Which of the following backup technique is most space efficient?
a) Full backup
b) Incremental backup
c) Differential backup
d) All of the mentioned

1 Answer

Answer :

Incremental backup

Related questions

Description : Which of the following backup technique is most space efficient? a) Full backup b) Incremental backup c) Differential backup d) All of the mentioned

Last Answer : Incremental backup

Description : Which of the following was one of the top 5 cloud applications in 2010? a) Cloud backup b) Web applications c) Business applications d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned

Last Answer : All of the mentioned

Description : To decide on a backup strategy for your organization, which of the following should you consider? a) RPO (Recovery Point Objective) b) RTO (Recovery Time Objective) c) Both RPO & RTO d) None of the mentioned

Last Answer : Both RPO & RTO

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned

Last Answer : All of the mentioned

Description : The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is Backup software? a) Amanda b) Bacula c) IBM Tivoli Storage Manager d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following statements are true? a) Data can be recovered fastest in online backup b) Tape library is an example of nearline storage c) Data recovery can take hours for offline backup d) All of the mentioned

Last Answer : All of the mentioned

Description : Backup of the source data can be created a) On the same device b) On another device c) At some other location d) All of the mentioned

Last Answer : All of the mentioned

Description : 1. The purpose of backup is: a) To restore a computer to an operational state following a disaster b) To restore small numbers of files after they have been accidentally deleted c) To restore one among many version of the same file for multiple backup environment d) All of the mentioned

Last Answer : All of the mentioned

Description : To decide on a backup strategy for your organization, which of the following should you consider? a) RPO (Recovery Point Objective) b) RTO (Recovery Time Objective) c) Both RPO & RTO d) None of the mentioned

Last Answer : Both RPO & RTO

Description : Which amongst the following is not an advantage of Distributed systems? a) Resource sharing b) Incremental growth c) Reliability d) None of the above

Last Answer : Reliability

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Variable cost is also known as (a) Incremental cost ; (b) Marginal cost ; (c) Differential cost ; (d) All the three

Last Answer :  (d) All the three

Description : Point out the wrong statement. a) TCO must account for the real costs of items, but frequently they do not b) A system consumes resources such as space in a datacenter or portion of ... management c) Microsoft maintains an economics page for its Windows Azure Platform d) None of the mentioned

Last Answer : None of the mentioned

Description : _________ allows different operating systems to run in their own memory space. a) VGM b) VMc c) VMM d) All of the mentioned

Last Answer : VMM

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Which of the following is an online backup and storage system? a) Amazon Elastic Compute Cloud b) Amazon Simple Queue Service c) Amazon Simple Notification Service d) Amazon Simple Storage System

Last Answer : Amazon Simple Storage System

Description : Which of the following is false? a) The more important the data, the greater the need for backing it up b) A backup is as useful as its associated restore strategy c) Storing the ... near to its original site is best strategy d) Automated backup and scheduling is preferred over manual operations

Last Answer : Storing the backup copy near to its original site is best strategy

Description : Differentiate between full backup and differential backup. -Technology

Last Answer : Differences between the full backup and differential backup are as follows:Full backupDifferential backupA complete backup of everythingthat you want to back up.The backup software looks at which fileshave changed ... since you onlyneed one set of backup data.Faster to create than a full backup.

Description : Which of the following are benefit of IaaS? A. Flexible and efficient renting of computer hardware. B. Portability, interoperability with legacy applications. C. Full control of the computing resources through administrative access to VMs. D. All of the above

Last Answer : All of the above

Description : In , the coordinates are mentioned in the program with respect to onePrevious point. a.Incremental System b.Absolute System c.Datum System d.Screen Coordinates System

Last Answer : a.Incremental System

Description : In , the coordinates are mentioned in the program with respect to onereference point a.Incremental System b.Absolute System c.Datum System d.Screen Coordinates System

Last Answer : b.Absolute System

Description : What among the following constitutes to the incremental formulation of CSP? a) Path cost b) Goal cost c) Successor function d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of servicec) ... replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : An operating system running on a Type ______ VM is full virtualization. a) 1 b) 2 c) 3 d) All of the mentioned

Last Answer : 1

Description : Point out the wrong statement. a) Platforms represent nearly the full cloud software stack b) A platform in the cloud is a software layer that is used to create higher levels of service c) ... come replete with tools and utilities to aid in application design and deployment d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned

Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service

Description : In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware. a) paravirtualization b) full virtualization c) emulation d) none of the mentioned

Last Answer : full virtualization

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : In _______ the virtual machine simulates hardware, so it can be independent of the underlying system hardware. a) paravirtualization b) full virtualization c) emulation d) none of the mentioned

Last Answer : emulation

Description : Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V? a) paravirtualization b) full virtualization c) emulation d) none of the mentioned

Last Answer : paravirtualization

Description : An operating system running on a Type ______ VM is full virtualization. a) 1 b) 2 c) 3 d) All of the mentioned

Last Answer : 1

Description : _____________ is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). A. Virtualization B. Service-Oriented Architecture C. Grid Computing D. Utility Computing

Last Answer : Virtualization

Description : The management model that facilitates effective and efficient security management and operations in the cloud environment so that an enterprise’s business targets are achieved is a) Cloud security b) Trust model c) Security model d) Cloud security governance

Last Answer : Cloud security governance

Description : Which is not a benefit of virtualization? a) Flexible and efficient allocation of resources b) Lowers the cost of IT infrastructure c) Remote access and rapid scalability d) Run on single operating system

Last Answer : Run on single operating system

Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned

Last Answer : C. Elastic application

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ) Rackserve PCI

Description : Which of the following can be used for the banking industry? a) athenahealth b) bankserve c) bankingsol d) all of the mentioned

Last Answer : bankserve

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party