Which of the following is a characteristic of the parallel approach to information security?

A. Compliance is discretionary.
B. Security is the responsibility of the IT department.
C. Little or no organizational accountability exists.
D. All the above.

Answer: D
Explanation: The parallel approach to information security views the security as a responsibility of the IT department, with no organizational accountability, and no requirements for compliance.

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. node II. server III. network server IV. peer-to-peer V. LAN A. computers that are close to each other and connected in a group B. each element on a network C. manages the flow of data between computers in a network D. computers connected in a way so they can communicate directly with each other E. computers that provide services to other computers

Computer Science & Information Technology

The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology