1. Juan\'s web server was down for an entire day last September. It experienced
ID: 3856894 • Letter: 1
Question
1. Juan's web server was down for an entire day last September. It experienced no other downtime during that month. Which one of the following represents the web server uptime for that month?
a) 96.67%
b) 3.33%
c) 99.96%
d) 0.04%
2. Which mitigation plan is most appropriate to limit the risk of unauthorized access to workstations?
a) Password protection
b) Antivirus software
c) Deactivating USB ports
d) Vulnerability scanning
3. Which element of the security policy framework requires approval from upper management and applies to the entire organization?
a) Policy
b) Standard
c) Guideline
d) Procedure
4. Which one of the following is NOT a market driver for the Internet of Things (IoT)?
a) Global adoption of non-IP networking
b) Smaller and faster computing
c) Growth of cloud computing
d) Advancements in data analytics
5. Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron implement to include the requirements and security controls for this arrangement?
a) Privacy
b) Bring Your Own Device (BYOD)
c) Acceptable use
d) Data classification
Explanation / Answer
1) (a) 96.67%
The server uptime is calculated using the following formula
Time period - downtime/Timeperiod*100.
Here time period means for example for the last 30 days we are calculating the time period is 43200 minutes. Downtime is 1 day means 1440 minutes.
43200-1440/43200*100 = 96.666667%.
2) (a) password protection
When we want to limit the access to the workstations means to avoid unauthorized access is by implementing password protection. So that only the authorised people only know the password and can login. Other people can't use the workstations.
3) (a) policy
Policy should be approved by the higher management and then it will be implemented across the organisation.
4) (a) Global adoption of non-ip networking
IOT uses the ip network to connect the devices across globally it doesn't have anything to do with non-ip networking.
5)(b) Bring Your Own Device(BYOD)
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.