Free Essay

Windows Backup and Restore

In:

Submitted By ecaflisch
Words 424
Pages 2
Lab Assessment Questions & Answers

1. What is the difference between roles and features in Windows Server 2008? a. Roles – Provide major functions to the operating system usually for multiple users. b. Features – Are packages of extra add-ons. These can be added to roles to increase their functionality

2. What is installed when you choose the Windows Server Backup Feature? c. Microsoft Management Console (MMC) snap-in

3. How often should servers be backed up? d. This really depends on who is administering the network, but a good rule to follow is to do it in the same increment that passwords are done (90 days)

4. What are the different types of backup that are performed in servers? e. Full, Incremental, and Differential. There’s also a Daily type floating abound as well.

5. What are the primary purposes of backing up a server? f. So you don’t lose everything in the event that an incident happens

6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? g. Actually conduct the backup. Whether it’s a few files, one program, or even the whole computer h. You can restore the system or network.

7. Can you restore a server’s operating system image using the restore application? i. Yes, but you have to have a copy (restore) of the OS before it went down and ensure that you have the proper hardware (either original or backup)

8. What are the options to perform backups within Windows XP? j. The options are based on the amount of information that you want to backup. i. Your own personal stuff ii. The group iii. Everything that resides here iv. Dealer’s Choice (they pick)

9. How much disk space did the backup of the server and workstation require? Why is this important to know? k. My backup took 27.25 MB to back everything up. Just for general knowledge. It also gives you a baseline of roughly how much to data is being saved off. This is important because you should be able to know how much data is being saved off

10. How long did it take to restore the server backup image on your system and verify operation? l. 28 minutes from the time the backup ended until the time the recovery ended.

References:

Davis, D. (2008, January 3). What is the difference between a Role and a Feature when customizing your Windows 2008 Server? Retrieved from: http://www.windowsnetworking.com/kbase/WindowsTips/WindowsServer2008/AdminTips/Ad min/WhatisthedifferencebetweenaRoleandaFeaturewhencustomizingyourWindows2008Serv
er.html

Similar Documents

Premium Essay

Deploying-Veritas-Backup-Exe

...Deploying VERITAS™ Backup™ Exec 10 and Auto-Snapshot Manager Abstract This Technical Report describes how to back up and restore NTFS volumes, Microsoft Exchange e-mail, and SQL databases using VERITAS Backup Exec 10, the EqualLogic Auto-Snapshot Manager for Windows VSS provider, and PS Series storage arrays. Copyright © 2005 EqualLogic, Inc. August 2005 EqualLogic is a registered trademark of EqualLogic, Inc. All trademarks and registered trademarks mentioned herein are the property of their respective owners. Possession, use, or copying of the documentation or the software described in this publication is authorized only under the license agreement specified herein. EqualLogic, Inc. will not be held liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change. PS Series Firmware Version 2.1 or later. ii Deploying VERITAS Backup Exec 10 and Auto-Snapshot Manager Table of Contents Technical Report and Software Revision Information......................................................... iv Introduction ............................................................................................................................1 Common Backup and Recovery Configurations ...................................................................2 Backup and Recovery Media .................................................................................................3 Backup to Disk and Restore from Disk Operations...

Words: 9581 - Pages: 39

Free Essay

Backups

...IS3340 7/21/14 How to Back Up and Restore Data on Windows Backing up your files is one of the most important things you can do to safeguard the data you create and store on your computer. To this end, Microsoft included a full backup and restore utility with Windows 7. Here’s how it works. Backing Up First you need to launch Windows' Backup and Restore utility. You will find it in the Control Panel by selecting first System and Security and then Backup and Restore. If you have never used this tool before, you'll see a message under 'Backup' that says 'Windows Backup has not been set up'. Click the link labeled Set up backup to the right of that message. After the program starts, it will prompt you to choose a location for it to store your backup files in. Windows won't let you choose your main hard drive as a backup drive; so if you haven’t already plugged in your external hard drive, do it now and click Refresh. After you've chosen the drive that you want to use for your backup, the program will ask you to identify what you want to back up. The default selection is to let Windows choose for you, and create a disk image at the same time. You can be much more selective, however, by clicking the radio button next to Let me choose. Once you've chosen what you want to back up, and where you want Windows to store it, the program will display a backup summary screen that confirms the options you selected. Before you run your backup, though, you'll probably want to take...

