SlideShare ist ein Scribd-Unternehmen logo
1 von 2
JOJI ILAGAN CAREER CENTER FOUNDATION, INC.
COLLEGE OF BUSINESS AND TOURISM
Gov. Chavez St., Davao City
Com Ed 8 – Internet Application
FINAL EXAMINATION JEFF REY A. COMIDOY
2nd Sem SY 2012-2013 Com Ed Instructor
75 Points
I. Choose the letter of the correct answer.
1. An event where companies lose control of the data they collect on their costumers (and other people).
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new
credit cards, and buy expensive goods on credit.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under…
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken
home and used in industries there.
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called...
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
9. Programs that travel with applications to a browser and execute on the user’s computer.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
10. Program written in the Java programming language that could execute and consume a computer’s resources.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
11. Program that could execute on the user’s computer and can run without being compiled
a. Active content b. Java applet c. JavaScript program d. ActiveX components
12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a
computer’s file system
a. Active content b. Java applet c. JavaScript program d. ActiveX components
13. It is a small text file that a Web server creates and stores on your computer’s hard drive.
a. Cookie b. Clickstream c. Web Bugs d. None of these
14. The links you click while visiting the Web site.
a. Cookie b. Clickstream c. Web Bugs d. None of these
15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information
about the person viewing the page of email message and to send the information to a third party.
a. Cookie b. Clickstream c. Web Bugs d. None of these
16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware.
a. Cookie b. Clickstream c. Web Bugs d. None of these
17. A general category of software that includes advertisements to help pay for the product in which they appear.
a. Adware b. Spyware c. Firewall d. Port
18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains.
a. Adware b. Spyware c. Firewall d. Port
19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet.
a. Adware b. Spyware c. Firewall d. Port
20. Like a door on a computer, it permits traffic to leave and enter a computer.
a. Adware b. Spyware c. Firewall d. Port
21. A general term for the process of correctly verifying the identity of a person or a Web site.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
22. An attack in which thieves “fish” for information.
a. Phishing b. Server certificate c. User identification d. Login
23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the
system.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter.
a. Phishing b. Server certificate c. User identification d. Login
27. A process of associating a person and his identification with a very high level of assurance.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
30. A process of identifying yourself to a computer.
a. Phishing b. Server certificate c. User identification d. Login
31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that
would make the task easier. It consists of systematically checking all possible keys until the correct key is found.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
34. Most computer systems implement user identification with user names and passwords; the combination of a user name and password is
sometimes called a…
a. Phishing b. Server certificate c. User identification d. Login
35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
II. (25 pts) Draw the following models:
A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts)
C) Processing a Web Server Digital Certificate (5 pts)
III. (15 pts). Essay. Explain concisely and briefly.
1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international
transactions, which laws should determine the legality of the sale? (5 pts)
2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts)
3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)

Weitere ähnliche Inhalte

Was ist angesagt?

An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 

Was ist angesagt? (19)

iKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password SecurityiKeyPass...Unbreakable Password Security
iKeyPass...Unbreakable Password Security
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Phishing
PhishingPhishing
Phishing
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
2310 b 16
2310 b 162310 b 16
2310 b 16
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 

Ähnlich wie Com Ed 8 Finals

Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Virendra Kumar Dubey
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released vers
latashiadegale
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
HHoko1
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
monroel
 

Ähnlich wie Com Ed 8 Finals (20)

Sy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magicSy0 401-q&a-demo-cert magic
Sy0 401-q&a-demo-cert magic
 
Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05Laudon traver ec11-tif_ch05
Laudon traver ec11-tif_ch05
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
A software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released versA software designer has realized that a soon-to-be released vers
A software designer has realized that a soon-to-be released vers
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Chapter 12 protection_mechanisms
Chapter 12 protection_mechanismsChapter 12 protection_mechanisms
Chapter 12 protection_mechanisms
 
Wa
WaWa
Wa
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf020-100 Certification Exam Unlock Success Dumps pdf.pdf
020-100 Certification Exam Unlock Success Dumps pdf.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 
API security
API securityAPI security
API security
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security Keys
 
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
 
3D Password
3D Password3D Password
3D Password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 

Mehr von bluejayjunior

02 internet history and growth (re-upload)
02 internet history and growth (re-upload)02 internet history and growth (re-upload)
02 internet history and growth (re-upload)
bluejayjunior
 
Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)
bluejayjunior
 
C++ control structure
C++ control structureC++ control structure
C++ control structure
bluejayjunior
 
Joji ilagan career center foundation6final
Joji ilagan career center foundation6finalJoji ilagan career center foundation6final
Joji ilagan career center foundation6final
bluejayjunior
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2
bluejayjunior
 

Mehr von bluejayjunior (20)

Com ed 2 prelim exam
Com ed 2 prelim examCom ed 2 prelim exam
Com ed 2 prelim exam
 
Introhtml 2
Introhtml 2Introhtml 2
Introhtml 2
 
Intr to-html-xhtml-1233508169541646-3
Intr to-html-xhtml-1233508169541646-3Intr to-html-xhtml-1233508169541646-3
Intr to-html-xhtml-1233508169541646-3
 
