There are several methods of providing telecommunications
continuity. The method of routing traffic through split
cable or duplicate cable facilities is:

A. alternative routing.

B. diverse routing.

C. long-haul network diversity.

D. last mile circuit protection.



There are several methods of providing telecommunications continuity. The method of routing traffic..

Answer / guest

Answer: B

Diverse routing routes traffic through split cable
facilities or duplicate cable facilities. This can be
accomplished with different and/or duplicate cable sheaths.
If different cable sheaths are used, the cable may be in the
same conduit and therefore subject to the same interruptions
as the cable it is backing up. The communication service
subscriber can duplicate the facilities by having alternate
routes, although the entrance to and from the customer
premises may be in the same conduit. The subscriber can
obtain diverse routing and alternate routing from the local
carrier, including dual entrance facilities. This type of
access is time-consuming and costly. Alternative routing is
a method of routing information via an alternate medium such
as copper cable or fiber optics. This involves use of
different networks, circuits or end points should the normal
network be unavailable. Long-haul network diversity is a
diverse long-distance network utilizing T-1 circuits among
the major long-distance carriers. It ensures long-distance
access should any one carrier experience a network failure.
Last mile circuit protection is a redundant combination of
local carrier T-1s, microwave and/or coaxial cable access to
the local communications loop. This enables the facility to
have access during a local carrier communication disaster.
Alternate local carrier routing also is utilized.

Is This Answer Correct ?    27 Yes 4 No

Post New Answer

More CISA Certification Interview Questions

The editing/validation of data entered at a remote site would be performed MOST effectively at the: A. central processing site after running the application system. B. central processing site during the running of the application system. C. remote processing site after transmission to the central processing site. D. remote processing site prior to transmission of the data to the central processing site.

1 Answers  


After installing a network, an organization installed a vulnerability assessment tool or security scanner to identify possible weaknesses. Which is the MOST serious risk associated with such tools? A. Differential reporting B. False positive reporting C. False negative reporting D. Less detail reporting

1 Answers  


In a risk-based audit approach an IS auditor should FIRST complete a/an: A. inherent risk assessment. B. control risk assessment. C. test of control assessment. D. substantive test assessment.

1 Answers  


An organization is experiencing a growing backlog of undeveloped applications. As part of a plan to eliminate this backlog, end-user computing with prototyping, supported by the acquisition of an interactive application generator system is being introduced. Which of the following areas is MOST critical to the ultimate success of this venture? A. Data control B. Systems analysis C. Systems programming D. Application programming

1 Answers  


Which of the following is MOST likely to result from a business process reengineering (BPR) project? A. An increased number of people using technology B. Significant cost savings, through a reduction in the complexity of information technology C. A weaker organizational structures and less accountability D. Increased information protection (IP) risk will increase

1 Answers  






The potential for unauthorized system access by way of terminals or workstations within an organization's facility is increased when: A. connecting points are available in the facility to connect laptops to the network. B. users take precautions to keep their passwords confidential. C. terminals with password protection are located in unsecured locations. D. terminals are located within the facility in small clusters under the supervision of an administrator.

1 Answers  


The PRIMARY reason for using digital signatures is to ensure data: A. confidentiality. B. integrity. C. availability. D. timeliness.

1 Answers  


Which of the following facilitates program maintenance? A. More cohesive and loosely coupled programs B. Less cohesive and loosely coupled programs C. More cohesive and strongly coupled programs D. Less cohesive and strongly coupled programs

1 Answers  


Which of the following is the MOST effective technique for providing security during data transmission? A. Communication log B. Systems software log C. Encryption D. Standard protocol

1 Answers  


While planning an audit, an assessment of risk should be made to provide: A. reasonable assurance that the audit will cover material items. B. definite assurance that material items will be covered during the audit work. C. reasonable assurance that all items will be covered by the audit. D. sufficient assurance that all items will be covered during the audit work.

1 Answers  


An organization is introducing a single sign-on (SSO) system. Under the SSO system, users will be required to enter only one user ID and password for access to all application systems. Under the SSO system, unauthorized access: A. is less likely. B. is more likely. C. will have a greater impact. D. will have a smaller impact.

1 Answers  


While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/back up at an offsite location would be: A. shadow file processing. B. electronic vaulting. C. hard-disk mirroring. D. hot-site provisioning.

2 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)