Which of the following job roles bring the least security knowledge to the discussion, while holding a disproportional amount of influence on the decisions made concerning security?

A. IT engineers
B. upper management
C. department heads
D. security professionals


B
Explanation: While in most cases they bring the least security knowledge to the discussion, upper management holds a disproportional amount of influence on the decisions made concerning security. Their decisions are driven by business need, rather than by any fascination with the latest security toys or by their concern with security. In fact, most top level management only thinks about security when emergencies occur.

Computer Science & Information Technology

You might also like to view...

Given the following function definition, will repeated calls to the search function for the same target find all occurrences of that target in the array?

int search(const int array[], int target, int numElements) { int index=0; bool found=false; while((!found) && (index < numElements)) { if(array[index] == target) found=true; else index++; } if(found==true) return index; else return -1; } a. Yes b. No c. Impossible to tell without looking at the values of the array d. It depends on the value of target.

Computer Science & Information Technology

____ masks are resolution independent and are created with a pen or shape tool.

a. Bitmap b. Vector c. Rendered d. Raster

Computer Science & Information Technology

The precedence of an operator establishes its priority relative to all other operators.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other?

A. streamlining B. discovering C. docking D. pairing

Computer Science & Information Technology