a. All materials published on the Internet and computer bulletin boards are subject to copyright protection only when accompanied by a formal copyright notice.

b. The bulletin board provider is liable for copyright infringement on its board only when it is aware of it.

c. Organizations own the copyright for building Internet sites by freelance writers.

d. An employer will always be the owner of an Internet work created by an employee within the scope of employment.

174. d. An employer will be the owner of a work created by an employee within the scope of employment. All material published on the Internet and computer bulletin boards are subject to copyright protection, whether or not it is accompanied by a formal copyright notice. It is true that an independent contractor, a freelancer, may hold the copyright in a work made for someone else if there is no express agreement to the contrary.

175. Under which of the following conditions has a copyright infringement not occurred?

a. When a work is viewed.

b. When a printed work is “scanned” into a digital file.

c. When a work is “uploaded” from a user’s computer to a bulletin board system.

d. When the contents of a downloaded file are modified.

175. a. Viewing a work is harmless, as long it is not used in a commercial way. Usually, copyright laws grant owners certain rights, including the right to reproduce a work. The reproduction work is infringed whenever a work is uploaded from a user’s computer to a bulletin board system or other server, downloaded from such a system or server, or transferred from one computer network user to another. An infringing copy is made when a printed work is scanned into a digital file and when the contents of a downloaded file are changed to prepare a derivative work.

176. Under which of the following conditions is the use of an Internet domain name (address) not illegal?

a. When the same name is used that has been in use for years by a competitor or noncompetitor.

b. When a new name is used.

c. When the company that assigns an Internet address assigns the same name.

d. When the company that assigns an Internet address has no change control system.

176. b. The Internet domain name contains elements that are in an electronic address directly following the symbol “@,” which serves as the key identifier of a computer connected to the Internet. A new name is not illegal. The case law ruled that the other three choices are illegal uses of a domain name. The company that assigns an Internet address is called a gatekeeper.

177. Sources of legal rights and obligations for privacy over electronic mail do not include:

a. The law of the country

b. Employer practices

c. Employee practices

d. Employer policies

177. c. Because e-mail can cross many state and national boundaries and even continents, it is advised to review the principal sources of legal rights and obligations. These sources include the law of the country and employer policies and practices. Employee practices have no effect on the legal rights and obligations.

178. Which of the following represents risk mitigation measures to detect, limit, or eliminate the malicious code attacks in software?

1. Secure coding practices

2. Trusted procurement processes

3. Configuration management process

4. System monitoring practices

a. 1 and 3

b. 3 only

c. 3 and 4

d. 1, 2, 3, and 4

178. d. The goal is to ensure that software does not perform functions other than those intended. Risk mitigation measures to ensure that software does not perform unintended functions (e.g., malicious code attacks) include strong integrity controls, secure coding practices, trusted procurement processes for acquiring network-related hardware and software, configuration management and control, and system monitoring practices.

Перейти на страницу:

Поиск

Похожие книги