Intellectual Property (IP) refers to:
Computer hardware
Physical assets owned by companies
Creations of the human mind
Financial investments
creations of the human mind
Which of the following can be copyrighted?
Algorithms
Purely abstract ideas
Architectural works
Mathematical formulas
Architectural works
What is the main role of WIPO?
Use IP to stimulate innovation and creativity
Enforce military trade agreements
Protect only U.S. copyrights
Promote industrial espionage
use of intellectual property to stimulate innovation and
creativity
The copyright term has been extended how many times since 1960?
7
11
9
5
11
A design patent protects:
Software source code
Mathematical equations
Trade secrets
A new and ornamental design
A new and ornamental design
The Intellectual Property Code of the Philippines is:
RA 8791
RA 10173
RA 9160
RA 8293
RA 8293
The WTO replaced GATT in:
1967
1979
1995
2000
1995
Competitive intelligence differs from industrial espionage because:
It hacks competitor systems
It uses legal means
It steals trade secrets
It involves spying
It uses legal means
A utility patent is valid for up to:
20 years
10 years
15 years
25 years
15
Privacy is best defined as:
A financial confidentiality clause
The ability to own patents
A government-regulated security policy
The right to be left alone
The right to be left alone
Cybersecurity refers to:
Monitoring employee attendance
Installing antivirus only
Protecting physical office spaces
Protecting systems, networks, and data from unauthorized access
Protecting systems, networks, and data from unauthorized access
Using a computer to commit real-world crimes like credit card fraud means the computer is:
A bystander
A target
A tool for learning
A weapon
a weapon
When the computer is the target, an example is:
Credit card fraud
Denial-of-Service (DoS) attack
Email spam
Phishing scam
Denial-of-Service (DoS) attack
When the computer is the weapon, an example is:
Worm infection
Firewall bypass
Credit card fraud
Hacking
Credit card fraud
Spear phishing targets:
Specific organizations or employees
Bank ATMs
Smartphones only
Random internet users
Specific organizations or employees
What is an exploit?
A type of antivirus software
An encrypted code
A bug fix
An attack that uses a system vulnerability
An attack that uses a system vulnerability
Data Loss Prevention (DLP) focuses on:
Deleting corrupted files
Removing old backups
Tracking and protecting data in use, in motion, and at rest
Encrypting only emails
Tracking and protecting data in use, in motion, and at rest
A program that looks harmless but contains malicious code is a:
Rootkit
Worm
Trojan horse
Virus
Trojan horse
Which law regulates commercial spam emails in the U.S.?
CAN-SPAM Act
Data Privacy Act
Cybersecurity Act
Homeland Security Act
CAN-SPAM Act
Which system monitors hostile cyber activity?
Cloud backup
VPN
Proxy server
IDS
IDS
WIPO was established in 1967.
False
True
falsee
The DMCA of 1998 created a safe harbor provision for online service providers.
False
True
truee
Plagiarism is legally the same as copyright infringement.
False
True
falsee
An exploit is a defensive measure taken to protect computer systems from malware.
True
False
falsee