COSC3325			TEST-2C					4/22/2003.

Keys:

1-5:	BACCD
6-10:	DAACC
11-15:	ADABA
16-20:	EBDDB
21-25:	EEBDC
26-30:	B(D)BCCD


PART-A. Multiple Choices					( 90 points)

In each question in this PART, choose the BEST answer by writing down a Big A, B, C, D, E, or F 
in Capital by the question number..

1.	Which replicates itself?
a.  Logic bomb			b.  Bacteria and Virus
c.  Both.			d.  neither.
2.	Which is independent?
a.  Bacteria and Worm		b.  Virus and Trojan horse
c.  both.				d.  neither.
3.	Which is a manipulation of a virus that reveals its presence?
a.  Unusual screen display.	b.  simulating hardware failure.
c.  both.				d.  neither.
4.	Which is a common trigger action of a Logic bomb?
a.  accessing a particular file	b.  the passage of a given amount of time.
c.  both.				d.  neither.
5.	Which is not a damage typically caused by hacking?
a.	destroying files and releasing viruses.
b.	Stealing money or software.
c.	Both.			d.  neither.
6.	Which is an argument against personal copying of software?
a.	violation is insignificant and some people cannot afford to pay.
b.	More employment opportunities for programmers.
c.	Both.			d.  neither.
7.	Encryption is to convert
a.   plaintext to ciphertext.	b.  ciphertext to plaintext.
c.	public-key algorithms to symmetric algorithms.
d.	Two.			e.  none.
8.	RSA cryptosystem is
a.	for both encryptions and digital signatures.
b.	A symmetric algorithm.	c.  both.		d.  neither. 
9.	Security of RSA cryptosystem primarily comes from
a.	difficulty of solving simultaneous non-linear equations.
b.	Difficulty of factoring large prime numbers.
c.	Difficulty of factoring large non-prime numbers.
d.	Two.			e.  none.
10.	DES
a.  is a public-key algorithm.	b.  uses 128-bit keys.
c.  was replaced by AES		d.  two.  		e.  none.
11.	NIST
a.	was formerly known as National Bureau of Standards.
b.	is a division of U.S. Department of Justice.
c.	Both.			d.  neither.
12.	Currently, US cryptographic products are exportable without license
a.	to any country regardless of end-users
b.	to any country including those embargoed countries.
c.	Both.			d.  neither.
13.	The Totient function of n which is p*q where p and q are each a prime is
a.	(p-1)*(q-1)
b.	the number of integers between 1 and n-1 that is relatively prime to n-1.
c.	Both.			d.  neither.
14.	Which is a reason that may make one-time pads secure?
a.	the receiver of a message does not have to use the same key that the sender used.
b.	a given ciphertext is equally likely to correspond to any plaintext of the same size.
c.	Both.			d.  neither.
15.	Caesar ciphers are
a.  substitution ciphers.		b.  polyalphabetic ciphers.
c.  both.				d.  neither.
16.	Which uses linear equations?
a.  Playfair ciphers.		b.  Monoalphabetic ciphers.
c.  Homophone ciphers.		d.  two.			e.  none.
17.	Which preserves the letter frequency of plaintext?
a.  one-time pads.		b.  transposition ciphers
c.  polyalphabetic ciphers.	d.  two.			e.  none.
18.	Which is a purpose of the US Constitution as specified in its Preamble?
a.	to form a more perfect Union and to establish justice.
b.	to insure domestic tranquility and to provide for common defense.
c.	to promote international cooperation and peace.
d.	Two above.		e.  none.
19.	Which is a power of US Congress?
a.	collect taxes and borrow money.
b.	declare war
c.	promote the progress of science and useful arts
d.	All.			e.  two.
20.	Which US Constitution Article is for the Executive power?
a.  Article-I			b.  Article-II.
c.  Article-III.			d.  two.			e.  none.
21.	Which is a source for State authorities?
a.	Individual State Constitutions.
b.	US Constitution, Amendment-10.
c.	US Constitution Article-1, Section-10.
d.	All.			e.  two.			f.  none.
	 22.	Copyright protects
		a.  Software			b.  form of expressions.
		c.  ideas.			d.  all.			e.  two.  		
	 23.	Which is true about a Fair Use?
		a.  It is a violation of Copyright protection.
		b.  It is a reproduction without authorization for such purposes as 
     teaching, scholarship/research, criticism/comment, and news reporting.
c.  both.				d.  neither.
	24.	Which is not protected by Copyright?
a.	Ideas.			b.  methods of operations.
c.	works not fixed in a tangible form of expression.
d.	all.				e.  two.			f.  none.
25.	Copyright protection requires
	 a.    registration.		b.  publication
 c.    creation.			
d.   all.				e.  two.			f.  none
	26.	Patent protects
		a.  Form of Expressions.		b.  Ideas and Inventions.
		c.  Both.			d.  Neither.
	27.	Which is the primary Patent?
		a.  Design Patent.		b.  Utility Patent (with 20-year term).
		c.  Plant patent (with 20-year term).			d.  none.   
	
28.	Utility Patent requires
		a.  Statutory subject matter	b.  being useful, novel and non-obvious
		c.  Both.			d.  Neither.
	29.	Which is NOT eligible for a patent?
		a.  Mathematical formulars.
		b.  Purely theoretical physical phenomena without any practical usefulness.
		c.  Both.			d.  Neither.
	30.	The Computer Fraud and Abuse Act of 1986
		a.    is a part of Title-18: Crimes and Criminal Procedure.
b.	protects national security information systems and financial institutions' information 
systems.
c.	was amended by the1996 National Information Infrastructure Protection Act.
		d.   all.				e.  two.			f.  none.

PART-B.  Other Problems.						(10 points)

	Do one problem.

	A.  Give a hierarchical listing of US Laws.


	B.  Briefly describe the RSA Algorithm.


	C.   Compare copyright, patent and trademark.