nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #435

CERTIFIED-IN-CYBERSECURITY Question #435: Real Exam Question with Answer & Explanation

The correct answer is D: Duplicate components as a backup in case of failure. The concept of redundancy in system design refers to the inclusion of duplicate components as a backup in case of failure (see ISC2 Study Guide, Chapter 4, Module 3). For example, a data center may have multiple power supplies so that if one fails, the others can continue to prov

Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts

Question

What is the concept of redundancy in system design?

Options

  • AUsage of complex components to ensure security
  • BDuplicate components to ensure diversity of suppliers
  • CUsage of minimal components to save costs
  • DDuplicate components as a backup in case of failure

Explanation

The concept of redundancy in system design refers to the inclusion of duplicate components as a backup in case of failure (see ISC2 Study Guide, Chapter 4, Module 3). For example, a data center may have multiple power supplies so that if one fails, the others can continue to provide power and prevent downtime. The remaining options do not accurately represent the concept of redundancy in system design. In particular, duplicating components to ensure diversity of suppliers is not the primary purpose of redundancy. The primary goal is to provide a backup in case of failure. Using minimal components to save costs is the opposite of redundancy. In fact, redundancy often adds cost because it requires the purchase and maintenance of additional components. Finally, using complex components to provide security has nothing to do with redundancy. While complex components may provide additional security features, they do not provide a backup in case of failure, which is the primary goal of redundancy.

Topics

#Redundancy#System Design#Fault Tolerance#Availability

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions