The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?
A. Provide identity management and trust support services.
B. Provide disruptive technologies.
C. Provide incident management capabilities.
D. Provide Internet routing, access, and communications services.
Answer: B
You might also like to view...
A group of items that come one after another in succession is called:
A) a data marker. B) legend. C) tabs. D) a series.
A surprising number of problems fall into the "____" category.
A. suspected intractable B. approximation algorithm C. bin-packing D. declared intractable
Match each of the following terms to their meanings:I.HeaderII.FooterIII.PictureIV.TabV.ViewA.One or more lines at the top of each pageB.Various ways a file can appear on the screenC.Digital photo, defined as a graphic element retrieved from storage media D.Designed to appear much like a top extension on a file folderE. One or more lines at the bottom of each page
Fill in the blank(s) with the appropriate word(s).
An enterprise might have computers installed at different geographic locations needing to view and update data at a central office. What is the best option to use?
A. BitLocker B. BitLocker to Go C. EFS D. BranchCache