CIS 333 RANK Education Technician / cis333rank.com

Page 13

cookies, and the like, consuming computing resources and reducing user productivity. These are known as ________. Question 105 One of the ways that malicious code can threaten businesses is by causing economic damage or loss due to the theft, destruction, or unauthorized manipulation of sensitive data. These are known as ________. Question 106 Which of the following describes the Internet Engineering Task Force (IETF)? Question 107 The ________________ is a subcommittee of the IETF that serves as an advisory body to the Internet Society (ISOC). It is composed of independent researchers and professionals who have a technical interest in the well-being of the Internet. Question 108 The ________ is the main United Nations agency responsible for managing and promoting information and technology issues. Question 109 The __________ is a national program that empowers and encourages excellence among U.S. organizations, including manufacturers, service organizations, educational institutions, health care providers, and nonprofit organizations. Question 110 The ________ is a U.S. standards organization whose goal is to empower its members and constituents to strengthen the U.S. marketplace position in the global economy, while helping to ensure the safety and health of consumers and the protection of the environment. Question 111 The four main areas in NIST SP 800-50 are awareness, training, education, and __________________. Question 112 With university doctoral programs, completing the degree requirements takes ________.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.