Which method for creating linux volumes is similar to using dynamic disks in windows?

Acronis Active Restore

The Acronis proprietary technology that brings a system online immediately after the system recovery is started. The system boots from the backup and the machine becomes operational and ready to provide necessary services. The data required to serve incoming requests is recovered with the highest priority; everything else is recovered in the background. Limitations:

  • the backup must be located on the local drive (any device available through the BIOS except for network boot)
  • does not work with Linux images
  • GPT disks and the UEFI boot mode are not supported.
Acronis Plug-in for WinPE

A modification of Acronis Backup Agent for Windows that can run in the preinstallation environment. The plug-in can be added to a WinPE image using Bootable Media Builder. The resulting bootable media can be used to boot any PC-compatible machine and perform, with certain limitations, most of the direct management operations without the help of an operating system. Operations can be configured and controlled either locally through the GUI or remotely using the console.

Acronis Secure Zone

A secure volume for storing backup archives within a managed machine. Advantages:

  • enables recovery of a disk to the same disk where the disk's backup resides
  • offers a cost-effective and handy method for protecting data from software malfunction, virus attack, operator error
  • eliminates the need for a separate media or network connection to back up or recover the data. This is especially useful for mobile users
  • can serve as the primary location from which backups are replicated further.

Limitation: Acronis Secure Zone cannot be organized on a dynamic disk.

Acronis Secure Zone is considered as a personal vault.

Acronis Startup Recovery Manager (ASRM)

A modification of the bootable agent, residing on the system disk and configured to start at boot time when F11 is pressed. Acronis Startup Recovery Manager eliminates the need for rescue media or network connection to start the bootable rescue utility.

Acronis Startup Recovery Manager is especially useful for mobile users. If a failure occurs, the user reboots the machine, hits F11 on prompt "Press F11 for Acronis Startup Recovery Manager…" and performs data recovery in the same way as with ordinary bootable media.

Limitation: requires re-activation of loaders other than Windows loaders and GRUB.

Activity

An action performed by Acronis Backup for achievement of some user goal. Examples: backing up, recovery, exporting a backup, cataloging a vault. An activity may be initiated by a user or by the software itself. Execution of a task always causes one or more activities.

Agent (Acronis Backup Agent)

An application that performs data backup and recovery and enables other management operations on the machine, such as task management and operations with hard disks.

The type of data that can be backed up depends on the agent type. Acronis Backup includes the agents for backing up disks and files and the agents for backing up virtual machines residing on virtualization servers.

Archive

See Backup archive.

Backup

A backup is the result of a single backup operation. Physically, it is a file or a tape record that contains a copy of the backed-up data as of a specific date and time. Backup files created by Acronis Backup have a TIB extension. The TIB files which are the result of a backup export or consolidation are also called backups.

Backup archive (Archive)

A set of backups created and managed by a backup plan. An archive can contain multiple full backups as well as incremental and differential backups. Backups belonging to the same archive are always stored in the same location. If the backup plan includes replication or moving of backups to multiple locations, the backups in each location form a separate archive.

Backup operation

An operation that creates a copy of the data that exists on a machine's hard disk for the purpose of recovering or reverting the data to a specified date and time.

Backup options

Configuration parameters of a backup operation, such as pre/post backup commands, maximum network bandwidth allotted for the backup stream or data compression level. Backup options are a part of a backup plan.

Backup plan (Plan)

A set of rules that specify how the given data will be protected on a given machine. A backup plan specifies:

  • what data to back up
  • the backup archive name and location
  • the backup scheme. This includes the backup schedule and [optionally] the retention rules
  • [optionally] additional operations to perform with the backups (replication, validation, conversion to a virtual machine)
  • the backup options.

For example, a backup plan can contain the following information:

  • back up volume C: (this is the data the plan will protect)
  • name the archive MySystemVolume and place it in \\server\backups\ (this is the backup archive name and location)
  • perform a full backup monthly on the last day of the month at 10:00AM and an incremental backup on Sundays at 10:00PM. Delete backups that are older than 3 months (this is a backup scheme)
  • validate the last backup immediately after its creation (this is a validation rule)
  • protect the archive with a password (this is an option).