Words: 605 - Pages: 3

Free Essay

Active Directory

...install the Windows Server Backup feature from the Server Manager console. To perform backups from the command line, you will also need to install Windows PowerShell. Windows Server Backup supports the use of the disk drives as backup destinations. Windows Server 2008 supports two types of backup: • Manual backup: This type of backup can be initiated by using Server Backup or the Wbadmin.exe command-line tool when a backup is needed. You must be a member of the Administrators group or the Backup Operators group to launch a manual backup. • Scheduled backup: Members of the local Administrators group can schedule backups using the Windows Server Backup utility or the Wbadmin.exe command-line tool. Scheduled backups will reformat the desired drive that hosts the backup files, and can only be performed on a local physical drive that does not have any critical volumes. With all this taken into consideration I would perform a manual backup every time a major change is taking place and then use a scheduled backup every month to make sure every small change is saved and is not over looked. When a domain has multiple domain controllers, the Active Directory database is replicated within each domain controller. Windows Server 2008 allows several different restoration methods, depending on the goals for your restore. Wbadmin, is the command-line component of the Windows Server Backup snap-in, which restores a single Active Directory domain controller to its state before the backup. This...

Words: 423 - Pages: 2

Premium Essay

Lab 6 Assessment Worksheet

...Features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? How can these applications be used as part of the Business Continutity and Disaster Recovery Plan? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup...

Words: 387 - Pages: 2

Premium Essay

Lab 6

...difference between roles and features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in. 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup. 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup. 8. What are the options to perform backups within Windows XP? * My Documents & Settings ...

Words: 304 - Pages: 2

Premium Essay

Lab6Assignment

...1. What is the difference between Roles and Features in Windows Server 2008? 2. What is installed when you choose the Windows Server Backup Feature? 3. How often should servers be backed up? 4. What are the different types of backup that are performed in servers? 5. What are the primary purposes of backing up a server? 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? How can these applications be used as part of a Business Continuity and Disaster Recovery Plan? 7. Can you restore a server’s operating system image using the restore application? No, you can only restore secondary files. 8. What are the options to perform backups within Windows XP? Navigate to Start > Programs > Accessories > System Tools > “Backup” and choose the appropriate options. 9. How much disk space did the backup of each the server and workstation require? Why is this important to know? The size of the backup depends on how much information you’re backing up. Obviously more information necessitates a larger backup. This is important to know because if you know this you can purchase large enough backup disks or tapes. 10. How long did it take to restore the server backup image on your system and verify operation? If you had to define a recovery time objective for performing this backup and restore, what would you specify at an achievable goal? About an hour. I would specify...

Words: 273 - Pages: 2

Free Essay

I Am Me

...Automatic Backup Portable Hard Drive FCC notice “Declaration of Conformity Information” This product is in conformance with Part 15 of the FCC Rules and Regulations for Information Technology Equipment. Operation of this product is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE Any changes or modifications made to the device, connection method and/or cables may void the users authority to operate this device. FCC Conditions The device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in residential installation. This device generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to television and radio communications. However, there is no guarantee that interference will not occur in a particular installation. Contact Address: TOSHIBA America Information Systems, Inc. 9740 Irvine Boulevard Irvine, California 92618-1697 Telephone: (949) 583-3000 3 Definitions and Introduction Definitions To ensure this user guide is easily understandable, the following terms, as defined below, are used throughout this user guide. Backup and Restore Data...

