Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


A large chain of shops with EFT at point-of-sale devices has
a central communications processor for connecting to the
banking network. Which of the following is the BEST disaster
recovery plan for the communications processor?

A. Offsite storage of daily backups

B. Alternative standby processor onsite

C. Installation of duplex communication links

D. Alternative standby processor at another network node

Answers were Sorted based on User's Feedback



A large chain of shops with EFT at point-of-sale devices has a central communications processor for..

Answer / guest

Answer: D

Having an alternative standby processor at another network
node would be the best. The unavailability of the central
communications processor would disrupt all access to the
banking network resulting in the disruption of operations
for all of the shops. This could be caused by failure of
equipment, power or communications. Offsite storage of
backups would not help since EFT tends to be an online
process and offsite storage will not replace the
dysfunctional processor. The provision of an alternate
processor onsite would be fine if it were an equipment
problem, but would not help if the outage were caused by
power, for example. Installation of duplex communication
links would be most appropriate if it were only the
communication link that failed.

Is This Answer Correct ?    9 Yes 0 No

A large chain of shops with EFT at point-of-sale devices has a central communications processor for..

Answer / guest

D. Alternative standby processor at another network node

Is This Answer Correct ?    3 Yes 0 No

A large chain of shops with EFT at point-of-sale devices has a central communications processor for..

Answer / antoine

D. Alternative standby processor at another network node

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CISA Certification Interview Questions

In a risk-based audit approach, an IS auditor should FIRST complete :

7 Answers  


Which of the following is the MOST effective control over visitor access to a data center? A. Visitors are escorted. B. Visitor badges are required. C. Visitors sign in. D. Visitors are spot-checked by operators.

1 Answers  


The feature of a digital signature that ensures the sender cannot later deny generating and sending the message is: A. data integrity. B. authentication. C. nonrepudiation. D. replay protection.

1 Answers  


An IS auditor is assigned to help design the data security aspects of an application under development. Which of the following provides the MOST reasonable assurance that corporate assets are protected when the application is certified for production? A. A review conducted by the internal auditor B. A review conducted by the assigned IS auditor C. Specifications by the user on the depth and content of the review D. An independent review conducted by another equally experienced IS auditor

1 Answers  


Which of the following forms of evidence for the auditor would be considered the MOST reliable? A. An oral statement from the auditee B. The results of a test performed by an IS auditor C. An internally generated computer accounting report D. A confirmation letter received from an outside source

2 Answers  


Which of the following applet intrusion issues poses the GREATEST risk of disruption to an organization? A. A program that deposits a virus on a client machine B. Applets recording keystrokes and, therefore, passwords C. Downloaded code that reads files on a client's hard drive D. Applets opening connections from the client machine

1 Answers  


The Primary purpose of audit trails is to

6 Answers  


Losses can be minimized MOST effectively by using outside storage facilities to do which of the following? A. Provide current, critical information in backup files B. Ensure that current documentation is maintained at the backup facility C. Test backup hardware D. Train personnel in backup procedures

1 Answers  


The difference between a vulnerability assessment and a penetration test is that a vulnerability assessment: A. searches and checks the infrastructure to detect vulnerabilities, whereas penetration testing intends to exploit the vulnerabilities to probe the damage that could result from the vulnerabilities. B. and penetration tests are different names for the same activity. C. is executed by automated tools, whereas penetration testing is a totally manual process. D. is executed by commercial tools, whereas penetration testing is executed by public processes.

1 Answers  


When reviewing a service level agreement for an outsourced computer center an IS auditor should FIRST determine that: A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.

1 Answers  


Which of the following systems-based approaches would a financial processing company employ to monitor spending patterns to identify abnormal patterns and report them? A. A neural network B. Database management software C. Management information systems D. Computer assisted audit techniques

2 Answers  


In a risk-based audit approach an IS auditor should FIRST complete a/an: A. inherent risk assessment. B. control risk assessment. C. test of control assessment. D. substantive test assessment.

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)