Physically, a backup plan is a bundle of tasks executed on a managed machine.

A backup plan can be created directly on the machine, imported from another machine (local plan) or propagated to the machine from the management server (centralized plan).

Backup scheme

A part of the backup plan that includes the backup schedule and [optionally] the retention rules and the cleanup schedule. For example, perform a full backup monthly on the last day of the month at 10:00AM and an incremental backup on Sundays at 10:00PM. Delete backups that are older than 3 months. Check for such backups every time the backup operation is completed.

Acronis Backup provides the ability to use well-known optimized backup schemes such as GFS and Tower of Hanoi, to create a custom backup scheme or to back up data once.

Bootable agent

A bootable rescue utility that includes most of the functionality of the Acronis Backup Agent. Bootable agent is based on Linux kernel. A machine can be booted into a bootable agent using either bootable media or Acronis PXE Server. Operations can be configured and controlled either locally through the GUI or remotely using the console.

Bootable media

A physical media (CD, DVD, USB flash drive or other media supported by a machine as a boot device) that contains the bootable agent or Windows Preinstallation Environment (WinPE) with the Acronis Plug-in for WinPE. A machine can also be booted into the above environments using the network boot from Acronis PXE Server or Windows Deployment Service (WDS). These servers with uploaded bootable components can also be thought of as a kind of bootable media.

Bootable media is most often used to:

  • recover an operating system that cannot start
  • access and back up the data that has survived in a corrupted system
  • deploy an operating system on bare metal
  • create basic or dynamic volumes on bare metal
  • back up sector-by-sector a disk that has an unsupported file system
  • back up offline any data that cannot be backed up online because of restricted access, being permanently locked by the running applications or for any other reason.
Built-in group

A group of machines permanently located on a management server.

Built-in groups cannot be deleted, moved to other groups or manually modified. Custom groups cannot be created within built-in groups. There is no way to remove a machine from the built-in group except by removing the machine from the management server.

Cataloging

Cataloging a backup adds the contents of the backup to the data catalog. Backups are cataloged automatically as soon as they are created. Backups stored on a storage node are cataloged by the node. Backups stored anywhere else are cataloged by the agent. In the backup options, a user can choose between full and fast cataloging. Full cataloging can also be started manually.

Centralized backup plan

A backup plan that is deployed to a managed machine from the management server. Such plan can be modified only by editing the original backup plan on the management server.

Centralized management

Management of the Acronis Backup infrastructure through a central management unit known as Acronis Backup Management Server. The centralized management operations include:

  • creating centralized backup plans for the registered machines and groups of machines
  • creating and managing static and dynamic groups of machines
  • managing the tasks existing on the machines
  • creating and managing centralized vaults for storing archives
  • managing storage nodes
  • monitoring activities of the Acronis Backup components, creating reports, viewing the centralized log and more.
Centralized task

A task propagated to a machine from the management server. Such task can be modified only by editing the original task or centralized backup plan on the management server.

Centralized vault

A networked location allotted by the management server administrator to serve as storage for the backup archives. A centralized vault can be managed by a storage node or be unmanaged. The total number and size of archives stored in a centralized vault are limited by the storage size only.

As soon as the management server administrator creates a centralized vault, the vault name and path to the vault are distributed to all machines registered on the server. The shortcut to the vault appears on the machines in the Vaults list. Any backup plan existing on the machines, including local plans, can use the centralized vault.

On a machine that is not registered on the management server, a user having the privilege to back up to the centralized vault can do so by specifying the full path to the vault. If the vault is managed, the user's archives will be managed by the storage node as well as other archives stored in the vault.

Checkpoint file

A file that accompanies an Exchange transaction log stream and tracks how far Exchange has progressed in writing logged information to the database file.

