Question: Which of the following is true with respect to a trademark? The requirements for registration are the same as for a patent. Registering it is mandatory. Registering it is optional. Trademarks cannot be registered.

Answer: Registering it is optional.

 

Question: At a fancy smancy party, one of the guests confides in you that he has a trade secret. He asks you which of the following is true? There is only common law protection of trade secrets. There is federal statutory and state statutory legal protection of trade secrets. There is only state statutory protection of trade secrets. There is only federal statutory protection of trade secrets.

Answer: There is federal statutory and state statutory legal protection of trade secrets.

 

Question: Which of the following requires filing with a governmental agency in order to establish ownership of intellectual property? A patent. A trademark. None of the alternatives require a governmental filing. A copyright.

Answer: A patent.

 

Question: Network security

Answer Options:

Protects end users against dangers created by network connectivity
None of the above
Protects information against dangers created by network connectivity
Protects network hardware against dangers created by network connectivity

Answer: Protects information against dangers created by network connectivity

 

Question: In the context of network security, patching

Answer Options:

Improves the look and feel of software
Adds user-friendly features to software
Applies cosmetic changes to software
Updates software to fix known software bugs

Answer: Updates software to fix known software bugs

 

Question: Authentication is

Answer Options:

Granting certain specific privileges over information to a user
Providing an alternate identity
Hiding information
The verification of a claimed identity

Answer: The verification of a claimed identity

 

Question: Authorization is

Answer Options:

Hiding information
Updating software to fix known software bugs
Providing an alternate identity
Granting certain specific privileges over information to a user

Answer: Granting certain specific privileges over information to a user

 

Question: In network security, a firewall is a device which lies between two networks and

Answer Options:

None of the above
Regulates the movement of network administrators from the external network to the internal network
Prevents fires in the external network from spreading to the internal network
Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network

Answer: Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network

 

Question: In the context of network security, the de-militarized zone

Answer Options:

None of the above
Contains the organization’s sensitive data
Contains the organization’s external services such as web and email servers
Is most useful in military networks

Answer: Contains the organization’s external services such as web and email servers

 

Question: A benefit of using firewalls is that

Answer Options:

It can block traffic from any identified host or network
It can defend the organization even if an internal computer is compromised
It can protect servers accessible from the Internet (e.g., web and email servers)
Its effectiveness depends upon the abilities of the administrator

Answer: It can protect servers accessible from the Internet (e.g., web and email servers)

 

Question: A denial-of-service attack

Answer Options:

Compromises the integrity of information
Prevents a host from performing its legitimate functions
Blocks traffic from any identified host or network
Typically only affects military computers

Answer: Prevents a host from performing its legitimate functions

 

Question: Encryption is the process of

Answer Options:

Rendering information unreadable in such a way that authorized users may later make the information readable
Placing information in the de-militarized zone
Placing information behind a firewall
Adding a password to information

Answer: Rendering information unreadable in such a way that authorized users may later make the information readable

 

Question: In symmetric key encryption

Answer Options:

None of the above
The key used for encryption is a mirror image of the key used for decryption
The same key is used for encryption and decryption
The key used for encryption is independent of the key used for decryption

Answer: The same key is used for encryption and decryption

 

Question: Looking at your [phone you notice which of the following? You are looking at a product with multiple patents, multiple copyrights, and multiple trademarks. It is impossible to have a product that includes copyrights, patents, and trademarks. You are looking a product with a single patent. You are looking at a product with a single patent and copyright.

Answer: You are looking at a product with multiple patents, multiple copyrights, and multiple trademarks.

 

Question: Which of the following is not intellectual property? A copyright. A stock certificate.

Answer: A stock certificate.

 

Question: The name of this course’s theme song is which of the following? If I had a Hammer Boot Scootin’ Boogie Udo Shuffle Boogie Woogie Bugle Boy

Answer: Boot Scootin’ Boogie

 

Question: Which of the following types of intellectual property have the least amount of time of exclusive rights? A copyright. A trademark. They all have the same time period protection. A patent.

Answer: A trademark.