Words: 2932 - Pages: 12

Premium Essay

Unit 5210 Unit 6 Research Paper

...to determine the backup frequency of the data for your project's retail store. In order to determine the backup frequency for my chosen retail organization’s data, I would do the following. First, I would analyze the data’s change rate. The change rate is the frequency at which changes occur in the data, and understanding this frequency will help me determine how often I need to back up my data to avoid critical information loss (LinkedIn Community, n.d.). For my chosen retail organization, the change rate is very high. Then, I would analyze the backup storage capacity. The backup storage capacity is the amount of storage that can be dedicated to backups, and knowing...

Words: 828 - Pages: 4

Premium Essay

Week 5 Essay

...For the small business that I started I would use the Windows Server Backup tool. Windows Server Backup is a disk-to-disk backup solution that allows you to create backup images on direct-attached disk volumes, on network shares, and even on external USB hard drives and multi-volume recordable DVDs. Windows Server Backup is volume- and block-based and also deals with its backup source as a set of volumes, with each volume as a collection of disk blocks. This is considerably more efficient than backing up files through the file system. Dealing with backups on a block basis also allows Windows Server Backup to make use of Volume Shadow Copy Service snapshots to perform block-level incremental backups, as well as to create snapshots on the target volume to simplify the use of (and reduce the space used by) multiple backups. I would also use the MMC in Server Backup to simplify scheduling of daily full-system backups to a local disk volume. As far as recovery is concerned, I would restore the Active Directory Domain Services (ADDS) database to an earlier state, rather than restore the entire system. Even though I can stop AD DS like a service in Windows Server 2008, I would still need to boot the server into Directory Services Restore Mode (DSRM) to perform a system state restore on a domain controller. As far as monitoring goes the MOM (Microsoft Operations Manager) system would be fully employed. The role the MOM gathers computer attribute information and applies specific...

Words: 341 - Pages: 2

Free Essay

Cis 206 Slingshot Academy / Tutorialrank.Com

...CIS 206 All iLabs: Devry University (DEVRY) For more course tutorials visit www.tutorialrank.com CIS 206 All iLabs: Devry University ----------------------------------------------------------- CIS 206 Case Study 2-3 Discussing the Functions of an Operating System (DEVRY) For more course tutorials visit www.tutorialrank.com You have been selected to present a short talk on the functions of an operating system for the weekly tech meeting. To support your talk, you must prepare a handout for the attendees. The handout should summarize the information that you have learned about this topic. ----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit www.tutorialrank.com You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit www.tutorialrank.com Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to prepare...

Words: 3261 - Pages: 14

Premium Essay

Patient Contacted Home Telehealth. Patient Stated He Would Be Going Out of Town for Two Weeks. Patient Is Requesting Call for Care Coordinator.

...Study Guide for Windows Security Final IS3340 1. Many current operating systems actually implement microkernel architecture. Microkernel only implements the minimal required. Processes generally run in either user mode or supervisor mode. 2. The process of providing and denying access is called access control. Access control is multi step process starting with Identification and authentication. Three authentication types are type I, II, and III 3. User rights define the tasks that user is permitted to carry out, such as take ownership of objects or shutdown the computer. Permissions define what a user can do to a specific object such as read or delete the object. 4. This functionality has matured into a core Windows feature called, Active Directory this allows users and groups to be defined once and shared among multiple computers. 5. The main feature of Microsoft Active Directory is the ability to define identity and Authorization permission that can be shared among multiple computers within one or more domains. 6. The principal of providing the just the necessary access required to carry out a task is called the principal of least privilege or LUAs. 7. Access Models: Identification, Authentication, Authorization, ACL’s and Security Access Token (SAT). 8. Access Control List (ACL), Discretionary Access Control List (DACL), and Access Control Entry (ACE). 9. Access Models: Identification, Authentication, Authorization, ACL’s and Security Access Token (SAT). 10. cacls...

