Which of the following organizations assists the President in overseeing the preparation of
the federal budget and to supervise its administration in Executive Branch agencies?
Which of the following types of attacks occurs when an attacker successfully inserts an
intermediary software or program between two communicating hosts?