Facilitating telecommunications continuity by providing
redundant combinations of local carrier T-1 lines,
microwaves and/or coaxial cables to access the local
communication loop is:
A. last mile circuit protection.
B. long haul network diversity.
C. diverse routing.
D. alternative routing.
Answer / guest
Answer: A
The method of providing telecommunication continuity through
the use of many recovery facilities providing redundant
combinations of local carrier T-1s, microwave and/or coaxial
cable to access the local communication loop in the event of
a disaster is called last mile circuit protection. Providing
diverse long-distance network availabilty utilizing T-1
circuits among major long-distance carriers is called long
haul network diversity. This ensures long-distance access
should any one carrier experience a network failure. The
method of routing traffic through split cable facilities or
duplicate cable facilities is called diverse routing.
Alternative routing is the method of routing information via
an alternative medium, such as copper cable or fiber optics.
Is This Answer Correct ? | 16 Yes | 0 No |
A utility is available to update critical tables in case of data inconsistency. This utility can be executed at the OS prompt or as one of menu options in an application. The BEST control to mitigate the risk of unauthorized manipulation of data is to: A. delete the utility software and install it as and when required. B. provide access to utility on a need-to-use basis. C. provide access to utility to user management D. define access so that the utility can be only executed in menu option.
With reference to the risk management process, which of the following statements is correct? A. Vulnerabilities can be exploited by a threat. B. Vulnerabilities are events with the potential to cause harm to IS resources. C. Vulnerability exists because of threats associated with use of information resources. D. Lack of user knowledge is an example of a threat.
An IS auditor conducting an access controls review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that: A. exposure is greater since information is available to unauthorized users. B. operating efficiency is enhanced since anyone can print any report, any time. C. operating procedures are more effective since information is easily available. D. user friendliness and flexibility is facilitated since there is a smooth flow of information among users.
Which of the following would be included in an IS strategic plan?
Failure to adequately define or manage the requirements for a system can result in a number of risks. The GREATEST risk is: A. inadequate user involvement. B. inadequate allocation of resources. C. scope creep. D. an incorrect estimation of the critical path.
Which of the following would provide a mechanism whereby IS management can determine if the activities of the organization have deviated from the planned or expected levels? A. Quality management B. IS assessment methods C. Management principles D. Industry standards/benchmarking
During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely: A. review access control configuration. B. evaluate interface testing. C. review detailed design documentation. D. evaluate system testing.
The IS department of an organization wants to ensure that the computer files, used in the information processing facility, are backed up adequately to allow for proper recovery. This is a/an: A. control procedure. B. control objective. C. corrective control. D. operational control.
Which of these has the potential to improve security incident response processes? A. Review the incident response procedures. B. Post-mortem or post-event reviews by the security team. C. Getting the hot-site ready. D. Reviw the BCP plan every six months
An IS auditor involved as a team member in the detailed system design phase of a system under development would be MOST concerned with: A. internal control procedures. B. user acceptance test schedules. C. adequacy of the user training program. D. clerical processes for resubmission of rejected items.
Which of the following is the MOST effective technique for providing security during data transmission? A. Communication log B. Systems software log C. Encryption D. Standard protocol
1. which of the following is used to achieve accountability. a.identification b. authentication c. authorization d. iniation