4A Flashcards

1
Q

The United States Government is the world’s largest consumer of Information Technology services and equipment, purchasing more than $____ _______ annually.

A

$50 billion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ _______ is the unauthorized copying or distribution of copyrighted software. This can be done by copying, downloading, sharing, selling, or installing multiple copies onto personal or work computers.

A

Software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What a lot of people don’t realize or don’t think about is that when you
purchase software, you are purchasing a ______ to use it, not the actual software.

A

license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whether software piracy is ________ or ____, it is still illegal and punishable by law.

A

deliberate or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four forms of software piracy?

A
  1. Corporate or end-user piracy
  2. Internet piracy
  3. Subscription licensing piracy
  4. Counterfeiting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is corporate or end-user piracy?

A
  1. Under-reporting installations of software acquired through volume purchase agreements.
  2. Making additional copies of the software without having the proper number of licenses. For instance, 1 licensed copy is available, yet five additional copies are made from it.
  3. Installing the software on a server that does not limit access to only authorized users (no lock-out mechanisms, hit counter, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is internet piracy?

A
  1. Providing access to software, key generators, activation keys, serial numbers, and permitting installation of the software through downloads, burned CDs, or in the original packaging.
  2. The provider is offering a copy; back-up copies may not be distributed.
  3. The product offered was previously distributed in violation of an authorized distributor, reseller, OEM, academic or other contract.
  4. The product being offered had previously been used to obtain an upgrade to a newer version.
  5. The product is unreleased or beta version.
  6. The provider offering a certain product is not an authorized reseller or otherwise licensed to reproduce or distribute the software.
  7. Undermine the copy protections or time-out functions of software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ _______ piracy is using subscription licensed software past the
subscription date

A

Subscription licensing piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________ is where someone attempts to copy the product and packaging so that it looks like an original.

A

Counterfeiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to DAFMAN 17-1203, ultimate responsibility for software piracy prevention lies with the ______ _______ _______.

A

Chief Information Officer (SAF/CN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does APO stand for?

A

Tenant Accountable Property Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another name for APO is?

A

The Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does BSLM stand for?

A

Base Software License Managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The host or tenant Accountable Property Officer (APO) certifies the Base Software License Manager (BSLM) has conducted an _________ inventory of all software on an installation and provides a copy of the inventory to their MAJCOM A/6 or Field Command (FLDCOM) and Service Owner for Enterprise IT.

A

annual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software License Management on an Air Force installation should be ________, but no lower than the Host or tenant Accountable Property Officer (APO).

A

centralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BSLM is responsible at a minimum for ensuring what?

A
  1. Ensure each organization maintains a software inventory of all non-enterprise Government off-the-shelf software/commercial off-the-shelf GOTS/COTS and associated licenses used by the organization.
  2. Ensure annual inventories are conducted for all non-enterprise software licenses for all organizations under BSLM purview.
  3. Monitor each organization’s automated software inventories.
  4. Collect an annual baseline of an inventory for all non-enterprise software licenses.
  5. Provide annual inventories to higher headquarters as required or requested. If requested, assist with providing enterprise software licensing inventory.
  6. Provide software license training for Client Systems Technicians (CSTs), helpdesks, and any other personnel managing software licenses.
  7. Perform periodic compliance visits to base units and tenant organizations with any non- enterprise software that is not automatically monitored.
17
Q

Air Force Organization’s responsibility in preventing software piracy includes doing what?

A
  1. Maintain a hard or soft copy of the software license inventory and “Proof-of-License Ownership” of GOTS/COTS software in use within their organization.
  2. Store proof of license agreements or licenses (e.g., user manuals, purchase documentation, CDs, etc.) and software media in a secure centralized location (e.g., locked drawer, file cabinet, room, etc.) or electronically if applicable.
  3. Inventory all licensed software annually and, if available utilize auto-discovery tools, to track and report implemented software and license information. The Organization commander will certify the annual inventory with a handwritten or digital signature indicating completion of the inventory and submit to the BSLM
  4. Audit all systems to ensure no illegal or unauthorized copies of software is installed
18
Q

US law provides both ______ and _________ penalties for software piracy which is considered a form of copyright infringement.

A

civil and criminal

19
Q

Which of the two penalities does the bottom statement apply to?

A successful ____ ____ by the owner of a software copyright normally requires that the violator pay for all monetary losses to the copyright owner as well as turning over any profits the violator may have earned from misuse of the copyrighted software. Additionally, a civil court
judge may impose a fine of up to $150,000 per violation.

A

Civil lawsuit

20
Q

Which of the two penalties does the bottom statement apply to?

If the act of software piracy is judged to be a _______ act akin to stealing, the violator could be charged with a ________ offense. If found guilty, the copyright violator could be sentenced to up to 5 years in jail and be required to pay a fine of up to $250,000.

A

Criminal offense