1. JOJI ILAGAN CAREER CENTER FOUNDATION, INC.
COLLEGE OF BUSINESS AND TOURISM
Gov. Chavez St., Davao City
Com Ed 8 – Internet Application
FINAL EXAMINATION JEFF REY A. COMIDOY
2nd Sem SY 2012-2013 Com Ed Instructor
75 Points
I. Choose the letter of the correct answer.
1. An event where companies lose control of the data they collect on their costumers (and other people).
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new
credit cards, and buy expensive goods on credit.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under…
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken
home and used in industries there.
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called...
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
9. Programs that travel with applications to a browser and execute on the user’s computer.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
10. Program written in the Java programming language that could execute and consume a computer’s resources.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
11. Program that could execute on the user’s computer and can run without being compiled
a. Active content b. Java applet c. JavaScript program d. ActiveX components
12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a
computer’s file system
a. Active content b. Java applet c. JavaScript program d. ActiveX components
13. It is a small text file that a Web server creates and stores on your computer’s hard drive.
a. Cookie b. Clickstream c. Web Bugs d. None of these
14. The links you click while visiting the Web site.
a. Cookie b. Clickstream c. Web Bugs d. None of these
15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information
about the person viewing the page of email message and to send the information to a third party.
a. Cookie b. Clickstream c. Web Bugs d. None of these
16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware.
a. Cookie b. Clickstream c. Web Bugs d. None of these
17. A general category of software that includes advertisements to help pay for the product in which they appear.
a. Adware b. Spyware c. Firewall d. Port
18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains.
a. Adware b. Spyware c. Firewall d. Port
19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet.
a. Adware b. Spyware c. Firewall d. Port
20. Like a door on a computer, it permits traffic to leave and enter a computer.
a. Adware b. Spyware c. Firewall d. Port
21. A general term for the process of correctly verifying the identity of a person or a Web site.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
22. An attack in which thieves “fish” for information.
a. Phishing b. Server certificate c. User identification d. Login
23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the
system.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter.
a. Phishing b. Server certificate c. User identification d. Login
2. 27. A process of associating a person and his identification with a very high level of assurance.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
30. A process of identifying yourself to a computer.
a. Phishing b. Server certificate c. User identification d. Login
31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that
would make the task easier. It consists of systematically checking all possible keys until the correct key is found.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
34. Most computer systems implement user identification with user names and passwords; the combination of a user name and password is
sometimes called a…
a. Phishing b. Server certificate c. User identification d. Login
35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
II. (25 pts) Draw the following models:
A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts)
C) Processing a Web Server Digital Certificate (5 pts)
III. (15 pts). Essay. Explain concisely and briefly.
1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international
transactions, which laws should determine the legality of the sale? (5 pts)
2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts)
3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)