Circular logging

A Microsoft Exchange Server logging mode. In this mode, Exchange overwrites and reuses the transaction log files rather than creating new log files.

Cleanup

Deleting backups from a backup archive or moving them to a different location in order to get rid of outdated backups or prevent the archive from exceeding the desired size.

Cleanup consists of applying retention rules to an archive. The retention rules are set by the backup plan that produces the archive. Cleanup may or may not result in deleting or moving backups depending on whether the retention rules are violated or not.

Console (Acronis Backup Management Console)

A tool for remote or local access to Acronis agents and Acronis Backup Management Server.

Having connected the console to the management server, the administrator sets up centralized backup plans and accesses other management server functionality, that is, performs centralized management. Using the direct console-agent connection, the administrator performs direct management.

Consolidation

Combining two or more subsequent backups belonging to the same archive into a single backup.

Consolidation might be needed when deleting backups, either manually or during cleanup. For example, the retention rules require to delete a full backup that has expired but retain the next incremental one. The backups will be combined into a single full backup which will be dated with the incremental backup's date. Since consolidation may take a lot of time and system resources, retention rules provide an option to not delete backups with dependencies. In our example, the full backup will be retained until the incremental one also becomes obsolete. Then both backups will be deleted.

Continuous Data Protection (CDP)

Continuous Data Protection (CDP) allows reverting the protected data to any point in time.

In Acronis Backup, CDP is a backup scheme applicable to Microsoft Exchange information stores, storage groups, and databases. In this scheme, you specify when to perform full backups. In addition, the transaction log files are backed up automatically as soon as they are closed by Exchange. Having both full backups and transaction log backups, you can select any point in time to revert the Exchange data to.

Copy-only backup

Creating a full backup of a Microsoft Exchange information store, storage group, or database without truncating the transaction log files. Use this backup method to obtain a full backup without disturbing continuous backup plans. For example, if a database is protected with CDP, you can do a copy-only backup of the database for transportation to an off-site location, testing, analysis or other purposes.

Copy-only backup and express full backup are mutually exclusive. You can select only one of these methods when creating a backup plan.

Data catalog

Allows a user to easily find the required version of data and select it for recovery. On a managed machine, users can view and search data in any vault accessible from this machine. The centralized catalog available on the management server contains all data stored on its storage nodes.

Physically, data catalog is stored in catalog files. Every vault uses its own set of catalog files which normally are located directly in the vault. If this is not possible, such as for tape storages, the catalog files are stored in the managed machine's or storage node's local folder. Also, a storage node locally stores catalog files of its remote vaults, for the purpose of fast access.

Database-level backup

A backup that contains Exchange databases and Exchange-related information from Active Directory. When performing backup at a database level, Acronis Backup backs up database files, transaction log files and other associated files at a file level from a snapshot taken using Volume Shadow Copy Service (VSS). The Exchange server structure, cluster structure, user accounts and user's settings are extracted from Active Directory.

The main purpose of this backup type is disaster recovery of Exchange. You can also recover mailboxes, folders, e-mails, contacts, tasks, notes and other items directly from database backups.

Deduplicating vault

A managed vault in which deduplication is enabled.

Deduplication

A method of storing different duplicates of the same information only once.

Acronis Backup can apply the deduplication technology to backup archives stored on storage nodes. This minimizes storage space taken by the archives, backup traffic and network usage during backup.

Differential backup

A differential backup stores changes to the data against the latest full backup. You need access to the corresponding full backup to recover the data from a differential backup.

Direct management

An operation that is performed on a managed machine using the direct console-agent connection (as opposed to centralized management when the operations are configured on the management server and propagated by the server to the managed machines).

The direct management operations include:

  • creating and managing local backup plans
  • creating and managing local tasks such as recovery tasks
  • creating and managing personal vaults and archives stored there
  • viewing the state, progress and properties of the centralized tasks existing on the machine
  • viewing and managing the log of the agent's operations
  • disk management operations, such as clone a disk, create volume, convert volume.

