COSC3325                                           Test-2                                                  4/25/2006

 

Name_______________________________________________

 

   PART-A. Multiple Choices.                                                                             (75 points)

 

   Choose the BEST answer by writing down a Big A, B, C, D, E, or F in Capital in front of each

   question number.

 

1.                Which can be an argument for personal copying of software whether you agree or not?

a.       Violation is insignificant and some people cannot afford to pay.

b.      Software manufacturing companies will benefit in the long run due to eventual demand increase

c.       Both.                                 d.  neither.

 

2.                Encryption is to convert

a.    plaintext to ciphertext.      b.  ciphertext to plaintext.

c.       Either plaintext to ciphertext or ciphertext to plaintext depending upon the need

d.      Two.                                  e.  none. 

 

3.                Security of RSA cryptosystem primarily comes from

a.       Difficulty of solving simultaneous linear equations.

b.      Difficulty of testing the primality of  large numbers.

c.       Two.                                 d.  neither.

 

4.                Which is the primary reason why the RSA cryptosystem works?

a.       the numeric value of the plaintext and the number n (p*q) are relatively prime to each other.

b.      the numeric value of the plaintext being less than n is relatively prime to either of the two primes (p and q) enabling

the two keys that are a multiplicative inverse of each other for (mod (p-1)*(q-1)) to cancel the effect of each other.

c.       Both.                                 d.   neither

 

5.                DES

a.       is a symmetric algorithm that uses the same secret key(s) both for the encryption and the decryption.

 b.   was a US government standard for over twenty years.

 c.   both.                                 d.   neither.

 

6.                 NIST

a.       was formerly known as National Bureau of Standards.

b.      is responsible for issuing standards and guidelines for computer systems in the US

c.       Both.                                 d.  neither.

 

7.                Which is a reason that may make one-time pads secure?

a.       the receiver of a message uses the same key that the sender used.

b.      a given plaintext may produce any ciphertext of the same size with an equal probability depending upon the pad being used.

c.       Both.                                 d.  neither.

 

8.                Which are purposes of the US Constitution as specified in its Preamble?

a.       to form a more perfect Union and to establish justice.

b.      to secure the blessings of liberty for ourselves and our Posterity

c.       both.                                 d.   neither.                             

 

9.                Which US Constitution Article is for the Congress?

a.  Article-I                              b.  Article-II.

c.  Article-III.                           d.   none

 

10.            Which is a source for State authorities?

a.       Individual State Constitutions.

b.      US Constitution, Amendment-10.

c.       Both.                                 d.  neither

 

             11.      Copyright protects

                        a.  Software                             b.   Form of Expressions.

                        c.  both.                                               d.   neither                  

 

             12.      Which is true about a Fair Use?

                        a.  An exception to Patent protection.

                        b.  It is a reproduction of copyrighted work without authorization for such purposes as

     teaching, scholarship/research, criticism/comment, and news reporting.

c.  both.                                               d.  neither.

             13.      Which is NOT protected by Copyright?

a.       Ideas themselves.                           b.  methods of operations.

c.       works not fixed in a tangible form of expression.

d.      all.                                     e.  two.                         f.  none.

 14.      Copyright protection requires

             a.    registration                                   b.    publication                                               

c.    both.                                d.    neither

             15.      Patent protects

a.       Purely mathematical formulas.

b.   Useful, novel and non-obvious inventions.

                        c.   Both.                                              d.  Neither.

             16.      Which is the primary Patent?

                        a.  Design Patent.                                 b.  Utility Patent (with 5-year term).

                        c.  Plant patent (with 20-year term).     d.  none.  

           

 17.      AES

a.       uses keys much larger than 56-bits that DES used.

b.      is a symmetric cryptosystem.

c.       both.                                              d.  neither.     

 

 18.      The security of Diffie-Hellman key exchange scheme comes primarily from

a.       Difficulty of computing the only one primitive root of prime numbers as each prime number has exactly one primitive root.

a.       Difficulty of computing discrete logarithms.

b.      Both.                                              d.  neither.

 

 19.      One of the earliest public key cryptosystems (algorithms) is

a.       DES

b.       Diffie-Hellman key exchange scheme.

c.       RSA algorithm.     

 

 20.      Enumerated Powers refer to

a.       Federal government agencies, either executive or  judicial.

b.      federal legislative powers.

c.       Both.                                  d.  neither

 

 21.      Federalism

a.       is a unique and important attribute of US legal system.

b.      refers to the fact that only legislative agancies make laws in their respective areas.

c.       Both.                                  d.  neither.

 

 22.      Laws in the US can be made by

a.       US Congress.

b.      Courts at various levels as precedents.

c.       Federal government agencies including state government agencies.

d.      All above.                          e.  two above.                          f.  none

 

 23.      Factors in determining Fair Use of copyrighted materials include

a.       Purpose and character of use

b.      Nature of copyrighted work and the amount and substantiality of the portion used.

c.       Both.                                  d.   neither.

 24.      Which is to primarily guarantee the right of people to know the business of their government?

a.                   FOIA

b.                  Computer Security Act

c.                   Digital Millenium Copyright Act.

 25.      Which amended the Computer Fraud and Abuse Act?

a.                   EFOIA

b.                  NIIPA

c.                   DMCA

 

         PART-B.                        Other Problems.                                                         (25 points)

           

         Do two problems in this PART.

 

            A.  State factors to consider in determining a fair use.

 

 

            B.  Briefly describe the Diffie-Hellman Key Exchange Algorithm.

 

 

            C.  Argue either for or against copying other’s software without permission.

           

                       

            D.  List exemptions specified in the Freedom of Information Act.