SlideShare ist ein Scribd-Unternehmen logo
1 von 2
JOJI ILAGAN CAREER CENTER FOUNDATION, INC.
COLLEGE OF BUSINESS AND TOURISM
Gov. Chavez St., Davao City
Com Ed 8 – Internet Application
FINAL EXAMINATION JEFF REY A. COMIDOY
2nd Sem SY 2012-2013 Com Ed Instructor
75 Points
I. Choose the letter of the correct answer.
1. An event where companies lose control of the data they collect on their costumers (and other people).
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new
credit cards, and buy expensive goods on credit.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under…
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken
home and used in industries there.
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called...
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
9. Programs that travel with applications to a browser and execute on the user’s computer.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
10. Program written in the Java programming language that could execute and consume a computer’s resources.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
11. Program that could execute on the user’s computer and can run without being compiled
a. Active content b. Java applet c. JavaScript program d. ActiveX components
12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a
computer’s file system
a. Active content b. Java applet c. JavaScript program d. ActiveX components
13. It is a small text file that a Web server creates and stores on your computer’s hard drive.
a. Cookie b. Clickstream c. Web Bugs d. None of these
14. The links you click while visiting the Web site.
a. Cookie b. Clickstream c. Web Bugs d. None of these
15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information
about the person viewing the page of email message and to send the information to a third party.
a. Cookie b. Clickstream c. Web Bugs d. None of these
16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware.
a. Cookie b. Clickstream c. Web Bugs d. None of these
17. A general category of software that includes advertisements to help pay for the product in which they appear.
a. Adware b. Spyware c. Firewall d. Port
18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains.
a. Adware b. Spyware c. Firewall d. Port
19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet.
a. Adware b. Spyware c. Firewall d. Port
20. Like a door on a computer, it permits traffic to leave and enter a computer.
a. Adware b. Spyware c. Firewall d. Port
21. A general term for the process of correctly verifying the identity of a person or a Web site.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
22. An attack in which thieves “fish” for information.
a. Phishing b. Server certificate c. User identification d. Login
23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the
system.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter.
a. Phishing b. Server certificate c. User identification d. Login
27. A process of associating a person and his identification with a very high level of assurance.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
30. A process of identifying yourself to a computer.
a. Phishing b. Server certificate c. User identification d. Login
31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that
would make the task easier. It consists of systematically checking all possible keys until the correct key is found.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
34. Most computer systems implement user identification with user names and passwords; the combination of a user name and password is
sometimes called a…
a. Phishing b. Server certificate c. User identification d. Login
35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
II. (25 pts) Draw the following models:
A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts)
C) Processing a Web Server Digital Certificate (5 pts)
III. (15 pts). Essay. Explain concisely and briefly.
1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international
transactions, which laws should determine the legality of the sale? (5 pts)
2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts)
3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)

Weitere ähnliche Inhalte

Was ist angesagt?

iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Securityrambmohan
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Dr. Ramchandra Mangrulkar
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET Journal
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishingIJCSES Journal
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...eSAT Publishing House
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiYury Chemerkin
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of InternetMohit Kanwar
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 

Was ist angesagt? (19)

iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Phishing
PhishingPhishing
Phishing
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
2310 b 16
2310 b 162310 b 16
2310 b 16
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 

Ähnlich wie Com Ed 8 Finals

Sy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicSy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicjenie Emmons
 
Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05BookStoreLib
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comVirendra Kumar Dubey
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-teststacio
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released verslatashiadegale
 
Chapter 12 protection_mechanisms
Chapter 12 protection_mechanismsChapter 12 protection_mechanisms
Chapter 12 protection_mechanismshusseinalshomali
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptxHHoko1
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdfAliza Oscar
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security KeysFIDO Alliance
 
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxMarkCesarVillanueva
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 

Ähnlich wie Com Ed 8 Finals (20)

Sy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicSy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magic
 
Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released vers
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Chapter 12 protection_mechanisms
Chapter 12 protection_mechanismsChapter 12 protection_mechanisms
Chapter 12 protection_mechanisms
 
Wa
WaWa
Wa
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 
API security
API securityAPI security
API security
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security Keys
 
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
 
3D Password
3D Password3D Password
3D Password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 

Mehr von bluejayjunior

Com ed 2 prelim exam
Com ed 2 prelim examCom ed 2 prelim exam
Com ed 2 prelim exambluejayjunior
 
Intr to-html-xhtml-1233508169541646-3
Intr to-html-xhtml-1233508169541646-3Intr to-html-xhtml-1233508169541646-3
Intr to-html-xhtml-1233508169541646-3bluejayjunior
 
Com ed 4 prelim exam
Com ed 4 prelim examCom ed 4 prelim exam
Com ed 4 prelim exambluejayjunior
 
Chapter1.0 database management system
Chapter1.0 database management systemChapter1.0 database management system
Chapter1.0 database management systembluejayjunior
 
01 Database Management (re-uploaded)
01 Database Management (re-uploaded)01 Database Management (re-uploaded)
01 Database Management (re-uploaded)bluejayjunior
 
03 using the internet (re-uploaded)
03 using the internet (re-uploaded)03 using the internet (re-uploaded)
03 using the internet (re-uploaded)bluejayjunior
 
03 using the internet b (re-upload)
03 using the internet b (re-upload)03 using the internet b (re-upload)
03 using the internet b (re-upload)bluejayjunior
 
02 internet history and growth (re-upload)
02 internet history and growth (re-upload)02 internet history and growth (re-upload)
02 internet history and growth (re-upload)bluejayjunior
 
01 intro to internet (re-upload)
01 intro to internet (re-upload)01 intro to internet (re-upload)
01 intro to internet (re-upload)bluejayjunior
 
Chapter 02 Computer Languages (re-upload)
Chapter 02 Computer Languages (re-upload)Chapter 02 Computer Languages (re-upload)
Chapter 02 Computer Languages (re-upload)bluejayjunior
 
Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)bluejayjunior
 
C++ control structure
C++ control structureC++ control structure
C++ control structurebluejayjunior
 
Joji ilagan career center foundation6final
Joji ilagan career center foundation6finalJoji ilagan career center foundation6final
Joji ilagan career center foundation6finalbluejayjunior
 
reference for finals
reference for finalsreference for finals
reference for finalsbluejayjunior
 
Joji ilagan career center foundation8mid
Joji ilagan career center foundation8midJoji ilagan career center foundation8mid
Joji ilagan career center foundation8midbluejayjunior
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2bluejayjunior
 

Mehr von bluejayjunior (20)

Com ed 2 prelim exam
Com ed 2 prelim examCom ed 2 prelim exam
Com ed 2 prelim exam
 
Introhtml 2
Introhtml 2Introhtml 2
Introhtml 2
 
Intr to-html-xhtml-1233508169541646-3
Intr to-html-xhtml-1233508169541646-3Intr to-html-xhtml-1233508169541646-3
Intr to-html-xhtml-1233508169541646-3
 
Com ed 4 prelim exam
Com ed 4 prelim examCom ed 4 prelim exam
Com ed 4 prelim exam
 
Chapter1.0 database management system
Chapter1.0 database management systemChapter1.0 database management system
Chapter1.0 database management system
 
01 Database Management (re-uploaded)
01 Database Management (re-uploaded)01 Database Management (re-uploaded)
01 Database Management (re-uploaded)
 
03 using the internet (re-uploaded)
03 using the internet (re-uploaded)03 using the internet (re-uploaded)
03 using the internet (re-uploaded)
 
03 using the internet b (re-upload)
03 using the internet b (re-upload)03 using the internet b (re-upload)
03 using the internet b (re-upload)
 
02 internet history and growth (re-upload)
02 internet history and growth (re-upload)02 internet history and growth (re-upload)
02 internet history and growth (re-upload)
 
