As noted by Kosutic, options for placing the CISO (and his or her security group) in the organization are generally driven by organizational size and include all of the following EXCEPT:

A. within a division/department with a conflict of interest
B. in a separate group reporting directly to the CEO/president
C. under a division/department with no conflict of interest
D. as an additional duty for an existing manager/executive


Answer: A

Computer Science & Information Technology

You might also like to view...

_________ occurs whenever an individual gains admission to a computer, network, file, or other computing resource without permission. A. Unauthorized access B. Network routing C. Network evasion D. Unauthorized termination

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The printDocument() method of the Window object prints the document displayed in the current window.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are the relative merits of open?loop and closed?loop data transfers? What factors would you take into account if you had to choose one over the other for a specific application?

What will be an ideal response?

Computer Science & Information Technology

Discuss several ways text can be modified.

What will be an ideal response?

Computer Science & Information Technology