CNIT 242 Chapter 16 Software Licensing

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

_____ = highest TCO of a system

Software licensing

2
New cards

There are two ways software licensing can be categorized. Name them

Proprietary and Free or Open Source

3
New cards

T/F All software is licensed

License usually comes with off-the-shelf software

OEM license included with software bundled with hardware

True

4
New cards

Licensing is usually confirmed through the use of a _____

License Agreement

5
New cards

Stipulates how that particular copy of software can be used

Usually limits the copyright owner's liability, prohibits reverse engineering, prohibits redistribution, etc.

EULAs are included

Enforceability depends on several factors

License agreement

6
New cards

A license is granted for use of a copy of software but ownership of the copy remains with the publisher

Proprietary Licensing

7
New cards

Typically, only a limited set of rights are provided to the end-user

Many denied rights would be provided under standard copyright law

Proprietary Licensing

8
New cards

The end-user must accept the license agreement prior to installation

Proprietary Licensing

9
New cards

Proprietary licenses can be based on one of two different models. Name them.

Time-based and deployment-based

10
New cards

Perpetual Licenses

Annual Licenses

Typically includes updates and may include upgrades

Software Rental

Time-based licensing

11
New cards

An add-on program where you pay an annual fee to get the upgraded support

Typically covers functionality upgrades and security fixes

Includes support program that goes above and beyond the standard "warranty

Software Maintenance

12
New cards

Requires a valid license for the software

Software Maintenance

13
New cards

Licensing that is based on how software is deployed, not based on time

Deployment-based Licensing

14
New cards

Name the 2 types of Deployment-based License

Stand-Alone Software Licensing

Client / Server Licensing

15
New cards

Type of Licensing:

Software that runs on an individual machine rather than in a client/server environment

Stand-Alone Licensing

16
New cards

Name the 2 approaches of stand-alone licensing

Individual Licenses and Floating Licenses

17
New cards

Each machine owns a distinct license, which is often tied to that particular machine

E.g., operating systems

Individual License

18
New cards

I.e., "reading a book" analogy

Licenses cover concurrent usage only, regardless of the number of installations

Floating License

19
New cards

Software that has both a client-side and server-side component

Client/Server Licensing

20
New cards

How client / server licensing is implemented is all about where the license is _____

enforced

21
New cards

Name the 2 approaches to client/server licensing.

Per-Connection Licenses

Client Access Licenses (CAL)

22
New cards

Enforced on the server and governs the number of concurrent connections to that particular server

Purchased per server regardless of the number of clients

Per-Connection Licenses

23
New cards

Enforced on the client and governs how a client access a server-based resource

Purchased per client regardless of the number of servers

Client Access Licenses (CAL)

24
New cards

When offered, _______ allows a single license key to validate multiple software copies

volume licensing

25
New cards

Often used in government or education

Costs are allocated based on the number of individual licenses in the pool

volume licensing

26
New cards

T/F Volume licensing is easy to exploit

Famous FCKGW key

"Timestop t2a" hack

True

27
New cards

T/F Microsoft deployed several mechanisms to eliminate piracy:

Enforced product activation

Windows Genuine Advantage (WGA)

Key Management Server (KMS) deployments

True

28
New cards

Central management of VLKs can be handled internally with a ___ host

Key Management Services (KMS)

29
New cards

The ____ command is used for all aspects of KMS management (server and client)

slmgr

30
New cards

Activation won't occur until a minimum number of clients register with the ___

Key Management Services (KMS) host

31
New cards

Activation won't occur until a minimum number of clients register with the KMS host is called the ___

activation threshold

32
New cards

How many clients does it take for KMS to work?

How many for servers?

25 and 5

33
New cards

A license is granted for use of a copy of software and ownership of the copy transfers to the end-user

Ownership of the copyright, however, remains with the publisher

Open Source Licensing

34
New cards

Implications of this type of licensing:

End-users have the right to do almost anything that any owner can do

Reverse Engineer

Modify source code

Redistribute

Open Source Licensing

35
New cards

Type of license:

Typically, acceptance of the license agreement is optional

Open Source Licensing

36
New cards

Type of license:

Any modifications made and redistributed must include source code

The end-user is not allowed to re-assert the removed copyright restrictions

Open Source Licensing

37
New cards

Examples:

GNU General Public License (GPL)

Most common but slightly more restrictive than others

BSD License

Originally governed the BSD OS but since expanded to cover lots of software

MIT License

Governs X-Windows, PuTTY, etc.

Open Source Licensing

38
New cards

Should be done periodically to ensure compliance

Non-compliance can result in all sorts of bad things

Monetary liability

Legal liability

Software License Audits

39
New cards

Can be done internally, voluntarily by a third-party or forcibly.

Some software can help but it's difficult to be 100% sure

If asked, need the license and invoice proving legit purchase

Software License Audits

40
New cards

Software & Information Industry Association (SIIA), Anti-Piracy Division

Software License Audits

41
New cards

Founded in 1988, focused on trying to stop software copyright infringement

Members include Microsoft, Dell, HP, Adobe, Intuit,

Cisco, Sybase, Symantec, etc.

Business Software Alliance

42
New cards

_____ host is configured with the VLK

Key Management Services (KMS)

43
New cards

Trade group representing many software vendors

Popular for its 1992 campaign "Don't Copy That Floppy

Software & Information Industry Association (SIIA), Anti-Piracy Division

44
New cards

Originally governed the BSD OS but since expanded to cover lots of software

BSD License

45
New cards

Governs X-Windows, PuTTY, etc.

MIT License