There are several methods of providing telecommunications
continuity. The method of routing traffic through split
cable or duplicate cable facilities is:
A. alternative routing.
B. diverse routing.
C. long-haul network diversity.
D. last mile circuit protection.
Answer / guest
Answer: B
Diverse routing routes traffic through split cable
facilities or duplicate cable facilities. This can be
accomplished with different and/or duplicate cable sheaths.
If different cable sheaths are used, the cable may be in the
same conduit and therefore subject to the same interruptions
as the cable it is backing up. The communication service
subscriber can duplicate the facilities by having alternate
routes, although the entrance to and from the customer
premises may be in the same conduit. The subscriber can
obtain diverse routing and alternate routing from the local
carrier, including dual entrance facilities. This type of
access is time-consuming and costly. Alternative routing is
a method of routing information via an alternate medium such
as copper cable or fiber optics. This involves use of
different networks, circuits or end points should the normal
network be unavailable. Long-haul network diversity is a
diverse long-distance network utilizing T-1 circuits among
the major long-distance carriers. It ensures long-distance
access should any one carrier experience a network failure.
Last mile circuit protection is a redundant combination of
local carrier T-1s, microwave and/or coaxial cable access to
the local communications loop. This enables the facility to
have access during a local carrier communication disaster.
Alternate local carrier routing also is utilized.
| Is This Answer Correct ? | 27 Yes | 4 No |
With regard to sampling it can be said that: A. sampling is generally applicable when the population relates to an intangible or undocumented control. B. if an auditor knows internal controls are strong, the confidence coefficient may be lowered. C. attribute sampling would help prevent excessive sampling of an attribute by stopping an audit test at the earliest possible moment. D. variable sampling is a technique to estimate the rate of occurrence of a given control or set of related controls.
Java applets and ActiveX controls are distributed executable programs that execute in the background of a web browser client. This practice is considered reasonable when: A. a firewall exists. B. a secure web connection is used. C. the source of the executable is certain. D. the host website is part of your organization.
Which of the following applet intrusion issues poses the GREATEST risk of disruption to an organization? A. A program that deposits a virus on a client machine B. Applets recording keystrokes and, therefore, passwords C. Downloaded code that reads files on a client's hard drive D. Applets opening connections from the client machine
Applying a digital signature to data traveling in a network provides: A. confidentiality and integrity. B. security and nonrepudiation. C. integrity and nonrepudiation. D. confidentiality and nonrepudiation.
An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.
An organization is considering installing a LAN in a site under construction. If system availability is the main concern, which of the following topologies is MOST appropriate? A. Ring B. Line C. Star D. Bus
An organization is experiencing a growing backlog of undeveloped applications. As part of a plan to eliminate this backlog, end-user computing with prototyping, supported by the acquisition of an interactive application generator system is being introduced. Which of the following areas is MOST critical to the ultimate success of this venture? A. Data control B. Systems analysis C. Systems programming D. Application programming
Which of the following is the MOST secure and economical method for connecting a private network over the Internet in a small- to medium-sized organization? A. Virtual private network B. Dedicated line C. Leased line D. Integrated services digital network
A consulting firm has created a File Transfer Protocol (FTP) site for the purpose of receiving financial data and has communicated the site's address, user ID and password to the financial services company in separate email messages. The company is to transmit its data to the FTP site after manually encrypting the data. The IS auditor's GREATEST concern with this process is that: A. the users may not remember to manually encrypt the data before transmission. B. the site credentials were sent to the financial services company via email. C. personnel at the consulting firm may obtain access to sensitive data. D. the use of a shared user ID to the FTP site does not allow for user accountability.
IS management has decided to rewrite a legacy customer relations system using fourth-generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs? A. Inadequate screen/report design facilities B. Complex programming language subsets C. Lack of portability across operating systems D. Inability to perform data intensive operations
An enterprisewide network security architecture of public key infrastructure (PKI) would be comprised of: A. A public key cryptosystem, private key cryptosystem and digital certificate B. A public key cryptosystem, symmetric encryption and certificate authorities C. A symmetric encryption, digital certificate and kerberos authentication D. A public key cryptosystem, digital certificate and certificate authorities
Which of the following reports is a measure of telecommunication transmissions and determines whether transmissions are completed accurately? A. Online monitor reports B. Downtime reports C. Help desk reports D. Response time reports