Using full transaction log and differential backup strategies