COGNITIVE ASSESSMENT
Who is responsible for the security of data and information stored on computers and mobile devices within an organization?

A. computer security specialist
B. security system project manager
C. security analyst
D. digital forensics analyst


Answer: A

Computer Science & Information Technology

You might also like to view...

The man command in the following session is used to save the manual page for the tcsh command in the tcsh.man file. The output of the ls -l tcsh.man command shows that the size of tcsh.man file is 252679 bytes. The gzip tcsh.man command compresses the tcsh.man file and saves it in the tcsh.man.gz file. The output of the gzip -l tcsh.man command shows that 70.8% disk space is saved by storing the compressed version of the tcsh.man file.

What will be an ideal response?

Computer Science & Information Technology

The method paint has one parameter of type:

(a) Shape (b) Graphics (c) Image (d) String

Computer Science & Information Technology

A Web site's privacy policy in an easy-to-understand format is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is NOT a design guideline when creating a new presentation?

A. Include only essential information. B. Select only one or two fonts that are easy to read. C. Use bullets to show the steps in a process or data that should be examined in order. D. Add elements such as a company name for consistency from slide to slide.

Computer Science & Information Technology