Asymmetric Encryption: Intellectual Property
Asymmetric Encryption: Intellectual Property
Asymmetric Encryption: Intellectual Property
Select one:
True
False
Both the sender and the receiver each have a pair of keys, one public and one private.
Asymmetric encryption
If intimidation and fear of reprisals is present, anonymity is good because useful information
may be revealed.
A set of legal rights which result from intellectual activity in the industrial, scientific, literary,
and artistic fields is called Intellectual property
All of the statements are true about the first requirement of a Patent Work except:
It must serve a basic purpose
When two persons have jointly made an invention, the right to the patent shall belong to
Both of them
The alteration of information may be caused by the disclosure of personal information False
Which does not belong to the group: Legal Claim
Which is not a characteristic of an intellectual object: It is easily owned
Dramatizations, translations, and adaptations of musicals are example of derivative works
One of the advantages of anonymity is that disputes could be solved if information from
individuals’ party to these disputes can reveal the necessary information False
Penetration can be done with or without the use of the internet True
Instilling fear and doubt and compromising the integrity of the data can lead to
cyber terrorism
Which is not true about an Insider Threat. They are a major source of computer crimes
It is hardware or software used to isolate the sensitive portions of an information system
facility from the outside world and limit the potential damage that can be done by a
malicious intruder Firewall
Which of the following does not belong to the group? Collective marks
These individuals test the limitations of information systems out of intellectual curiosity
Hackers
In Spear-phishing, con artists send legitimate looking e-mails urging the recipient to take
action to avoid a negative consequence or to receive a reward. False
The owner of a patent has no right to prevent third parties from using the patented product
if it has been put on the market by the owner of the product False
It includes the integrity, confidentiality, and availability of information at the servers
Information security
Shapes cannot be registered as trademarks if the shapes are not necessitated by technical
factors False
A patent claim can be cancelled if it adheres to the public order. False
It is a type of offense when an individual accesses the whole or part of a computer system
without permission or right Illegal Access
This penalty will cause an accused to be imprisoned for two to four decades.
reclusion perpetua
Republic Act No. 8293 is also known as the Copyright
Frauds are sometimes a form of collaboration between an employee and a non-employee
True
It is the acquisition of a domain name on the Internet in bad faith or with the intent to
profit, mislead, destroy one’s reputation or deprive others from registering the same
domain name. Cybersquatting