If flooding or a fire occurs in a data center, hardware called ______________ trigger automatic responses to protect data.(2 points) Responses sensors sensors thermal energy thermal energy malware malware carbon dioxide carbon dioxide Question 5 _____________________ such as the air conditioning and building systems, are designed to keep the servers at an ideal temperature. (2 points) Responses Evaporation Evaporation Thermal energy Thermal energy Infrastructure Infrastructure Computers Computers Question 6 Cybersecurity specialists train systems using ______________ so they can identify threats and immediately respond. (2 points) Responses machine learning machine learning infrastructure infrastructure efficiency efficiency evaporation evaporation Question 7 Data centers have lots of backup equipment, like electrical systems, in case technology fails. This is an example of _______________.(2 points) Responses redundancy redundancy thermal energy thermal energy electrical energy electrical energy infrastructure infrastructure Question 8 The first software that could attack computers displayed the phrase __________________ on computer screens. (2 points) Responses ILOVEYOU ILOVEYOU Code Red Code Red Fix Your Software Fix Your Software I'm the creeper; catch me if you can I'm the creeper; catch me if you can Question 9 What is a primary responsibility of a Controls Manager?(2 points) Responses Designing websites for new movies Designing websites for new movies Managing a team of engineers to ensure data centers maintain 100% uptime Managing a team of engineers to ensure data centers maintain 100% uptime Teaching college courses on control systems Teaching college courses on control systems Directing movies and streaming services Directing movies and streaming services Question 10 Does someone have to physically be at a data center to get access to servers?(2 points) Responses Yes Yes No No Question 11 When data is protected with ________________, it is scrambled so only authorized computers can read the information. (2 points) Responses machine learning machine learning malware malware encryption encryption evaporation evaporation Question 12 Cybersecurity protects against software called _________________ that could access customer data or damage servers. (2 points) Responses encryption encryption sustainability sustainability malware malware carbon dioxide

1 answer

Here are the answers to the questions you've provided:

  1. If flooding or a fire occurs in a data center, hardware called sensors trigger automatic responses to protect data.
  2. Infrastructure such as the air conditioning and building systems, are designed to keep the servers at an ideal temperature.
  3. Cybersecurity specialists train systems using machine learning so they can identify threats and immediately respond.
  4. Data centers have lots of backup equipment, like electrical systems, in case technology fails. This is an example of redundancy.
  5. The first software that could attack computers displayed the phrase ILOVEYOU on computer screens.
  6. What is a primary responsibility of a Controls Manager? Managing a team of engineers to ensure data centers maintain 100% uptime.
  7. Does someone have to physically be at a data center to get access to servers? No.
  8. When data is protected with encryption, it is scrambled so only authorized computers can read the information.
  9. Cybersecurity protects against software called malware that could access customer data or damage servers.

Feel free to ask if you need more assistance!