Reference no: EM132756538
1. Reverse engineering cannot always be considered intellectual property infringement.
Select one:
a. True
b. False
2. Competitive intelligence is an ethical and legal action that companies can follow to increase their profits.
Select one:
a. True
b. False
3. When a hacker contacts a person through a phone call or E-mail and attempts to acquire information about password. This scenario is called:
a. Industrial spying
b. Trojan horse
c. Phishing
d. Spamming
4. Software can be protected under copyright law, but it can also be patented.
Select one:
a. True
b. False
5. A patent is a form of intellectual property that can be used by artist to protect their work.
Select one:
a. True
b. False
6. If a company created a new process that enhances the quality of its products, what type of intellectual property can they use to stop others from copying their process?
a. Patent
b. Creating a brand with logo
c. Copyright
d. Registered trademarks
7. The software patent legislation in the European Union would not require that software must make a contribution to the state of the art of the software development.
Select one:
a. True
b. False
8. A copyright is the right to use an original work, however the copyright owner cannot grant the permission to others to use that work.
Select one:
a. True
b. False
9. Ali has been appointed to work with the Cyber Security Department that belongs to the government to break into the website of a terrorist organization to extract information - what among the following is a suitable description of Ali's profile?
a. Cyber terrorist
b. Hacktivist
c. Ethical hacker
d. Black hat hacker
10. Ali is a famous football player and wanted to make a personal website, and he found later that a company in Vietnam is using Ali's full name as a domain name for their website. Ali asked that company to give him that domain, but they asked a great amount of money. Which law would Ali use in order to pursue that company:
a. Leahy-Smith America Invents Act
b. General Agreement on Tariffs and Trade
c. Anti-cybersquatting Consumer Protection Act
d. Economic Espionage Act