Which of the following is a characteristic of the silo-based approach to cybersecurity?

A) Compliance is discretionary.
B) Security is the responsibility of the IT department.
C) Little or no organizational accountability exists.
D) All of the above

D) All of the above

Computer Science & Information Technology

You might also like to view...

In Alice, messages that produce a behavior are called ____.

A. routines B. methods C. procedures D. actions

Computer Science & Information Technology

Choose the special character that is used to indicate a blank space.

a. ``` ␣ ``` b. ```   ``` c. ``` © ``` d. ``` &space; ```

Computer Science & Information Technology