SlideShare a Scribd company logo
JOJI ILAGAN CAREER CENTER FOUNDATION, INC.
COLLEGE OF BUSINESS AND TOURISM
Gov. Chavez St., Davao City
Com Ed 8 – Internet Application
FINAL EXAMINATION JEFF REY A. COMIDOY
2nd Sem SY 2012-2013 Com Ed Instructor
75 Points
I. Choose the letter of the correct answer.
1. An event where companies lose control of the data they collect on their costumers (and other people).
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new
credit cards, and buy expensive goods on credit.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid.
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under…
a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes
5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken
home and used in industries there.
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called...
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s…
a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography
9. Programs that travel with applications to a browser and execute on the user’s computer.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
10. Program written in the Java programming language that could execute and consume a computer’s resources.
a. Active content b. Java applet c. JavaScript program d. ActiveX components
11. Program that could execute on the user’s computer and can run without being compiled
a. Active content b. Java applet c. JavaScript program d. ActiveX components
12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a
computer’s file system
a. Active content b. Java applet c. JavaScript program d. ActiveX components
13. It is a small text file that a Web server creates and stores on your computer’s hard drive.
a. Cookie b. Clickstream c. Web Bugs d. None of these
14. The links you click while visiting the Web site.
a. Cookie b. Clickstream c. Web Bugs d. None of these
15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information
about the person viewing the page of email message and to send the information to a third party.
a. Cookie b. Clickstream c. Web Bugs d. None of these
16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware.
a. Cookie b. Clickstream c. Web Bugs d. None of these
17. A general category of software that includes advertisements to help pay for the product in which they appear.
a. Adware b. Spyware c. Firewall d. Port
18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains.
a. Adware b. Spyware c. Firewall d. Port
19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet.
a. Adware b. Spyware c. Firewall d. Port
20. Like a door on a computer, it permits traffic to leave and enter a computer.
a. Adware b. Spyware c. Firewall d. Port
21. A general term for the process of correctly verifying the identity of a person or a Web site.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
22. An attack in which thieves “fish” for information.
a. Phishing b. Server certificate c. User identification d. Login
23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the
system.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter.
a. Phishing b. Server certificate c. User identification d. Login
27. A process of associating a person and his identification with a very high level of assurance.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
30. A process of identifying yourself to a computer.
a. Phishing b. Server certificate c. User identification d. Login
31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that
would make the task easier. It consists of systematically checking all possible keys until the correct key is found.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program.
a. Authentication b. Digital certificate c. Certificate authority d. Digital ID
34. Most computer systems implement user identification with user names and passwords; the combination of a user name and password is
sometimes called a…
a. Phishing b. Server certificate c. User identification d. Login
35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys.
a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key
II. (25 pts) Draw the following models:
A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts)
C) Processing a Web Server Digital Certificate (5 pts)
III. (15 pts). Essay. Explain concisely and briefly.
1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international
transactions, which laws should determine the legality of the sale? (5 pts)
2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts)
3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)

More Related Content

What's hot (19)

PPSX
iKeyPass...Unbreakable Password Security
rambmohan
 
PDF
An overview study on cyber crimes in internet
Alexander Decker
 
PPT
Web Application Hacking 2004
Mike Spaulding
 
PDF
04-1 E-commerce Security slides
monchai sopitka
 
PDF
Secure Online Banking
VASCO Data Security
 
PDF
Lecture #24 : Cross Site Request Forgery (CSRF)
Dr. Ramchandra Mangrulkar
 
PPT
Phishing
HK Khemnani
 
PDF
IRJET- Survey on Web Application Vulnerabilities
IRJET Journal
 
PPTX
News bytes Sept-2011
Ashwin Patil, GCIH, GCIA, GCFE
 
PPT
2310 b 16
Krazy Koder
 
PDF
A Review of Information Security from Consumer’s Perspective Especially in On...
Dr. Amarjeet Singh
 
PDF
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
 
PDF
A literature survey on anti phishing
IJCSES Journal
 
PDF
Identity based cryptography for client side security in web applications (web...
eSAT Publishing House
 
PDF
When developers api simplify user mode rootkits development – part ii
Yury Chemerkin
 
PDF
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
PDF
The Immune System of Internet
Mohit Kanwar
 
PDF
Lecture #22: Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
PDF
Securing corporate assets_with_2_fa
Hai Nguyen
 
iKeyPass...Unbreakable Password Security
rambmohan
 
An overview study on cyber crimes in internet
Alexander Decker
 
Web Application Hacking 2004
Mike Spaulding
 
04-1 E-commerce Security slides
monchai sopitka
 
Secure Online Banking
VASCO Data Security
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Dr. Ramchandra Mangrulkar
 
Phishing
HK Khemnani
 
IRJET- Survey on Web Application Vulnerabilities
IRJET Journal
 
News bytes Sept-2011
Ashwin Patil, GCIH, GCIA, GCFE
 
2310 b 16
Krazy Koder
 
A Review of Information Security from Consumer’s Perspective Especially in On...
Dr. Amarjeet Singh
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
 
A literature survey on anti phishing
IJCSES Journal
 
Identity based cryptography for client side security in web applications (web...
eSAT Publishing House
 
When developers api simplify user mode rootkits development – part ii
Yury Chemerkin
 
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
The Immune System of Internet
Mohit Kanwar
 
Lecture #22: Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Securing corporate assets_with_2_fa
Hai Nguyen
 

Similar to Com Ed 8 Finals (20)

PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
avmnmjvzyl7714
 
PPTX
Ecommerce_Ch4.pptx
AYNETUTEREFE1
 
PDF
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Virendra Kumar Dubey
 
PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
retimaiter
 
DOC
Computer security and_privacy_tif_key
thinkict
 
PPTX
cyber quiz ppt presentation of engineering
vaishnavig1212006
 
DOCX
Hm122 midterm-exam-media
ICCT foundation inc
 
PPT
Security (FE)
Tanat Tonguthaisri
 
PPT
Cyberterrorism
Varshil Patel
 
DOCX
1) Which of the following are Penetration testing methodology .docx
SONU61709
 
PPTX
Ethics,security and privacy control
Sifat Hossain
 
DOCX
Copyright patent& intellectual property
Carlos Gonsalves
 
PPT
Security (IP)
Tanat Tonguthaisri
 
PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
sfcgnowf181
 
PDF
Cyber Security MCQ Questions and Answers
SONU HEETSON
 
PPTX
MIL-Q1M9.pptx
razielyurag
 
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
nalikasolovi
 
PPTX
Chapter 5 - Digital Security, Ethics, Privacy.pptx
FannyKwok1
 
PPT
Cyber Crime and Security
Dipesh Waghela
 
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
avmnmjvzyl7714
 
Ecommerce_Ch4.pptx
AYNETUTEREFE1
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Virendra Kumar Dubey
 
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
retimaiter
 
Computer security and_privacy_tif_key
thinkict
 
cyber quiz ppt presentation of engineering
vaishnavig1212006
 
Hm122 midterm-exam-media
ICCT foundation inc
 
Security (FE)
Tanat Tonguthaisri
 
Cyberterrorism
Varshil Patel
 
1) Which of the following are Penetration testing methodology .docx
SONU61709
 
Ethics,security and privacy control
Sifat Hossain
 
Copyright patent& intellectual property
Carlos Gonsalves
 
Security (IP)
Tanat Tonguthaisri
 
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
sfcgnowf181
 
Cyber Security MCQ Questions and Answers
SONU HEETSON
 
MIL-Q1M9.pptx
razielyurag
 
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
nalikasolovi
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
FannyKwok1
 
Cyber Crime and Security
Dipesh Waghela
 
Ad

More from bluejayjunior (20)

