• Like
  • Save
Uploaded on

 

More in: Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
65
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. JOJI ILAGAN CAREER CENTER FOUNDATION, INC. COLLEGE OF BUSINESS AND TOURISM Gov. Chavez St., Davao CityCom Ed 8 – Internet ApplicationFINAL EXAMINATION JEFF REY A. COMIDOY2nd Sem SY 2012-2013 Com Ed Instructor75 Points I. Choose the letter of the correct answer.1. An event where companies lose control of the data they collect on their costumers (and other people). a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new credit cards, and buy expensive goods on credit. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under… a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken home and used in industries there. a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called... a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography9. Programs that travel with applications to a browser and execute on the user’s computer. a. Active content b. Java applet c. JavaScript program d. ActiveX components10. Program written in the Java programming language that could execute and consume a computer’s resources. a. Active content b. Java applet c. JavaScript program d. ActiveX components11. Program that could execute on the user’s computer and can run without being compiled a. Active content b. Java applet c. JavaScript program d. ActiveX components12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a computer’s file system a. Active content b. Java applet c. JavaScript program d. ActiveX components13. It is a small text file that a Web server creates and stores on your computer’s hard drive. a. Cookie b. Clickstream c. Web Bugs d. None of these14. The links you click while visiting the Web site. a. Cookie b. Clickstream c. Web Bugs d. None of these15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information about the person viewing the page of email message and to send the information to a third party. a. Cookie b. Clickstream c. Web Bugs d. None of these16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware. a. Cookie b. Clickstream c. Web Bugs d. None of these17. A general category of software that includes advertisements to help pay for the product in which they appear. a. Adware b. Spyware c. Firewall d. Port18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains. a. Adware b. Spyware c. Firewall d. Port19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet. a. Adware b. Spyware c. Firewall d. Port20. Like a door on a computer, it permits traffic to leave and enter a computer. a. Adware b. Spyware c. Firewall d. Port21. A general term for the process of correctly verifying the identity of a person or a Web site. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID22. An attack in which thieves “fish” for information. a. Phishing b. Server certificate c. User identification d. Login23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter. a. Phishing b. Server certificate c. User identification d. Login
  • 2. 27. A process of associating a person and his identification with a very high level of assurance. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID30. A process of identifying yourself to a computer. a. Phishing b. Server certificate c. User identification d. Login31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if an y exist) that would make the task easier. It consists of systematically checking all possible keys until the correct key is found. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID34. Most computer systems implement user identification with user names and passwords; the combination of a user name and passwor d is sometimes called a… a. Phishing b. Server certificate c. User identification d. Login35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key II. (25 pts) Draw the following models: A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts) C) Processing a Web Server Digital Certificate (5 pts) III. (15 pts). Essay. Explain concisely and briefly. 1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international transactions, which laws should determine the legality of the sale? (5 pts) 2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts) 3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)