Cohesity Data Ops Flashcards

1
Q

Data Protection

A

The process of safeguarding important information from corruption, compromise, or loss. Cohesity uses data protection strategies to ensure that data is always available and recoverable in case of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Resiliency

A

The ability of a system to withstand or recover quickly from difficult conditions. Cohesity ensures resiliency through redundancy, snapshots, and other failover mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backup and Restore

A

Backup is the process of creating copies of data to safeguard against data loss. Restore is the process of retrieving data from backup storage, typically after data loss or corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Snapshot

A

A read-only copy of data at a specific point in time, allowing for fast data recovery. Cohesity uses snapshots to enable quick, efficient recovery options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Replication

A

The process of copying data from one location to another for backup or disaster recovery. In Cohesity, replication allows data to be mirrored across clusters for high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Helios

A

Cohesity Helios is a SaaS-based platform that provides global management, visibility, and control over Cohesity clusters, enabling simplified data and application management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cluster

A

A group of nodes or servers that work together to manage data, applications, and services in a distributed system. In Cohesity, clusters allow for scalable storage and computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cohesity C6000 Series

A

A hardware appliance in Cohesity’s portfolio designed to provide scalable, resilient data storage and protection for enterprise environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection Group

A

A set of policies that dictate backup schedules, retention periods, and recovery options for a collection of data. Cohesity uses protection groups to streamline data protection management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policy-Based Data Protection

A

A data protection model where backup, replication, and retention policies are pre-defined, automating data protection operations to meet organizational requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DataLock

A

A feature that prevents data from being deleted or modified for a specified retention period, helping to meet compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Storage Efficiency

A

The practice of maximizing data storage utilization through techniques such as deduplication and compression. Cohesity achieves efficiency by reducing redundant data across clusters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Global Deduplication

A

A process where duplicate data is identified and removed globally across clusters, reducing storage needs and optimizing space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compression

A

Reduces the size of data to save storage space and improve transfer speeds. Cohesity uses compression as part of its storage optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Archiving

A

The process of moving data that is no longer actively used to a long-term storage location. Cohesity provides archiving options for efficient data lifecycle management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Snapshot Retention

A

Policies that define how long a snapshot is stored before deletion. Cohesity retention policies allow organizations to manage data lifecycle effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access Control

A

Mechanisms that limit who can view or use resources within a computing environment. Cohesity access control ensures only authorized users can access specific data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encryption

A

The process of encoding data to prevent unauthorized access. Cohesity uses encryption both at rest and in transit to secure data.

19
Q

Role-Based Access Control (RBAC)

A

A security method that assigns permissions to users based on their role within an organization, enabling fine-grained access control within Cohesity.

20
Q

Multi-Factor Authentication (MFA)

A

A security measure that requires more than one form of verification to access a system. Cohesity supports MFA to enhance security for user access.

21
Q

Alerting and Monitoring

A

Real-time notifications and monitoring tools used to keep administrators informed of system status, health, and any potential issues in the data protection environment.

22
Q

TAC Cases

A

Technical Assistance Center (TAC) cases are used for tracking issues or incidents that require support from Cohesity’s technical team.

23
Q

API Integration

A

Allows Cohesity to connect and interact with other applications and services for enhanced automation and management.

24
Q

Disaster Recovery (DR)

A

A set of policies and tools for recovering data and restoring systems in the event of a catastrophe. Cohesity enables DR through replication, snapshots, and failover capabilities.

25
Q

Orchestration

A

Automates backup and recovery workflows to ensure that data protection processes are efficient and require minimal manual intervention.

26
Q

Instant Mass Restore

A

Cohesity’s ability to restore large volumes of data quickly, minimizing downtime for critical systems.

27
Q

Immutable Backups

A

Backups that cannot be modified or deleted for a specified period, helping to guard against ransomware attacks and data tampering.

28
Q

Tiering

A

Data movement across different types of storage based on performance, cost, and access requirements, enhancing storage efficiency.

29
Q

Snapshots vs. Clones

A

Snapshots are read-only point-in-time images, while clones are writable copies that can be used for testing or development without affecting the original data.

30
Q

Data Retention Compliance

A

Policies that enforce data retention schedules to meet regulatory requirements, preventing premature data deletion.

31
Q

Audit Logs

A

Records of system activity that help administrators track user actions and access to sensitive data for security and compliance purposes.

32
Q

Encryption Key Management

A

Processes for securely managing and rotating encryption keys used to protect data, ensuring that data remains accessible only to authorized users.

33
Q

Data Masking

A

Hides or obfuscates sensitive data in non-production environments, providing privacy in testing or development.

34
Q

Failover and Failback

A

Failover is switching to a backup system during a failure, while failback is the return to the primary system after recovery, essential for disaster recovery planning.

35
Q

Load Balancing

A

Distributes workloads across cluster nodes to ensure efficient resource usage and prevent any single node from being overwhelmed.

36
Q

Node

A

A single computing device within a cluster that contributes to the overall capacity and performance, playing a role in data redundancy and scalability.

37
Q

Health Check

A

Regularly performed tests to assess the health and performance of clusters and nodes, enabling early detection of potential issues.

38
Q

Service Level Agreement (SLA)

A

An SLA defines the performance and uptime commitments for backup and recovery processes, ensuring they align with business needs.

39
Q

Cloud Archive

A

Moves backup data to a cloud provider (e.g., AWS, Azure, or Google Cloud) for long-term storage and cost savings.

40
Q

Hybrid Cloud Support

A

Cohesity’s ability to support both on-premises and cloud-based workloads, providing flexibility in data management.

41
Q

Data Migration

A

The process of moving data between on-premises storage and cloud environments, often used in cloud transitions or upgrades.

42
Q

Anti-Ransomware Protection

A

Cohesity’s features that detect and block ransomware activity, with capabilities for quickly recovering unaltered copies of data if an attack occurs.

43
Q

Quarantine

A

Isolating infected files to prevent the spread of ransomware or malware across the storage environment.

44
Q

Anomaly Detection

A

Monitors unusual patterns in data usage or backup jobs, which can help detect ransomware or unauthorized data access.