Which of the following is a characteristic of the parallel approach to information security?

A. Compliance is discretionary.
B. Security is the responsibility of the IT department.
C. Little or no organizational accountability exists.
D. All the above.


Answer: D
Explanation: The parallel approach to information security views the security as a responsibility of the IT department, with no organizational accountability, and no requirements for compliance.

Computer Science & Information Technology

You might also like to view...

What are seven essential items that the analyst should include in performing a Web site traffic analysis?

What will be an ideal response?

Computer Science & Information Technology

The following segment of code: cout<<"Hello students"; is an example of a(n):

A. statement. B. input parameter list. C. operator. D. return type.

Computer Science & Information Technology

Why has Ethernet been so successful?

What will be an ideal response?

Computer Science & Information Technology

Describe some of the problems you may encounter if you decide to build your own forensics workstation.

What will be an ideal response?

Computer Science & Information Technology