Match the organization with its function

7. Department of Education
a. mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
8. National Infrastructure Advisory Council b. compares its databases with those of the FBI to verify identities in Project Strikeback
9. National Security Agency c. promotes awareness of best practices of cybersecurity
10. Department of Defense d. employs software to analyze phone records and other voluminous data


Answer: 7. b
8. c
9. d
10. a

Computer Science & Information Technology

You might also like to view...

The sequence containers ____________ and containers are collectively referred to as the firstclass containers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____________________ implementation technique supports close to constant time accesses, insertions, and removals of elements from a collection.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What secure protocol is recommended for Network address translation?

A. SRTP B. S/MIME C. IMAP D. IPsec

Computer Science & Information Technology

?Which type of report typically takes place in an attorney's office?

A. ?Examination Plan B. ?Written Report C. ?Preliminary Report D. ?Verbal Report

Computer Science & Information Technology