There are several methods of providing telecommunications
continuity. The method of routing traffic through split
cable or duplicate cable facilities is:
A. alternative routing.
B. diverse routing.
C. long-haul network diversity.
D. last mile circuit protection.
Answer / guest
Answer: B
Diverse routing routes traffic through split cable
facilities or duplicate cable facilities. This can be
accomplished with different and/or duplicate cable sheaths.
If different cable sheaths are used, the cable may be in the
same conduit and therefore subject to the same interruptions
as the cable it is backing up. The communication service
subscriber can duplicate the facilities by having alternate
routes, although the entrance to and from the customer
premises may be in the same conduit. The subscriber can
obtain diverse routing and alternate routing from the local
carrier, including dual entrance facilities. This type of
access is time-consuming and costly. Alternative routing is
a method of routing information via an alternate medium such
as copper cable or fiber optics. This involves use of
different networks, circuits or end points should the normal
network be unavailable. Long-haul network diversity is a
diverse long-distance network utilizing T-1 circuits among
the major long-distance carriers. It ensures long-distance
access should any one carrier experience a network failure.
Last mile circuit protection is a redundant combination of
local carrier T-1s, microwave and/or coaxial cable access to
the local communications loop. This enables the facility to
have access during a local carrier communication disaster.
Alternate local carrier routing also is utilized.
Is This Answer Correct ? | 27 Yes | 4 No |
Which of the following database administrator (DBA) activities is unlikely to be recorded on detective control logs? A. Deletion of a record B. Change of a password C. Disclosure of a password D. Changes to access rights
Which of the following activities should the business continuity manager perform FIRST after the replacement of hardware at the primary information processing facility? A. Verify compatibility with the hot site. B. Review the implementation report. C. Perform a walk-through of the DRP. D. Update the IS assets inventory.
As updates to an online order entry system are processed, the updates are recorded on a transaction tape and a hard-copy transaction log. At the end of the day, the order entry files are backed up on tape. During the backup procedure, a drive malfunctions and the order entry files are lost. Which of the following are necessary to restore these files? A. The previous day's backup file and the current transaction tape B. The previous day's transaction file and the current transaction tape C. The current transaction tape and the current hard-copy transaction log D. The current hard-copy transaction log and the previous day's transaction file
Information for detecting unauthorized input from a terminal would be BEST provided by the: A. console log printout. B. transaction journal. C. automated suspense file listing. D. user error report.
During an implementation review of a multiuser distributed application, the IS auditor finds minor weaknesses in three areas-the initial setting of parameters is improperly installed, weak passwords are being used and some vital reports are not being checked properly. While preparing the audit report, the IS auditor should: A. record the observations separately with the impact of each of them marked against each respective finding. B. advise the manager of probable risks without recording the observations, as the control weaknesses are minor ones. C. record the observations and the risk arising from the collective weaknesses. D. apprise the departmental heads concerned with each observation and properly document it in the report.
With reference to the risk management process, which of the following statements is correct? A. Vulnerabilities can be exploited by a threat. B. Vulnerabilities are events with the potential to cause harm to IS resources. C. Vulnerability exists because of threats associated with use of information resources. D. Lack of user knowledge is an example of a threat.
Which of the following is a benefit of a risk-based approach to audit planning? Audit: A. scheduling may be performed months in advance. B. budgets are more likely to be met by the IS audit staff. C. staff will be exposed to a variety of technologies. D. resources are allocated to the areas of highest concern.
An IS auditor discovers that programmers have update access to the live environment. In this situation, the IS auditor is LEAST likely to be concerned that programmers can: A. authorize transactions. B. add transactions directly to the database. C. make modifications to programs directly. D. access data from live environment and provide faster maintenance.
An enterprise has established a steering committee to oversee its e-business program. The steering committee would MOST likely be involved in the: A. documentation of requirements. B. escalation of project issues. C. design of interface controls. D. specification of reports.
The method of routing traffic through split cable facilities or duplicate cable facilities is called: A. alternative routing. B. diverse routing. C. redundancy. D. circular routing.
When an employee is terminated from service, the MOST important action is to: A. hand over all of the employee's files to another designated employee. B. take a back up of the employee's work. C. notify other employees of the termination. D. disable the employee's logical access.
Which of the following would contribute MOST to an effective business continuity plan (BCP)? The BCP: A. document was circulated to all interested parties. B. planning involved all user departments. C. was approved by senior management. D. was audited by an external IS auditor.