#1
What is the primary purpose of Intellectual Property (IP) law?
To protect physical properties
To protect ideas and creations
To regulate internet access
To enforce criminal laws
#2
Which of the following is a form of intellectual property that protects original works of authorship, such as literary or artistic creations?
Patent
Trademark
Copyright
Trade secret
#3
In the context of intellectual property, what is the term for the exclusive right granted to the creator of a novel and non-obvious invention?
Patent
Trademark
Copyright
Trade secret
#4
What is the primary purpose of a Non-Disclosure Agreement (NDA) in the context of intellectual property?
To publicly disclose sensitive information
To prevent the unauthorized disclosure of confidential information
To secure patents
To register trademarks
#5
Which type of intellectual property protection is granted automatically upon the creation of an original work?
Patent
Trademark
Copyright
Trade secret
#6
Which type of intellectual property protects inventions, processes, and product designs?
Trademark
Copyright
Patent
Trade secret
#7
What is the main purpose of a Digital Millennium Copyright Act (DMCA) takedown notice?
To promote fair use of copyrighted material
To protect trademarks
To remove infringing content from online platforms
To regulate internet service providers
#8
Which international treaty provides a framework for the protection of intellectual property rights globally?
TRIPS Agreement
WIPO Copyright Treaty
Berne Convention
Paris Convention
#9
In the context of cybersecurity, what does the term 'phishing' refer to?
Securing a computer network with firewalls
Sending malicious software to infect systems
Stealing sensitive information through deceptive emails
Conducting penetration tests
#10
What is the role of a Digital Rights Management (DRM) system in the context of intellectual property?
To secure physical premises
To manage and protect digital content
To regulate online advertising
To prevent cyberattacks
#11
Which cybersecurity concept refers to the practice of disguising information to make it unreadable without the proper decryption key?
Firewall
Encryption
Phishing
Malware
#12
What is a common method used to protect against Distributed Denial of Service (DDoS) attacks?
Firewall
Intrusion Detection System (IDS)
Virtual Private Network (VPN)
Cloud-based DDoS mitigation service
#13
What is the primary goal of a cybersecurity incident response plan?
To prevent all cyberattacks
To minimize the impact of a security incident and restore normal operations
To identify and prosecute cybercriminals
To encrypt all sensitive data
#14
In the context of cybersecurity, what does the term 'zero-day vulnerability' refer to?
A vulnerability that has been present for zero days
A vulnerability that is not yet known to the software vendor
A type of malware with zero detection rate
A vulnerability that can only be exploited on weekends
#15
What is the primary objective of a penetration test in the field of cybersecurity?
To prevent unauthorized access
To simulate a real-world cyberattack and identify vulnerabilities
To encrypt sensitive data
To monitor network traffic