Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

RTO and RPO: Assume your company has a web site to take orders for products, or

ID: 3733766 • Letter: R

Question

RTO and RPO: Assume your company has a web site to take orders for products, or service customers for their concerns. The web site connects to app servers and they connect to your customer database. You replicate your data between data centers nightly to support RPO=24hrs

What is the maximum downtime RTO your business should manage to for a major weather storm or data center fire? Choose from (15mins, 1hr, 4hrs, 24hrs, 72hrs, 1 week) Why do you cite this answer

What technology would you specify to support this answer?

Your director comes up to you and says that we need to support the next better (lower) number for RTO.

What technology do you need to specify to support that request?

Your director comes up to you and says that we need to support an RPO=1hour.

What technology do you need to implement to support that request?

Use a DDoS attack as the example, describe the incident response plan for this web site based on the slides from that week

Explanation / Answer

The recovery point objective (RPO) and the recovery time objective (RTO) are key measures in the recovery process. RTO is the time taken to recover the disaster situation and return to normal while RPO is the stage at which we can recover the application fully.

3. In case the director comes and say we need to support RPO = 1 hour, then we can enable the frequency of replication of data to 1 hour. It will make sure we can recover till the last successful data replication which will be les than 1 hour everytime.

4. In case of a DDOS attack, the many requests coming to the server leading to the denial of srvice, then we can start the alternate site in parallel which will ensure that the services are available and identify the irrelevant requests from the primary server and after protecting the business users. we will need to remove the irrelevant requests which is the basic of DDOS attack remediation.

After the primary site is back to normal, we can again set the secondary site to inactive.