01 intro to internet (re-upload)
01 intro to internet (re-upload)01 intro to internet (re-upload)
01 intro to internet (re-upload)
 
Chapter 02 Computer Languages (re-upload)
Chapter 02 Computer Languages (re-upload)Chapter 02 Computer Languages (re-upload)
Chapter 02 Computer Languages (re-upload)
 
Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)
 
C++ control structure
C++ control structureC++ control structure
C++ control structure
 
Joji ilagan career center foundation6final
Joji ilagan career center foundation6finalJoji ilagan career center foundation6final
Joji ilagan career center foundation6final
 
internet security 2
internet security 2internet security 2
internet security 2
 
reference for finals
reference for finalsreference for finals
reference for finals
 
Internet Secutiry
Internet SecutiryInternet Secutiry
Internet Secutiry
 
Joji ilagan career center foundation8mid
Joji ilagan career center foundation8midJoji ilagan career center foundation8mid
Joji ilagan career center foundation8mid
 
00 Com Ed 6 Midterm
00 Com Ed 6 Midterm00 Com Ed 6 Midterm
00 Com Ed 6 Midterm
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2
 

Kürzlich hochgeladen

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Kürzlich hochgeladen (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Com Ed 8 Finals

  • 1. JOJI ILAGAN CAREER CENTER FOUNDATION, INC. COLLEGE OF BUSINESS AND TOURISM Gov. Chavez St., Davao City Com Ed 8 – Internet Application FINAL EXAMINATION JEFF REY A. COMIDOY 2nd Sem SY 2012-2013 Com Ed Instructor 75 Points I. Choose the letter of the correct answer. 1. An event where companies lose control of the data they collect on their costumers (and other people). a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new credit cards, and buy expensive goods on credit. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under… a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken home and used in industries there. a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called... a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 9. Programs that travel with applications to a browser and execute on the user’s computer. a. Active content b. Java applet c. JavaScript program d. ActiveX components 10. Program written in the Java programming language that could execute and consume a computer’s resources. a. Active content b. Java applet c. JavaScript program d. ActiveX components 11. Program that could execute on the user’s computer and can run without being compiled a. Active content b. Java applet c. JavaScript program d. ActiveX components 12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a computer’s file system a. Active content b. Java applet c. JavaScript program d. ActiveX components 13. It is a small text file that a Web server creates and stores on your computer’s hard drive. a. Cookie b. Clickstream c. Web Bugs d. None of these 14. The links you click while visiting the Web site. a. Cookie b. Clickstream c. Web Bugs d. None of these 15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information about the person viewing the page of email message and to send the information to a third party. a. Cookie b. Clickstream c. Web Bugs d. None of these 16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware. a. Cookie b. Clickstream c. Web Bugs d. None of these 17. A general category of software that includes advertisements to help pay for the product in which they appear. a. Adware b. Spyware c. Firewall d. Port 18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains. a. Adware b. Spyware c. Firewall d. Port 19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet. a. Adware b. Spyware c. Firewall d. Port 20. Like a door on a computer, it permits traffic to leave and enter a computer. a. Adware b. Spyware c. Firewall d. Port 21. A general term for the process of correctly verifying the identity of a person or a Web site. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 22. An attack in which thieves “fish” for information. a. Phishing b. Server certificate c. User identification d. Login 23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter. a. Phishing b. Server certificate c. User identification d. Login
  • 2. 27. A process of associating a person and his identification with a very high level of assurance. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 30. A process of identifying yourself to a computer. a. Phishing b. Server certificate c. User identification d. Login 31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It consists of systematically checking all possible keys until the correct key is found. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 34. Most computer systems implement user identification with user names and passwords; the combination of a user name and password is sometimes called a… a. Phishing b. Server certificate c. User identification d. Login 35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key II. (25 pts) Draw the following models: A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts) C) Processing a Web Server Digital Certificate (5 pts) III. (15 pts). Essay. Explain concisely and briefly. 1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international transactions, which laws should determine the legality of the sale? (5 pts) 2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts) 3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)