Words: 1195 - Pages: 5

Premium Essay

Dell Manual

...Me and My Dell © 2014 Dell Inc. NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. 2014 – 08 Rev. A02 Contents Windows 8.1 Features Signing in Microsoft account Local account 12 12 12 12 Locking and unlocking your computer Accessing the desktop Turning off your computer Start screen and tiles Apps Closing an app Snapping apps 12 13 13 14 14 14 14 More Information 15 Setting Up Your Computer Connecting To The Internet Connecting to the Internet Using LAN Connecting to the Internet Using WLAN Connecting to the Internet Using WWAN Setting up Audio Configuring 5.1/7.1 Audio Connecting 5.1 Speakers Connecting 7.1 Speakers Setting Up Your Printer 16 16 16 16 17 18 18 19 20 21 Contents  3 Setting Up Your Webcam Integrated Webcam External Webcam Setting up Bluetooth 22 22 22 22 About Your Computer Power Adapter Battery Coin-Cell Battery Touchpad Display Touchscreen...

Words: 18778 - Pages: 76

Free Essay

Is3340 Unit 6 Assignment 1

...modified between the last backup and the time of failure? No data should have been lost since nothing was change since the last backup and the backup would have been completed before the error occurred. 2. What images are necessary to recover the workstation? The images that are necessary would be the reimaging image along with the latest back up image available. 3. What are the steps necessary to fix the problem that cause the data loss? Verify what caused the loss by reading the logs. Determine the fix for the issue. Reimage the computer. Restore the computer to last backup state and disable the issue that caused the data loss. 4. What steps should Ken 7 take to avoid a reoccurrence of this issue in the future? Read the logs to find out what caused the issue that caused the data lose.   Right a procedure guide to prevent the issue from occurring. Alert users of the occurrence of the issue and the way to prevent the issue. (Soloman, 2001) Procedure Guide: 1. Read logs to decide what cause the issue to occur. 2. Re-Image the computer to default configuration. 3. Restore to first available backup of the system. Restore Process: 1. Right-click on your Computer desktop icon (or click Start and right-click on the Computer tab on the right pane of the menu). 2. Click on Properties. 3. Locate the System protection tab in the System Properties menu. 4. Select the hard disk that you want to use System Restore on and click Configure. 5...

Words: 393 - Pages: 2

Premium Essay

Is3340 Final Exam

...IS416 Securing Windows Platforms and Applications FINAL EXAMINATION 1. Scope This exam covers all Units and is based on the content from the textbook. 2. Answer Key |Question Number |Correct Answer |Course Objective(s)|Reference | | | |Tested | | |1. |c |1.1 |Security Strategies in Windows Platforms and Applications, Pages 22–23 | |2. |b |1.2 |Security Strategies in Windows Platforms and Applications, Page 27 | |3. |d |1.3 |Security Strategies in Windows Platforms and Applications, Page 31 | |4. |c |1.4 |Security Strategies in Windows Platforms and Applications, Page 32 | |5. |a |1.5 |Security Strategies in Windows Platforms and Applications, Page 32 | |6. |c |2.1 |Security Strategies in Windows Platforms and Applications, Page 42 | |7. |a |2.2 |Security Strategies in Windows Platforms and Applications, Page 44 | |8. ...

Words: 2305 - Pages: 10

Premium Essay

Windows Servers

...Topics |Securing Windows 7 |Installing Windows Server 2008 | |Password and Account Lockout Policies |What Defines a Server | |Windows Firewall Configuration |Server Hardware | |Encrypting File System (EFS) |Windows Server 2008 Editions | |Remote Access Technologies |Server Roles in Windows Server 2008 | |Backup and Restore |Method of Installing Windows Server 2008 | |System Restore Points |Server Configuration | | |IP Address Settings | | |Management of Devices and Device Drivers | | |Microsoft Management Console (MMC) ...

Words: 2079 - Pages: 9