A security manager in a government post needs to hire an outside consultant to perform risk analysis. A relative of the security manager is qualified to perform the work. The security manager should:

a. Document why the relative is the best choice
b. Consider alternative consultants instead
c. Recuse himself from the decision-making process
d. Hire the relative


c. Recuse himself from the decision-making process

Computer Science & Information Technology

You might also like to view...

Tools for programmers include what platforms?

A) C#, XAML, and HTML/JavaScript for Windows Phone B) Java and AXML for Android devices C) Objective C and IUKit for iOS devices D) C#, XAML, and HTML/JavaScript for Windows and IOS devices E) A, B, and C F) B, C, and D

Computer Science & Information Technology

In HCI, well-being means concern for the human's:

A) physical state, such as comfort, safety, and health. B) physical and psychological state. C) psychological state, such as system acceptance, technology-stress, and software frustration. D) physical environment, such as keyboard ergonomics and lighting.

Computer Science & Information Technology

What type of e-commerce would be utilized when an individual develops his or her own Web page and takes orders directly for goods and services?

A) consumer to individual B) individual to individual C) consumer to consumer D) business to individual

Computer Science & Information Technology

How many servers does an organization need to create a DFS replication group, and how are these servers designated?

What will be an ideal response?

Computer Science & Information Technology