Mechanisms exist to separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats.
Does the organization separate the alternate storage site from the primary storage site to reduce susceptibility to similar threats?