A kind of direct management is performed when using bootable media.

Disaster recovery plan (DRP)

A document that contains a list of backed up data items and detailed instructions on how to recover these items from a backup.

If the corresponding backup option is enabled, a DRP is created after the first successful backup is performed by the backup plan, and also after any change to the list of data items or the DRP parameters. A DRP can be sent to the specified e-mail addresses or saved as a file to a local or network folder.

Disk backup (Image)

A backup that contains a sector-based copy of a disk or a volume in a packaged form. Normally, only sectors that contain data are copied. Acronis Backup provides an option to take a raw image, that is, copy all the disk sectors, which enables imaging of unsupported file systems.

Disk group

A number of dynamic disks that store the common configuration data in their LDM databases and therefore can be managed as a whole. Normally, all dynamic disks created within the same machine are members of the same disk group.

As soon as the first dynamic disk is created by the LDM or another disk management tool, the disk group name can be found in the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dmio\Boot Info\Primary Disk Group\Name.

The next created or imported disks are added to the same disk group. The group exists until at least one of its members exists. Once the last dynamic disk is disconnected or converted to basic, the group is discontinued, though its name is kept in the above registry key. In case a dynamic disk is created or connected again, a disk group with an incremental name is created.

When moved to another machine, a disk group is considered as ‘foreign’ and cannot be used until imported into the existing disk group. The import updates the configuration data on both the local and the foreign disks so that they form a single entity. A foreign group is imported as is (will have the original name) if no disk group exists on the machine.

For more information about disk groups please refer to the following Microsoft knowledge base article:

222189 Description of Disk Groups in Windows Disk Management http://support.microsoft.com/kb/222189/EN-US/

Dynamic disk

A hard disk managed by Logical Disk Manager (LDM) that is available in Windows starting with Windows 2000. LDM helps flexibly allocate volumes on a storage device for better fault tolerance, better performance or larger volume size.

A dynamic disk can use either the master boot record (MBR) or GUID partition table (GPT) partition style. In addition to MBR or GPT, each dynamic disk has a hidden database where the LDM stores the dynamic volumes' configuration. Each dynamic disk holds the complete information about all dynamic volumes existing in the disk group which makes for better storage reliability. The database occupies the last 1MB of an MBR disk. On a GPT disk, Windows creates the dedicated LDM Metadata partition, taking space from the Microsoft Reserved Partition (MSR.)

Disk 1

MBR

LDM
database

Which method for creating linux volumes is similar to using dynamic disks in windows?

1 MB

Disk 2

Protec-tive
MBR

GPT

Microsoft
Reserved
Partition (MSR)

LDM
database

GPT

LDM Metadata
partition

Which method for creating linux volumes is similar to using dynamic disks in windows?

1 MB

Dynamic disks organized on MBR (Disk 1) and GPT (Disk 2) disks.

For more information about dynamic disks please refer to the following Microsoft knowledge base articles:

Disk Management (Windows XP Professional Resource Kit) http://technet.microsoft.com/en-us/library/bb457110.aspx

816307 Best practices for using dynamic disks on Windows Server 2003-based computers http://support.microsoft.com/kb/816307

Dynamic group

A group of machines which is populated automatically by the management server according to membership criteria specified by the administrator. Acronis Backup offers the following membership criteria:

  • Operating system
  • Active Directory organizational unit
  • IP address range
  • Listed in txt/csv file.

A machine remains in a dynamic group as long as the machine meets the group's criteria. However, the administrator can specify exclusions and not include certain machines in the dynamic group even if they meet the criteria.

Dynamic volume

Any volume located on dynamic disks, or more precisely, on a disk group. Dynamic volumes can span multiple disks. Dynamic volumes are usually configured depending on the desired goal:

  • to increase the volume size (a spanned volume)
  • to reduce the access time (a striped volume)
  • to achieve fault tolerance by introducing redundancy (mirrored and RAID-5 volumes.)
Encrypted archive

A backup archive encrypted according to the Advanced Encryption Standard (AES). When the encryption option and a password for the archive are set in the backup options, each backup belonging to the archive is encrypted by the agent before saving the backup to its destination.

Encrypted vault

A managed vault to which anything written is encrypted and anything read is decrypted transparently by the storage node, using a vault-specific encryption key stored on the node. In case the storage medium is stolen or accessed by an unauthorized person, the malefactor will not be able to decrypt the vault contents without access to the storage node. Encrypted archives will be encrypted over the encryption performed by the agent.

Exchange database

There are two types of Exchange databases.

  • A mailbox database stores contents of mailboxes. Mailbox content is private to the mailbox user.
  • A public folder database stores public folders data. Public folder content is shared among multiple users.

Physically, the data stored in the files of the following types:

  • Database file (.edb)
  • Transaction log files (.log)
  • Checkpoint files (.chk).
Export

An operation that creates a copy of an archive or a self-sufficient part copy of an archive in the location you specify. The export operation can be applied to a single archive, a single backup or to your choice of backups belonging to the same archive. An entire vault can be exported by using the command line interface.

Express full backup

A method of creating a full backup of Exchange information stores, storage groups, or databases. With this method, Acronis Backup backs up only the changes that have occurred since the previous full backup. The data that has not changed is replaced with links to it.

As compared to regular full backup:

  • Express backups are created faster and occupy less space.
  • The number of I/O requests to the production server is much less.

Express full backup and copy-only backup are mutually exclusive. You can select only one of these methods when creating a backup plan.

Full backup

A self-sufficient backup containing all data chosen for backup. You do not need access to any other backup to recover the data from a full backup.

GFS (Grandfather-Father-Son)

A popular backup scheme aimed to maintain the optimal balance between a backup archive size and the number of recovery points available from the archive. GFS enables recovering with daily resolution for the last several days, weekly resolution for the last several weeks and monthly resolution for any time in the past.

For more information please refer to GFS backup scheme.

Image

The same as Disk backup.

Incremental backup

A backup that stores changes to the data against the latest backup. You need access to other backups to recover data from an incremental backup.

Indexing

An activity performed by a storage node after a backup has been saved to a deduplicating vault.

During indexing, the storage node performs the following operations:

  • Moves data blocks from the backup to a special file within the vault. This file is called the deduplication data store.
  • In the backup, replaces the moved blocks with their fingerprints ("hashes")
  • Saves the hashes and the links that are necessary to "assemble" the deduplicated data, to the deduplication database.

Indexing can be thought of as "deduplication at target", as opposed to "deduplication at source" which is performed by the agent during the backup operation. A user can suspend and resume indexing.

Information store (Exchange store, Managed store)

Microsoft Exchange Server stores its data in a single repository called information store (in Exchange 2003/2007), Exchange store (in Exchange 2010), or Managed store (in Exchange 2013). The primary logical components of the information store are storage groups (for Exchange 2003/2007 only) and Exchange databases.

Local backup plan

A backup plan created on a managed machine using direct management.

Local task

A task created on a managed machine using direct management.

Logical volume

This term has two meanings, depending on the context.

  • A volume, information about which is stored in the extended partition table. (In contrast to a primary volume, information about which is stored in the Master Boot Record.)
  • A volume created using Logical Volume Manager (LVM) for Linux kernel. LVM gives an administrator the flexibility to redistribute large storage space on demand, add new and take out old physical disks without interrupting user service. Acronis Backup Agent for Linux can access, back up and recover logical volumes when running in Linux with 2.6.x kernel or a Linux-based bootable media.
Machine

A physical or virtual computer uniquely identified by an operating system installation. Machines with multiple operating systems (multi-boot systems) are considered as multiple machines.

Mailbox-level backup

A backup that stores contents of Exchange mailboxes and/or public folders. Acronis Backup accesses the contents using Messaging Application Programming Interface (MAPI), so backing up multiple mailboxes may take a long time. Backing up at a mailbox level makes sense when you need to frequently back up a small number of mailboxes. Otherwise, consider a database-level backup.

