Which one of the following is a disadvantage of placing security within IT?

A. The centralizing of security and IT under the CIO
B. It is attractive because security and IT possess many of the same qualities and technological skills
C. The CIO would have IT implement security and is likely to back the security department in its effort to create a strong and safe information system for the organization
D. Security has no independence from IT and it is hard to blow the whistle on security issues occurring within the IT department or by the CIO


D. Security has no independence from IT and it is hard to blow the whistle on security issues occurring within the IT department or by the CIO

Computer Science & Information Technology

You might also like to view...

Capability models that are used to improve ICT product integrity, are also known as __________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The pecondition for the while statement is called an ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which is the formula of the necessary sample size (n), where p is the proportion of the population having the attribute and p is the standard error of the proportion?

A) n = p(1 - p) + 1 B) n = p(1 - p) / 2 + 1 C) n = p(1 - p) / 2 D) n = p(1 + p) / 2 + 1

Computer Science & Information Technology

____ is an accumulating statement.

A. total += num; B. total++; C. ++total; D. total *= num;

Computer Science & Information Technology