Com ed 4 prelim exam
Com ed 4 prelim examCom ed 4 prelim exam
Com ed 4 prelim exam
 
Chapter1.0 database management system
Chapter1.0 database management systemChapter1.0 database management system
Chapter1.0 database management system
 
01 Database Management (re-uploaded)
01 Database Management (re-uploaded)01 Database Management (re-uploaded)
01 Database Management (re-uploaded)
 
03 using the internet (re-uploaded)
03 using the internet (re-uploaded)03 using the internet (re-uploaded)
03 using the internet (re-uploaded)
 
03 using the internet b (re-upload)
03 using the internet b (re-upload)03 using the internet b (re-upload)
03 using the internet b (re-upload)
 
02 internet history and growth (re-upload)
02 internet history and growth (re-upload)02 internet history and growth (re-upload)
02 internet history and growth (re-upload)
 
01 intro to internet (re-upload)
01 intro to internet (re-upload)01 intro to internet (re-upload)
01 intro to internet (re-upload)
 
Chapter 02 Computer Languages (re-upload)
Chapter 02 Computer Languages (re-upload)Chapter 02 Computer Languages (re-upload)
Chapter 02 Computer Languages (re-upload)
 
Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)Chapter 01 Planning Computer Program (re-upload)
Chapter 01 Planning Computer Program (re-upload)
 
C++ control structure
C++ control structureC++ control structure
C++ control structure
 
Joji ilagan career center foundation6final
Joji ilagan career center foundation6finalJoji ilagan career center foundation6final
Joji ilagan career center foundation6final
 
internet security 2
internet security 2internet security 2
internet security 2
 
reference for finals
reference for finalsreference for finals
reference for finals
 
Internet Secutiry
Internet SecutiryInternet Secutiry
Internet Secutiry
 
Joji ilagan career center foundation8mid
Joji ilagan career center foundation8midJoji ilagan career center foundation8mid
Joji ilagan career center foundation8mid
 
00 Com Ed 6 Midterm
00 Com Ed 6 Midterm00 Com Ed 6 Midterm
00 Com Ed 6 Midterm
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Com Ed 8 Finals

  • 1. JOJI ILAGAN CAREER CENTER FOUNDATION, INC. COLLEGE OF BUSINESS AND TOURISM Gov. Chavez St., Davao City Com Ed 8 – Internet Application FINAL EXAMINATION JEFF REY A. COMIDOY 2nd Sem SY 2012-2013 Com Ed Instructor 75 Points I. Choose the letter of the correct answer. 1. An event where companies lose control of the data they collect on their costumers (and other people). a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new credit cards, and buy expensive goods on credit. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under… a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken home and used in industries there. a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called... a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 9. Programs that travel with applications to a browser and execute on the user’s computer. a. Active content b. Java applet c. JavaScript program d. ActiveX components 10. Program written in the Java programming language that could execute and consume a computer’s resources. a. Active content b. Java applet c. JavaScript program d. ActiveX components 11. Program that could execute on the user’s computer and can run without being compiled a. Active content b. Java applet c. JavaScript program d. ActiveX components 12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a computer’s file system a. Active content b. Java applet c. JavaScript program d. ActiveX components 13. It is a small text file that a Web server creates and stores on your computer’s hard drive. a. Cookie b. Clickstream c. Web Bugs d. None of these 14. The links you click while visiting the Web site. a. Cookie b. Clickstream c. Web Bugs d. None of these 15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information about the person viewing the page of email message and to send the information to a third party. a. Cookie b. Clickstream c. Web Bugs d. None of these 16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware. a. Cookie b. Clickstream c. Web Bugs d. None of these 17. A general category of software that includes advertisements to help pay for the product in which they appear. a. Adware b. Spyware c. Firewall d. Port 18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains. a. Adware b. Spyware c. Firewall d. Port 19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet. a. Adware b. Spyware c. Firewall d. Port 20. Like a door on a computer, it permits traffic to leave and enter a computer. a. Adware b. Spyware c. Firewall d. Port 21. A general term for the process of correctly verifying the identity of a person or a Web site. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 22. An attack in which thieves “fish” for information. a. Phishing b. Server certificate c. User identification d. Login 23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter. a. Phishing b. Server certificate c. User identification d. Login
  • 2. 27. A process of associating a person and his identification with a very high level of assurance. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 30. A process of identifying yourself to a computer. a. Phishing b. Server certificate c. User identification d. Login 31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It consists of systematically checking all possible keys until the correct key is found. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 34. Most computer systems implement user identification with user names and passwords; the combination of a user name and password is sometimes called a… a. Phishing b. Server certificate c. User identification d. Login 35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key II. (25 pts) Draw the following models: A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts) C) Processing a Web Server Digital Certificate (5 pts) III. (15 pts). Essay. Explain concisely and briefly. 1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international transactions, which laws should determine the legality of the sale? (5 pts) 2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts) 3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)