connections. Unlike a packet-filtering gateway, a proxy-based firewall
does not forward any packets. Mapping between media access control (MAC)
and IP addresses is a task for protocols such as Address Resolution
Protocol/Reverse Address Resolution Protocol (ARP/RARP).
520
、
Which of the following ensures the availability of transactions in
the event of a disaster?
A
、
Send tapes hourly containing transactions offsite.
B
、
Send tapes daily containing transactions offsite.
C
、
Capture transactions to multiple storage devices.
D
、
Transmit transactions offsite in real time.
ANSWER:D
NOTE:The only way to ensure availability of all transactions is to perform
a real-time transmission to an offsite facility. Choices A and B are not
in real time and, therefore, would not include all the transactions.
Choice C does not ensure availability at an offsite location.
521
、
A review of wide area network (WAN) usage discovers that traffic on
one communication line between sites, synchronously linking the master and
standby database, peaks at 96 percent of the line capacity. An IS auditor
should conclude that:
A
、
analysis is required to determine if a pattern emerges that results
in a service loss for a short period of time.
B
、
WAN capacity is adequate for the maximum traffic demands since
saturation has not been reached.
C
、
the line should immediately be replaced by one with a larger
capacity to provide approximately 85 percent saturation.
D
、
users should be instructed to reduce their traffic demands or
distribute them across all service hours to flatten bandwidth consumption.
ANSWER:A
NOTE:The peak at 96 percent could be the result of a one-off incident,
e.g., a user downloading a large amount of data; therefore, analysis to
establish whether this is a regular pattern and what causes this behavior
should be carried out before expenditure on a larger line capacity is
recommended. Since the link provides for a standby database, a short loss
of this service should be acceptable. If the peak is established to be a
regular occurrence without any other opportunities for mitigation (usage
of bandwidth reservation protocol, or other types of prioritizing network
traffic), the line should be replaced as there is the risk of loss of
service as the traffic approaches 100 percent. If, however, the peak is a