PDF
Com ed 2 prelim exam
bluejayjunior
 
PDF
Introhtml 2
bluejayjunior
 
PPT
Intr to-html-xhtml-1233508169541646-3
bluejayjunior
 
PDF
Com ed 4 prelim exam
bluejayjunior
 
PDF
Chapter1.0 database management system
bluejayjunior
 
PPTX
01 Database Management (re-uploaded)
bluejayjunior
 
PDF
03 using the internet (re-uploaded)
bluejayjunior
 
PDF
03 using the internet b (re-upload)
bluejayjunior
 
PDF
02 internet history and growth (re-upload)
bluejayjunior
 
PDF
01 intro to internet (re-upload)
bluejayjunior
 
PDF
Chapter 02 Computer Languages (re-upload)
bluejayjunior
 
PDF
Chapter 01 Planning Computer Program (re-upload)
bluejayjunior
 
PDF
C++ control structure
bluejayjunior
 
PDF
Joji ilagan career center foundation6final
bluejayjunior
 
PDF
internet security 2
bluejayjunior
 
PDF
reference for finals
bluejayjunior
 
PDF
Internet Secutiry
bluejayjunior
 
DOCX
Joji ilagan career center foundation8mid
bluejayjunior
 
PDF
00 Com Ed 6 Midterm
bluejayjunior
 
PDF
Joji ilagan career center foundation8pre2
bluejayjunior
 
Com ed 2 prelim exam
bluejayjunior
 
Introhtml 2
bluejayjunior
 
Intr to-html-xhtml-1233508169541646-3
bluejayjunior
 
Com ed 4 prelim exam
bluejayjunior
 
Chapter1.0 database management system
bluejayjunior
 
01 Database Management (re-uploaded)
bluejayjunior
 
03 using the internet (re-uploaded)
bluejayjunior
 
03 using the internet b (re-upload)
bluejayjunior
 
02 internet history and growth (re-upload)
bluejayjunior
 
01 intro to internet (re-upload)
bluejayjunior
 
Chapter 02 Computer Languages (re-upload)
bluejayjunior
 
Chapter 01 Planning Computer Program (re-upload)
bluejayjunior
 
C++ control structure
bluejayjunior
 
Joji ilagan career center foundation6final
bluejayjunior
 
internet security 2
bluejayjunior
 
reference for finals
bluejayjunior
 
Internet Secutiry
bluejayjunior
 
Joji ilagan career center foundation8mid
bluejayjunior
 
00 Com Ed 6 Midterm
bluejayjunior
 
Joji ilagan career center foundation8pre2
bluejayjunior
 
Ad

Recently uploaded (20)

PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PPTX
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
PDF
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PDF
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
PPTX
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
DOCX
A summary of SPRING SILKWORMS by Mao Dun.docx
maryjosie1
 
PDF
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PPTX
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
community health nursing question paper 2.pdf
Prince kumar
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
A summary of SPRING SILKWORMS by Mao Dun.docx
maryjosie1
 
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
Quarter1-English3-W4-Identifying Elements of the Story
FLORRACHELSANTOS
 

Com Ed 8 Finals

  • 1. JOJI ILAGAN CAREER CENTER FOUNDATION, INC. COLLEGE OF BUSINESS AND TOURISM Gov. Chavez St., Davao City Com Ed 8 – Internet Application FINAL EXAMINATION JEFF REY A. COMIDOY 2nd Sem SY 2012-2013 Com Ed Instructor 75 Points I. Choose the letter of the correct answer. 1. An event where companies lose control of the data they collect on their costumers (and other people). a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 2. Crime in which a thief steals a person’s entire credit record and then uses the victim’s personal information to open bank accounts, new credit cards, and buy expensive goods on credit. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 3. Some perpetrators break into a company’s systems, steal confidential information, and threaten to release the information unless they’re paid. a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 4. Enforcing laws against distribution of pornographic material online has been difficult, so as online gambling. This may be under… a. Online Theft b. Identity Theft c. Online extortion d. Other Online Crimes 5. Type of spying in which countries attempt to gain information from private businesses to capture intellectual property that can be taken home and used in industries there. a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 6. A large problem due to the internet and the relative ease with which can use existing material without the owner’s permission is called... a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 7. A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file is called… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 8. A process that hides an encrypted message within different types of files. This can be used to add copyright information to the file/s… a. Industrial espionage b. Intellectual property threat c. Digital watermark d. Steganography 9. Programs that travel with applications to a browser and execute on the user’s computer. a. Active content b. Java applet c. JavaScript program d. ActiveX components 10. Program written in the Java programming language that could execute and consume a computer’s resources. a. Active content b. Java applet c. JavaScript program d. ActiveX components 11. Program that could execute on the user’s computer and can run without being compiled a. Active content b. Java applet c. JavaScript program d. ActiveX components 12. Microsoft’s technology for writing small applications that perform some action in Web pages; these components have full access to a computer’s file system a. Active content b. Java applet c. JavaScript program d. ActiveX components 13. It is a small text file that a Web server creates and stores on your computer’s hard drive. a. Cookie b. Clickstream c. Web Bugs d. None of these 14. The links you click while visiting the Web site. a. Cookie b. Clickstream c. Web Bugs d. None of these 15. Small (one pixel), hidden graphic on a Web page or in an email message designed to work in conjunction with a cookie to obtain information about the person viewing the page of email message and to send the information to a third party. a. Cookie b. Clickstream c. Web Bugs d. None of these 16. Only work in Internet Explorer and other browsers that use the Internet Explorer code base in some way is an Adware. a. Cookie b. Clickstream c. Web Bugs d. None of these 17. A general category of software that includes advertisements to help pay for the product in which they appear. a. Adware b. Spyware c. Firewall d. Port 18. Category of adware in which the user has little control over or knowledge of the ads and other monitoring features it contains. a. Adware b. Spyware c. Firewall d. Port 19. A software program or hardware device that controls access between two networks, such as a local area network and the Internet. a. Adware b. Spyware c. Firewall d. Port 20. Like a door on a computer, it permits traffic to leave and enter a computer. a. Adware b. Spyware c. Firewall d. Port 21. A general term for the process of correctly verifying the identity of a person or a Web site. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 22. An attack in which thieves “fish” for information. a. Phishing b. Server certificate c. User identification d. Login 23. Cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 24. Provides a security handshake when a browser and the Web page to which it is connected want to participate in a secure connection. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 25. An encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s activity. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 26. It authenticates a Web site for its users so the user can be confident that the Web site is genuine and not an imposter. a. Phishing b. Server certificate c. User identification d. Login
  • 2. 27. A process of associating a person and his identification with a very high level of assurance. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 28. An authentication in which the user needs to pass before accessing the Internet or Internet files and features. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 29. A trusted third party that verifies the digital certificate holder’s identity and issues the digital certificate. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 30. A process of identifying yourself to a computer. a. Phishing b. Server certificate c. User identification d. Login 31. A widely used protocol that acts as a separate layer or “secure channel” on top of the TCP/IP Internet Protocol. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 32. Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It consists of systematically checking all possible keys until the correct key is found. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key 33. An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an email program. a. Authentication b. Digital certificate c. Certificate authority d. Digital ID 34. Most computer systems implement user identification with user names and passwords; the combination of a user name and password is sometimes called a… a. Phishing b. Server certificate c. User identification d. Login 35. Public-key pair created by SSL during a browser session. When the user leaves the secure Web site, the browser discards the session keys. a. Brute force attack b. User authentication c. Secure Sockets Layer (SSL) d. Session Key II. (25 pts) Draw the following models: A) Basic Web Client Firewall Architecture (15 pts) B) Producing a MAC for a Message (5 pts) C) Processing a Web Server Digital Certificate (5 pts) III. (15 pts). Essay. Explain concisely and briefly. 1. On other online crimes like sale of pornographic material, which community standards might apply to the sale; and in international transactions, which laws should determine the legality of the sale? (5 pts) 2. In your own idea, do countermeasures for copyright and intellectual property threats effective? (5 pts) 3. How do you counter-act if you noticed that you are a victim of identity theft? (5 pts)