Managed machine

A machine, either physical or virtual, where at least one Acronis Backup Agent is installed.

Managed vault

A centralized vault managed by a storage node. Archives in a managed vault can be accessed as follows:

bsp://node_address/vault_name/archive_name/

Physically, managed vaults can reside on a network share, SAN, NAS, on a hard drive local to the storage node or on a tape library locally attached to the storage node. The storage node performs cleanup and validation for each archive stored in the managed vault. An administrator can specify additional operations that the storage node will perform (deduplication, encryption).

Management server (Acronis Backup Management Server)

A central server that drives data protection within the enterprise network. Acronis Backup Management Server provides the administrator with:

  • a single entry point to the Acronis Backup infrastructure
  • an easy way to protect data on numerous machines using centralized backup plans and grouping
  • enterprise-wide monitoring and reporting functionality
  • the ability to create centralized vaults for storing enterprise backup archives
  • the ability to manage storage nodes
  • the centralized catalog of all data stored on the storage nodes.

If there are multiple management servers on the network, they operate independently, manage different machines and use different centralized vaults for storing archives.

Media builder

A dedicated tool for creating bootable media.

Personal vault

A local or networked vault created using direct management. Once a personal vault is created, a shortcut to it appears on the managed machine in the Vaults list. Multiple machines can use the same physical location; for example, a network share; as a personal vault.

Plan

See Backup plan.

Point of failure

The point in time when the most recent transaction log file existing in Exchange was created. This is the most recent state Exchange data can be reverted to.

Recovery point

Date and time to which the backed-up data can be reverted.

Registered machine

A machine managed by a management server. A machine can be registered on only one management server at a time. A machine becomes registered as a result of the registration procedure.

Registration

A procedure that adds a managed machine to a management server.

Registration sets up a trust relationship between the agent residing on the machine and the server. During registration, the console retrieves the management server's client certificate and passes it to the agent which uses it later to authenticate clients attempting to connect. This helps prevent any attempts by network attackers from establishing a fake connection on behalf of a trusted principal (the management server).

Replenishable pool

A tape pool that is allowed to take tapes from the Free tapes pool when required.

Replication

Copying a backup to another location. By default, the backup is copied immediately after creation. A user has the option to postpone copying the backup by setting up replication inactivity time.

This feature replaces and enhances the dual destination backup feature, which was available in Acronis Backup & Recovery 10.

Retention rules

A part of backup plan that specifies when and how to delete or move the backups created by the plan.

Single-pass backup

A single-pass backup (aka application-aware backup) is a disk backup containing metadata of VSS-aware applications that are present on the disk. This metadata enables browsing and recovery of the backed-up application data without recovering the entire disk or volume.

Static group

A group of machines which a management server administrator populates by manually adding machines to the group. A machine remains in a static group until the administrator removes it from the group or from the management server.

Storage group

In Exchange 2003/2007, a storage group is a logical container for Exchange databases, the associated transaction log, checkpoint, and other system files. All databases in a storage group share a single log stream. A storage group is the basic unit for backup and recovery.

Starting with Exchange 2010, the concept of a storage group is discontinued. Therefore, you can select individual databases for backup. Each database will be backed up along with the necessary associated files.

Storage node (Acronis Backup Storage Node)

A server aimed to optimize usage of various resources required for protection of enterprise data. This goal is achieved by organizing managed vaults. Storage Node enables the administrator to:

  • use a single centralized catalog of data stored in the managed vaults
  • relieve managed machines of unnecessary CPU load by performing cleanup, validation and other operations with backup archives which otherwise would be performed by agents
  • drastically reduce backup traffic and storage space taken by the archives by using deduplication
  • prevent access to the backup archives, even in case the storage medium is stolen or accessed by a malefactor, by using encrypted vaults.
Task

A set of actions to be performed by Acronis Backup at a certain time or event. The actions are described in a non human-readable service file. The time or event (schedule) is stored in the protected registry keys (in Windows) or on the file system (in Linux).

