Chapt 5 Flashcards

1
Q

CBA

A

cost-benefit analysis (CBA) for security estimates the strengths and weaknesses of the approaches you are considering so you can find the best methods to use to achieve security improvements at the lowest cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ROI

A

Return on investment (ROI) is the percentage comparing the net profit and cost of investment when you make an investment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCO

A

Security total cost of ownership (TCO) is used to calculate the total cost of the security steps your organization is contemplating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data

A

data is raw values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information

A

information is processed from data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Contextualization

A

Contextualization (why the data was gathered)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Categorization

A

Categorization (the key components of the data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Calculation

A

Calculation (mathematical or statistical analysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Condensation

A

Condensation (summarizing, graphing, or presenting data in tables)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Five C’s or 5 steps data needs to go through to become information

A

Contextualization, categorization, calculation, corrections, condensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intellectual property

A

Intellectual property is a creative work or invention that can be patented, copyrighted, or trademarked
I.e. book, a movie, a video game, or a computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data correlation

A

Data correlation is a statistical association, commonly thought to be a close relationship, between two items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Meaningful reporting

A

Meaningful reporting provides the information needed to help an organization make an informed decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

^(TM)

A

Used for products, services, and features. A superscripted capital TM indicates a trademark

You can apply a trademark to any goods you sell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

^(SM)

A

superscripted capital SM indicates a service mark (SM)
You ac apply a service mark to any services you provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

R

A

capital R in a circle indicates a registered trademark
A registered trademark is a trademark that has been registered with the U.S. Patent and Trademark Office

17
Q

Copyright

A

A copyright provides the creator of an original work the right to determine whether and how their work can be used by others, lasts for a limited period of time

18
Q

Patent

A

A patent is an exclusive right to prevent others from the marketing, sale, or use of an invention without the permission of a patent holder for a specified period of time (typically 20 years).

19
Q

Data-Driven Business Decisions

A

The process of using data to inform what a business does is known as data-driven business decisions. This process involves at least three steps:
Data capture and collection, Data correlation, Meaningful reporting

20
Q

Patent trolls

A

Companies that make a living from buying patents and suing other companies they claim are infringing on their patents are sometimes referred to as patent trolls.

21
Q

Which of the following activities is not considered an input?
Typing, Scanning, Printing, Recording

A

Printing

22
Q

Which of the following best expresses the relationship of data and information?

Data is the same as information.
Information must be gathered to create data.
Data and information are not related.
Data is the source of information.

A

Data is the source of information

23
Q

In the process of turning data into information, which of the following comes first?

Make decisions influenced by the data.
Gather data.
Analyze data.
Ignore data that conflicts with your feelings.

A

Gather data

24
Q

Your company has applied for a service mark on a service name. Which of the following marks would be used initially and after the service mark is registered?

SM, ©
™, ®
∫, ®
SM, ®

A

SM, ®

25
Q

Which of the following describes what copyleft does?

Copyleft negates a copyright.
Copyleft discourages the adaptation of open source software.
Copyleft allows an open source app to be modified, but prevents the modified version from being modified by others.
Copyleft allows an open source app and its modified versions to be modified freely by others.

A

Copyleft allows an open source app and its modified versions to be modified freely by others.

26
Q

Company ABC is suing Company XYZ for patent infringement. If Company ABC’s patents don’t really apply to Company XYZ’s product, what is Company ABC doing?

Being a patent king
Being a copyright infringer
Being a trademark violator
Being a patent troll

A

Patent troll

27
Q

Which of the following statements most accurately reflects what data correlation does?

Determining how one factor causes another factor
Deciding that two types of data are identical
Determining the statistical relationship between two types of data
Determining that both types of data are caused by a third type of data

A

Determining the statistical relationship between two types of data

28
Q

You receive a memo about a recent report labeled “too much, MEGO.” Which of the following is the best explanation of what needs to be fixed?

Add more background detail.
Reduce background detail.
Add pie charts.
Make report longer.

A

Reduce background detail.

29
Q

Your company has just patented a process it has no intention of producing. Which of the following describes what the company is doing?

Enabling other companies to freely use the process
Preventing other companies from using the process
Becoming a patent troll
Filing for a registered trademark

A

Preventing other companies from using the process

30
Q

Your company has trademarked “We make sprockets as easy as 1-2-3” for its sprocket business. When the company starts selling sprockets in a different state, the legal department discovers that another business is using the same trademark. Which of the following might best help preserve your company’s investment in the trademark?

Try to register the trademark.
Abandon the trademark.
Change the trademark into a service mark.
Sue the other company.

A

Try to register the trademark.

31
Q

Your company has decided to switch from physical distribution of its commercial software to using digital distribution via download. You discover a large company has downloaded your software and figured out how to install the software and make it run without paying for it. Which of the following should your company do?

Nothing. Downloadable software is always free.
Check to see if the software patent covers downloadable software.
Take legal action for copyright infringement.
Make sure the download site has a proper trademark.

A

Take legal action for copyright infringement.

32
Q

Your supervisor has asked you to generate a document from data that will provide useful information and lead to a data-driven decision. What is this called?

Data correlation
Microsoft Word analysis
Database mining
Meaningful reporting

A

Meaningful reporting

33
Q

Which of the following represents a statistical relationship between two types of data?

Data capture and collection
Data correlation
Data extrapolation
Intellectual data property (IDP)

A

Data correlation

34
Q

Which of the following is a legal right used to prevent unauthorized parties from copying an invention?

Patent
Service mark
Registered trademark
End-user license agreement (EULA)

A

Patent

35
Q

What are inventions, writings, art, photography, computer programs, and other creations of the mind considered?

Personal information (PI)
Copyrights of the thinkers (CotT)
Digital products
Intellectual property

A

Intellectual property

36
Q

Which of the following best describes digital security?

Encrypted data that has been unencrypted, interpreted, and processed to become meaningful for a particular question, situation, or requirement

Processes, methods, and attitudes leading to protecting data, information, processes, and personal information held by an organization

Information that is stored electronically and can be retrieved or transmitted in a private fashion through cryptographic functions

Being safe and comfortable in a controlled environment

A

Processes, methods, and attitudes leading to protecting data, information, processes, and personal information held by an organization

37
Q

You have recently developed a new video game and believe it will be the next huge hit. You want to call it “Fortnite: Two-weeks to victory!” Where would you check to see if this name is already taken and if you can even use this title?

The Library of Congress
Epic Games, Inc.
U.S. Patent and Trademark Office
The Intellectual Property Office (IPO)

A

U.S. Patent and Trademark Office