This person would be responsible for some aspect of information security and report to the CISO; in smaller organizations, this title may be assigned to the only or senior security administrator.

A. security technician
B. security analyst
C. security consultant
D. security manager


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following Windows 7 features asks for permission before allowing changes to your system settings?

A) UAC B) Windows firewall C) Windows Updates D) Action Center

Computer Science & Information Technology

Explain how to check the USB power usage in Windows.

What will be an ideal response?

Computer Science & Information Technology

A color value of (1, 1, 1) represents the color:

a. black b. yellow c. aqua d. white

Computer Science & Information Technology

Which of the following statements about the NIST Cybersecurity Framework is not true?

A) One of the main goals is to address and manage cybersecurity risk in a cost-effective way to protect critical infrastructure. B) It is aimed to replace an existing risk management process and cybersecurity program in an organization. C) An organization that doesn’t have an existing cybersecurity program can use the NIST Cybersecurity Framework as a reference to develop such a program. D) The NIST Cybersecurity Framework is developed with a common taxonomy.

Computer Science & Information Technology