Tower of Hanoi

A popular backup scheme aimed to maintain the optimal balance between a backup archive size and the number of recovery points available from the archive. Unlike the GFS scheme that has only three levels of recovery resolution (daily, weekly, monthly resolution), the Tower of Hanoi scheme continuously reduces the time interval between recovery points as the backup age increases. This allows for very efficient usage of the backup storage.

For more information please refer to "Tower of Hanoi backup scheme".

Transaction log backup (Exchange)

A transaction log backup stores transaction log files along with checkpoint files.

At first backup, Acronis Backup creates a regular full backup of the corresponding Exchange information store, storage group or database. After that, only the log files and checkpoint files are backed up. The transaction log files are truncated after each successful backup. Circular logging must be disabled in Exchange, otherwise the backups will fail.

Having transaction log backups, you can revert Exchange data to any point in time. First, the data will be recovered to the state saved in the full backup. Then, the transaction log will be applied.

Transaction log file (Exchange)

Transaction log files (.log) store all changes made to an Exchange database or storage group. Before committing any change to a database file, Exchange logs the change into a transaction log file. Only after the change is securely logged, it is then written to the database. This approach guarantees reliable recovery of the database in a consistent state in case of sudden database interruptions.

Each log file is 1024 KB in size. When an active log file is full, Exchange closes it and creates a new log file. A set of sequential log files is called a log stream. Each database or storage group has its own log stream.

Transaction log file truncation (Exchange)

The process of deleting transaction log files. Exchange truncates the transaction log files:

  • After a successful full backup of the corresponding Exchange information store, storage group or database (excepting the copy-only backup).
  • After a successful transaction log backup.

In either case, Exchange deletes only those files that are older than the checkpoint. This means that transactions from these files have already been committed and written to databases.

Unmanaged vault

Any vault that is not a managed vault.

Validation

An operation that checks the possibility of data recovery from a backup.

Validation of a file backup imitates recovery of all files from the backup to a dummy destination. Validation of a disk backup calculates a checksum for every data block saved in the backup. Both procedures are resource-intensive.

While the successful validation means a high probability of successful recovery, it does not check all factors that influence the recovery process. If you back up the operating system, only a test recovery under the bootable media to a spare hard drive can guarantee successful recovery in the future.

Vault

A place for storing backup archives. A vault can be organized on a local or networked drive or detachable media, such as an external USB drive. There are no settings for limiting a vault size or the number of backups in a vault. You can limit the size of each archive using cleanup, but the total size of archives stored in the vault is limited by the storage size only.

Virtual machine

On Acronis Backup Management Server, a machine is considered virtual if it can be backed up from the virtualization host without installing an agent on the machine. Such machine appears in the Virtual machines section. If an agent is installed into the guest system, the machine appears in the Machines with agents section.

WinPE (Windows Preinstallation Environment)

A minimal Windows system commonly used by OEMs and corporations for deployment, test, diagnostic and system repair purposes. A machine can be booted into WinPE via PXE, CD-ROM, USB flash drive or hard disk. Acronis Plug-in for WinPE enables running the Acronis Backup Agent in the preinstallation environment.


What types of volumes or partitions can be created on a basic disk?

You can create up to four partitions on a basic disk using the MBR partition scheme: either four primary partitions, or three primary and one extended. The extended partition can contain one or more logical drives.

Which of the following is not a Linux file or disk management command?

Which of the following is not a linux/unix file or disk management command? The Right answer is "xterm".

What feature of the GUID partitioning table GPT partitioning method offers improved reliability over the MBR partitioning method?

GPT provides a more flexible mechanism for partitioning disks than the older MBR partitioning scheme that has been common to PCs. GPT disks support volume sizes up to 18 exabytes (EB) and can store up to 128 partitions on each disk.

What type of disk is required if you want to access additional features such as disk spanning?

What type of disk is required if you want to access additional features such as disk spanning? A RAID 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data.