2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet158/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   154   155   156   157   158   159   160   161   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

D.
Secret Service
5.
What is the broadest category of computer systems protected by the Computer Fraud and 
Abuse Act, as amended?
A.
Government-owned systems
B.
Federal interest systems
C.
Systems used in interstate commerce
D.
Systems located in the United States
6.
What law protects the right of citizens to privacy by placing restrictions on the authority 
granted to government agencies to search private residences and facilities?
A.
Privacy Act
B.
Fourth Amendment


Review Questions 
155
C.
Second Amendment
D.
Gramm-Leach-Bliley Act
7.
Matthew recently authored an innovative algorithm for solving a mathematical problem, 
and he wants to share it with the world. However, prior to publishing the software code in 
a technical journal, he wants to obtain some sort of intellectual property protection. Which 
type of protection is best suited to his needs?
A.
Copyright
B.
Trademark
C.
Patent
D.
Trade secret
8.
Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, 
Joe, she has developed a special oil that will dramatically improve the widget manufactur-
ing process. To keep the formula secret, Mary and Joe plan to make large quantities of the 
oil by themselves in the plant after the other workers have left. They want to protect this 
formula for as long as possible. What type of intellectual property protection best suits 
their needs?
A.
Copyright
B.
Trademark
C.
Patent
D.
Trade secret
9.
Richard recently developed a great name for a new product that he plans to begin using 
immediately. He spoke with his attorney and filed the appropriate application to protect his 
product name but has not yet received a response from the government regarding his appli-
cation. He wants to begin using the name immediately. What symbol should he use next to 
the name to indicate its protected status?

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   154   155   156   157   158   159   160   161   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish