Which of the following is a characteristic of the parallel approach to information security?
A. Compliance is discretionary.
B. Security is the responsibility of the IT department.
C. Little or no organizational accountability exists.
D. All the above.
Answer: D
Explanation: The parallel approach to information security views the security as a responsibility of the IT department, with no organizational accountability, and no requirements for compliance.
You might also like to view...
What are seven essential items that the analyst should include in performing a Web site traffic analysis?
What will be an ideal response?
The following segment of code: cout<<"Hello students"; is an example of a(n):
A. statement. B. input parameter list. C. operator. D. return type.
Why has Ethernet been so successful?
What will be an ideal response?
Describe some of the problems you may encounter if you decide to build your own forensics workstation.
What will be an ideal response?