Exam Highlights
Before taking the exam, review the key points and terms that are presented in this chapter. Return to the lessons for additional practice.
Key Points
You can restore databases to the point of failure only if circular logging is not enabled and the transaction log files are stored on a different disk from the database files.
RAID-1, RAID-0+1, and RAID-5 systems can protect data and provide failover protection. RAID-0 improves I/O performance but provides no fault tolerance.
Full online backup truncates the transaction logs. No other type of backup deletes committed transaction logs, and you should not delete them manually.
To recover deleted mailboxes after the retention period has expired, you need a recovery server. You also use a recovery server to restore a public store on a dedicated public folder server. A recovery server needs to be in a separate Active Directory forest.
Key Terms
transaction logA combination of hardware and software that provides a security system, usually to prevent unauthorized access to an intranet.Windows 2003 BackupThe backup and restore utility that is provided with Windows Server 2003. The utility may be used to back up and restore Exchange Server 2003 storage groups.circular loggingAn option that re-uses transaction log files and prevents them from filling the hard disk. If you enable circular logging then you cannot use transaction log files to restore an Exchange store up to the point of failure.Volume Shadow Copy ServiceA Windows Server 2003 service that enables backup software (such as Windows 2003 Backup) to create a snapshot of Exchange Server 2003 data at a specific point in time and back up from that snapshot.recovery serverAn Exchange Server 2003 server in a different forest from your Exchange Server 2003 organization. A recovery server enables you to recover a deleted mailbox after its retention time has expired, to restore public stores, and to perform test restores without dismounting any of your production storage groups.