Академический Документы
Профессиональный Документы
Культура Документы
Hemang Doshi
Questions, Answers and Explanation (QAE) on concept are designed in accordance with
CISA exam pattern.
-Full Backup
-Differential Backup
-Incremental Backup
CISA aspirants should understand various backup schemes as follow:
Full Backup- Every time data backup is taken of full database irrespective of earlier backup.
Differential Backup-Backup is taken only of data changed/modified since last full backup
(last back to be full back-up only).
Let us understand requirement for time and media capacity for various schemes for data
storage:
-Full Backup- Requires more time and storage capacity as compared to other two schemes.
-Differential- Requires less time and storage capacity as compared to full backup but more
time and storage capacity as compared to Incremental.
-Incremental- Requires less time and storage capacity as compared to other two schemes.
Below QAE are solely on the concept of various backup schemes . Candidates are advised
to attempt below questions multiple times. More emphasis to be given on explanation part
for better understanding.
(1)Backup scheme wherein every time data backup is taken of full database irrespective of
earlier backup availability is known as:
A. Incremental Backup
B. Differential Backup
C. Grandfather-father-son rotation
D. Full Backup
Differential Backup-Backup is taken only of data changed/modified since last full backup
(last back to be full back-up only).
(2)Backup scheme wherein backup of data is taken only for data changed/modified either
after full backup or incremental backup is known as:
A. Incremental Backup
B. Differential Backup
C. Grandfather-father-son rotation
D. Full Backup
Incremental Backup-Backup is taken only of data changed since last backup (last backup
can be
either full backup or incremental backup).
Differential Backup-Backup is taken only of data changed since last full backup (last back
to be full back-up only).
Full Backup- Every time data backup is taken of full database irrespective of earlier backup.
A. Incremental Backup
B. Differential Backup
C. Grandfather-father-son rotation Backup
D. Full Backup
Differential Backup-Backup is taken only of data changed since last full backup (last back
to be full back-up only).
Incremental Backup-Backup is taken only of data changed since last backup (last backup
can be
either full backup or incremental backup).
Full Backup- Every time data backup is taken of full database irrespective of earlier backup.
(4)Which of the following backup scheme takes requires more time and media capacity for
backup storage?
A. Incremental Backup
B. Differential Backup
C. Grandfather-father-son rotation Backup
D. Full Backup
Explanation: In full backup, every time data backup is taken of full database irrespective of
earlier backup. However, full backup scheme requires more time and media capacity for
backup Storage. Advantage of full backup scheme is easy restoration due to unique
repository.
Let us understand requirement for time and media capacity for various schemes for data
storage:
-Full Backup- Requires more time and storage capacity as compared to other two schemes.
-Differential- Requires less time and storage capacity as compared to full backup but more
time and storage capacity as compared to Incremental.
-Incremental- Requires less time and storage capacity as compared to other two schemes.
(5)Which of the following backup scheme is more effective and faster for data restoration?
A. Incremental Backup
B. Differential Backup
C. Grandfather-father-son rotation Backup
D. Full Backup
Explanation: In full backup, every time data backup is taken of full database irrespective of
earlier backup. Advantage of full backup scheme is easy restoration due to unique
repository. However, full backup scheme requires more time and media capacity for
backup Storage.
Mock Test :
To attempt mock test on Backup Schemes (Domain-4), please visit below link:
http://cisaexamstudy.com/backup-schemes-fulldifferentialincremental-mock-test/
Other CISA Exam- Study Material
Domain 1
https://www.youtube.com/watch?v=F2j8xhPaFTg
https://www.smashwords.com/books/view/622303
Types of Risk
https://www.youtube.com/watch?v=FvuvARXcjss
https://www.smashwords.com/books/view/625599
https://www.youtube.com/watch?v=72kv6yOpXEI
https://www.youtube.com/watch?v=6KxEbth2Ziw
Audit Charter
https://www.youtube.com/watch?v=rbCJ3ceDuso
https://www.smashwords.com/books/view/633923
COBIT-5
https://youtu.be/WfwjpDdBqr4
Internal Controls
https://youtu.be/RuX2hLnm3vY
https://youtu.be/cGcMmt-03as
https://www.smashwords.com/books/view/658967
Sampling
https://youtu.be/Ynif7SqvkvM
https://www.smashwords.com/books/view/661847
Domain 2
Outsourcing Functions
https://youtu.be/vQsX6ZQSDXk
https://youtu.be/Za9VMrSe094
https://www.youtube.com/watch?v=FEsP2LXSF9U
https://www.smashwords.com/books/view/633047
https://youtu.be/tvNAvAL9ZIg
https://www.smashwords.com/books/view/639816
https://www.smashwords.com/books/view/645822
Domain 3
https://www.youtube.com/watch?v=HmGFIJlLu-4
https://www.smashwords.com/books/view/637926
Parity-Checksum-CRC
https://youtu.be/Y14jVvOKqaU
https://www.smashwords.com/books/view/656262
Check Digit
https://youtu.be/VH2yd3A6bMc
https://www.smashwords.com/books/view/656262
PERT-CPM-Gantt Chart-FPA-EVA-Timebox
https://youtu.be/zYZYvcr_-3M
https://www.smashwords.com/books/view/666753
Testing in SDLC
https://www.youtube.com/watch?v=43nFUFzTbBU
https://www.smashwords.com/books/view/687052
http://cisaexamstudy.com/agile-system-development-methodology-video-tutorial/
Domain 4
https://youtu.be/2rDusGnW9qw
https://www.smashwords.com/books/view/646456
https://youtu.be/jCpcqaazkY4
https://www.smashwords.com/books/view/647476
http://cisaexamstudy.com/diverse-routing-alternate-routing-video-tutorial/
http://cisaexamstudy.com/physical-network-media-video-tutorial-cisa-domain-4/
https://www.smashwords.com/books/view/736761
Components of LAN
http://cisaexamstudy.com/components-lan-repeaterhubswitchbridgerouter-video-
tutorial/
https://www.smashwords.com/books/view/745304
Domain 5
Digital Signature
https://youtu.be/_N3jisd1Vis
https://www.smashwords.com/books/view/648923
https://youtu.be/csbd_V9PknI
https://www.smashwords.com/books/view/651918
Firewall Types
https://youtu.be/x650kcv6Mfk
https://www.smashwords.com/books/view/654726
Firewall Implementation
https://youtu.be/lltKNTdjg4Y
https://www.smashwords.com/books/view/654726
Logical Access
https://www.smashwords.com/books/view/630325
https://youtu.be/z7MwD8_ayCs
https://www.smashwords.com/books/view/669437
Asymmetric Encryption
https://www.smashwords.com/books/view/674900
https://youtu.be/mCM6dyQ_KmQ
https://www.smashwords.com/books/view/679445
https://youtu.be/ZqVciCzS3ng
Biometrics
https://www.smashwords.com/books/view/685250
https://youtu.be/EmTOytQv4yM
https://youtu.be/0J49Ij_l8VU
https://www.smashwords.com/books/view/692601
OSI Architecture
https://youtu.be/vkjBo2_9aDE
https://www.smashwords.com/books/view/703536
Single Sign On
https://youtu.be/ITIFz5pyAls
https://www.smashwords.com/books/view/707248