Facilitating telecommunications continuity by providing
redundant combinations of local carrier T-1 lines,
microwaves and/or coaxial cables to access the local
communication loop is:

A. last mile circuit protection.

B. long haul network diversity.

C. diverse routing.

D. alternative routing.



Facilitating telecommunications continuity by providing redundant combinations of local carrier T-1..

Answer / guest

Answer: A

The method of providing telecommunication continuity through
the use of many recovery facilities providing redundant
combinations of local carrier T-1s, microwave and/or coaxial
cable to access the local communication loop in the event of
a disaster is called last mile circuit protection. Providing
diverse long-distance network availabilty utilizing T-1
circuits among major long-distance carriers is called long
haul network diversity. This ensures long-distance access
should any one carrier experience a network failure. The
method of routing traffic through split cable facilities or
duplicate cable facilities is called diverse routing.
Alternative routing is the method of routing information via
an alternative medium, such as copper cable or fiber optics.

Is This Answer Correct ?    16 Yes 0 No

Post New Answer

More CISA Certification Interview Questions

A utility is available to update critical tables in case of data inconsistency. This utility can be executed at the OS prompt or as one of menu options in an application. The BEST control to mitigate the risk of unauthorized manipulation of data is to: A. delete the utility software and install it as and when required. B. provide access to utility on a need-to-use basis. C. provide access to utility to user management D. define access so that the utility can be only executed in menu option.

2 Answers  


With reference to the risk management process, which of the following statements is correct? A. Vulnerabilities can be exploited by a threat. B. Vulnerabilities are events with the potential to cause harm to IS resources. C. Vulnerability exists because of threats associated with use of information resources. D. Lack of user knowledge is an example of a threat.

1 Answers  


An IS auditor conducting an access controls review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that: A. exposure is greater since information is available to unauthorized users. B. operating efficiency is enhanced since anyone can print any report, any time. C. operating procedures are more effective since information is easily available. D. user friendliness and flexibility is facilitated since there is a smooth flow of information among users.

2 Answers  


Which of the following would be included in an IS strategic plan?

7 Answers   Deloitte,


Failure to adequately define or manage the requirements for a system can result in a number of risks. The GREATEST risk is: A. inadequate user involvement. B. inadequate allocation of resources. C. scope creep. D. an incorrect estimation of the critical path.

1 Answers  






Which of the following would provide a mechanism whereby IS management can determine if the activities of the organization have deviated from the planned or expected levels? A. Quality management B. IS assessment methods C. Management principles D. Industry standards/benchmarking

1 Answers  


During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely: A. review access control configuration. B. evaluate interface testing. C. review detailed design documentation. D. evaluate system testing.

1 Answers  


The IS department of an organization wants to ensure that the computer files, used in the information processing facility, are backed up adequately to allow for proper recovery. This is a/an: A. control procedure. B. control objective. C. corrective control. D. operational control.

2 Answers  


Which of these has the potential to improve security incident response processes? A. Review the incident response procedures. B. Post-mortem or post-event reviews by the security team. C. Getting the hot-site ready. D. Reviw the BCP plan every six months

1 Answers  


An IS auditor involved as a team member in the detailed system design phase of a system under development would be MOST concerned with: A. internal control procedures. B. user acceptance test schedules. C. adequacy of the user training program. D. clerical processes for resubmission of rejected items.

1 Answers  


Which of the following is the MOST effective technique for providing security during data transmission? A. Communication log B. Systems software log C. Encryption D. Standard protocol

1 Answers  


1. which of the following is used to achieve accountability. a.identification b. authentication c. authorization d. iniation

5 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)