Cybercrime and cybersecurity analysis

Question 1 of 20
5.0 Points
A person who gains unauthorized access to computers, either for mischief or with criminal intent, is called a(n):

A. imposter.
B. fraud.
C. genius.
D. hacker.

Reset Selection

Question 2 of 20
5.0 Points
Instructions hidden in software with the potential to cause significant damage to both hardware and software is a:

A. virus.
B. piracy.
C. corruption.
D. façade.

Reset Selection

Question 3 of 20
5.0 Points
The Electronic Communications Privacy Act (ECPA) states that individuals may not gain access without permission to a(n):

A. fund transfer system.
B. cyberspace privacy system.
C. electronic communication system.
D. antiviral organization.

Reset Selection

Question 4 of 20
5.0 Points
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:

A. sales.
B. interests.
C. forces.
D. departments.

Reset Selection

Question 5 of 20
5.0 Points
Online marketers of products and services have quickly recognized that learning about consumers’ online behavior presents a real opportunity to increase their:

A. sales.
B. interests.
C. forces.
D. departments.

Reset Selection

Question 6 of 20
5.0 Points
Trademark registrations are issued at the federal level by the U.S. Patent and Trademark Office of the Department of:

A. Commerce.
B. Labor.
C. Justice.
D. States.

Reset Selection

Question 7 of 20
5.0 Points
A trademark registration is issued for a renewable period of __________ years.

A. 10
B. 20
C. 50
D. 60

Reset Selection

Question 8 of 20
5.0 Points
A distinctive, nonfunctional feature, which distinguishes a merchant’s or manufacturer’s goods or services from those of another, is known as a:

A. trademark.
B. trade dress.
C. design patent.
D. copyright.

Reset Selection

Question 9 of 20
5.0 Points
Anyone who manufactures or sells, without permission, a product that has been patented by another can be charged with:

A. fraud.
B. infringement.
C. misrepresentation.
D. breach of contract.

Reset Selection

Question 10 of 20
5.0 Points
The Patent and Trademark Office would probably grant a patent if the invention is a device, useful, novel, and:

A. unauthorized.
B. obsolete.
C. nonobvious.
D. general.

Reset Selection

Question 11 of 20
5.0 Points
Design patents are granted for a period __________ years.

A. less than 20
B. from 20 to 30
C. from 30 to 40
D. from 40 to 50

Reset Selection

Question 12 of 20
5.0 Points
A place where a corporation or an issuer sells its securities to the public is known as a __________ market.

A. commodity
B. primary
C. secondary
D. labor

Reset Selection

Question 13 of 20
5.0 Points
Issuers of securities must register the securities with the:

A. U.S. Copyright Commission.
B. U.S. Patent and Trademark Office.
C. Securities and Exchange Commission.
D. Federal Trade Commission.

Reset Selection

Question 14 of 20
5.0 Points
A document that provides relevant and important information about the company, its businesses, and its prospects is known as:

A. memorandum of association.
B. articles of association.
C. letters of incorporation.
D. prospectus.

Reset Selection

Question 15 of 20
5.0 Points
In 1992, the SEC created a computerized system, known as the Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system that allows companies to:

A. download required information directly.
B. sell its shares to the public online.
C. make advertisements on the web.
D. register with the Federal Trade Commission.

Reset Selection

Question 16 of 20
5.0 Points
A computer program is defined as a “set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain act” under the:

A. Global Computer Review Act of 2004.
B. Computer Software Copyright Act of 1980.
C. National Software Act of 1863.
D. USA Computer Act of 2001.

Reset Selection

Question 17 of 20
5.0 Points
A(n) __________ test is used to determine whether an ordinary reasonable observer comparing two works would have to conclude that the work being questioned was copied from the other.

A. substantial similarity
B. fair use
C. goodwill
D. infringement

Reset Selection

Question 18 of 20
5.0 Points
A form of personal property, which includes knowledge, ways of doing things, and expressions of ideas is known as a(n):

A. intellectual property.
B. tangible property.
C. real property.
D. easementary right.

Reset Selection

Question 19 of 20
5.0 Points
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:

A. Federal Tort Curbing Agency.
B. Administration and Trade Commission.
C. Agency against Unfair Trade Practices.
D. Federal Trade Commission.

Reset Selection

Question 20 of 20
5.0 Points
The ECPA also grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber’s consent.

A. monitor
B. screen
C. block
D. redirect

LOOKING FOR THIS ASSIGNMENT OR A SIMILAR ONE? WE HAVE HAD A GOOD SUCCESS RATE ON THIS PAPER! ORDER WITH US TODAY FOR QUALITY WORK AND GET A DISCOUNT!

ORDER NOW

Disclaimer:

All types of paper that Discount Writers provides is only for the purpose of assistance! No text, paper, assignment, discussion would be similar with another student therefore guaranteeing Uniqueness and can be used with proper references only!

More tools: Better Grades: Choose your Homework Help:

Assignment Help: We would write your papers according to the instructions provided and guarantee you timely work

 

Entire Online Class Help: We are here for you and we would do your entire Class work from discussions, assignments, Replies, Exams and Quizzes at a Cost

 

Exam/ Quiz Help: We have a team of writers who specialize on exams from any specific field and we would give you an A+ Grade!

 

ORDER NOW