When an information security team is faced with a new technology, which of the following is NOT a recommended approach?

A. Determine if the benefits of the proposed technology justify the expected costs.
B. Include costs for any additional risk control requirements that are mandated by the new technology.
C. Consider how the proposed solution will affect the organization's risk exposure.
D. Evaluate how the new technology will enhance employee skills.


Answer: D

Computer Science & Information Technology

You might also like to view...

MC To access a class attribute of a class where no objects exist, the programmer must______ .

a) create a temporary object, access the attribute and destroy the object. b) use the class name followed by the dot operator and attribute name. c) create a reference to the class. d) None of the above.

Computer Science & Information Technology

Which of the following is an invalid definition?

a. string sa = "computers"; b. string sb{"computers"}; c. string sc{"c"3}; d. string sd{9, 'c'};

Computer Science & Information Technology

A cell located in the third row and forth column is named _____.

A. 3D B. C4 C. D3 D. 4C

Computer Science & Information Technology

What specialized network device is commonly used to load balance traffic across multiple servers in a group?

a. Content switch b. Firewall c. DNS server d. Content engine

Computer Science & Information Technology