COSC3325
Test-2
4/25/2006
Name_______________________________________________
PART-A.
Multiple Choices.
(75 points)
Choose the BEST answer by writing
down a Big A, B, C, D, E, or F in Capital in front of each
question
number.
1.
Which can be an argument for
personal copying of software whether you agree or not?
a.
Violation is insignificant
and some people cannot afford to pay.
b.
Software manufacturing
companies will benefit in the long run due to eventual demand
increase
c.
Both.
d.
neither.
2.
Encryption is to
convert
a. plaintext to ciphertext. b. ciphertext to plaintext.
c.
Either plaintext to ciphertext or ciphertext to
plaintext depending upon the need
d.
Two.
e.
none.
3.
Security of RSA cryptosystem
primarily comes from
a.
Difficulty of solving
simultaneous linear equations.
b.
Difficulty of testing the
primality of large numbers.
c.
Two.
d.
neither.
4.
Which is the primary reason
why the RSA cryptosystem works?
a.
the numeric value of the
plaintext and the number n (p*q) are relatively prime to each
other.
b.
the numeric value of the
plaintext being less than n is relatively prime to either of the two primes (p
and q) enabling
the two keys that are a
multiplicative inverse of each other for (mod (p-1)*(q-1)) to cancel the effect
of each other.
c.
Both.
d.
neither
5.
DES
a.
is a symmetric algorithm that
uses the same secret key(s) both for the encryption and the
decryption.
b. was a US government standard for
over twenty years.
c. both.
d.
neither.
6.
NIST
a.
was formerly known as National
Bureau of Standards.
b.
is responsible for issuing
standards and guidelines for computer systems in the US
c.
Both.
d.
neither.
7.
Which is a reason that may
make one-time pads secure?
a.
the receiver of a message uses
the same key that the sender used.
b.
a given plaintext may produce
any ciphertext of the same size with an equal
probability depending upon the pad being used.
c.
Both.
d.
neither.
8.
Which are
purposes of the US Constitution as specified in its
Preamble?
a.
to form a more perfect Union
and to establish justice.
b.
to secure the blessings of
liberty for ourselves and our Posterity
c.
both.
d.
neither.
9.
Which US Constitution
Article is for the Congress?
a. Article-I
b. Article-II.
c. Article-III.
d.
none
10.
Which is a source for State
authorities?
a.
Individual State
Constitutions.
b.
US Constitution,
Amendment-10.
c.
Both.
d.
neither
11. Copyright
protects
a.
Software
b. Form of Expressions.
c.
both.
d.
neither
12. Which is true
about a Fair Use?
a.
An exception to Patent protection.
b.
It is a reproduction of copyrighted work without authorization for
such purposes as
teaching, scholarship/research, criticism/comment, and news
reporting.
c. both.
d.
neither.
13. Which is NOT
protected by Copyright?
a.
Ideas themselves.
b.
methods of operations.
c.
works not fixed in a tangible
form of expression.
d.
all.
e.
two.
f.
none.
14. Copyright
protection requires
a.
registration
b. publication
c. both.
d.
neither
15. Patent
protects
a.
Purely mathematical
formulas.
b. Useful, novel and non-obvious
inventions.
c. Both.
d.
Neither.
16. Which is the
primary Patent?
a.
Design Patent.
b.
Utility Patent (with 5-year term).
c.
Plant patent (with 20-year term). d. none.
17.
AES
a.
uses keys much larger than
56-bits that DES used.
b.
is a symmetric
cryptosystem.
c.
both.
d.
neither.
18. The security of
Diffie-Hellman key exchange scheme comes primarily
from
a.
Difficulty of computing the
only one primitive root of prime numbers as each prime number has exactly one
primitive root.
a.
Difficulty of computing
discrete logarithms.
b.
Both.
d.
neither.
19.
One of the
earliest public key cryptosystems (algorithms) is
a.
DES
b.
Diffie-Hellman key exchange
scheme.
c.
RSA algorithm.
20. Enumerated Powers
refer to
a.
Federal government agencies,
either executive or
judicial.
b.
federal legislative
powers.
c.
Both.
d.
neither
21.
Federalism
a.
is a unique and important
attribute of US legal system.
b.
refers to the fact that only
legislative agancies make laws in their respective
areas.
c.
Both.
d.
neither.
22. Laws in the US
can be made by
a.
US
Congress.
b.
Courts at various levels as
precedents.
c.
Federal government agencies
including state government agencies.
d.
All above.
e.
two above.
f.
none
23. Factors in
determining Fair Use of copyrighted materials include
a.
Purpose and character of
use
b.
Nature of copyrighted work
and the amount and substantiality of the portion used.
c.
Both.
d.
neither.
24. Which is to
primarily guarantee the right of people to know the business of their
government?
a.
FOIA
b.
Computer Security
Act
c.
Digital Millenium Copyright Act.
25. Which amended the
Computer Fraud and Abuse Act?
a.
EFOIA
b.
NIIPA
c.
DMCA
PART-B.
Other Problems.
(25 points)
Do two problems in this PART.
A. State factors to consider
in determining a fair use.
B. Briefly describe the
Diffie-Hellman Key Exchange
Algorithm.
C. Argue either for or
against copying other’s software without permission.
D. List exemptions specified
in the Freedom of Information Act.