected. These snapshots are then stored in a secure location, allowing the user to quickly restore access to the VM in the event of a hardware failure. This type of data protection is effective for preserving the state of the VM, as well as any data stored on it, making it a reliable and secure way to protect data.

Latest DEA-1TT5 Dumps Valid Version with 122 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments