Security Measures for Datacenters Experiencing Power Surges and Spikes:

Power Surge Protection | Datacenter Security

Prev Question Next Question

Question

Which of the following security measures would be MOST effective in a datacenter that experiences frequent power surges and spikes? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

AD.

None of the options listed provide direct protection against power surges or spikes. Instead, they all focus on access control and physical security measures.

However, options B through E provide varying levels of protection against unauthorized access, which can indirectly contribute to protection against power surges and spikes.

Numeric keypads, also known as PIN pads, provide a basic level of access control by requiring users to enter a unique code to gain entry. This helps to prevent unauthorized access and can be effective in limiting access to sensitive areas of the datacenter.

Biometrics offer a more advanced level of access control by using physical characteristics such as fingerprints, facial recognition, or iris scans to verify a user's identity. Biometrics are more difficult to bypass than numeric keypads, making them a stronger option for access control.

Access lists allow administrators to control access to specific resources or areas within the datacenter. This can be effective in limiting the number of people who have access to critical systems or equipment.

RFID chips use radio frequency identification to track and manage access to resources within the datacenter. They can provide an additional layer of security by tracking user activity and restricting access to specific areas based on user roles or permissions.

In conclusion, while none of these options provide direct protection against power surges or spikes, options B through E can indirectly contribute to protection by limiting access to sensitive areas of the datacenter and tracking user activity. Numeric keypads and biometrics are the most effective options for access control, but access lists and RFID chips can also provide added security measures.