CYB 210 Final Review Questions all
100% Solved Correct
Three categories of fraud - ✔✔Asset misappropriation, Corruption, financial records/ statement
Skimming - ✔✔Taking money before it has been recorded
Larceny - ✔✔Theft of property without breaking and entering
Embezzlement - ✔✔Misusing entrusted funds
Lapping - ✔✔Manipulating accounts to conceal theft
Shell Company - ✔✔Fake company for fraudulent activities
Payroll Manipulation - ✔✔Unauthorized changes to payroll records
Ghost employees - ✔✔Fake employees for payroll fraud
Who commits fraud, and the most expensive fraud - ✔✔Many people commit fraud but
mainly employees. C suite employees commit most expensive fraud
Red Flags for fraud - ✔✔Unusual behavior, living beyond means, uncommon relationships, etc
How does social engineering work - ✔✔Manipulating and individual to release sensitive information
, Four roles of segregation of duties - ✔✔Authorization
Recording/ documenting
Custody of assets
Reconciliation/ Review
3 stages of fraud investigation - ✔✔Detection
Investigation/ gather evidence
Resolution/ prosecution
State Breach Notification Laws - ✔✔require businesses or governments to notify consumers
or citizens if their personal information is breached.
HIPPA - ✔✔national standards to protect sensitive patient health information from being disclosed
without the patient's consent or knowledge
Sarbanes-Oxley - ✔✔federal law designed to further protect shareholders and the public from
general accounting fraud in public and private companies by improving the accuracy of
corporate disclosures
Gramm-Leach-Bliley - ✔✔requires financial institutions to protect the privacy of consumer
information. It also mandates that companies provide consumers with privacy statements that describe
in detail the companies' information-sharing policies and practices
Red Flags Rule - ✔✔requires specified firms to create a written Identity Theft Prevention Program
(ITPP) designed to identify, detect and respond to "red flags"—patterns, practices or specific activities—
that could indicate identity theft
FISMA - ✔✔defines a framework of guidelines and security standards to protect
government information and operations
PCI DSS - ✔✔aims to enhance security for consumers by setting guidelines for any company
that accepts, stores, processes, or transmits credit card information and credit card transactions
100% Solved Correct
Three categories of fraud - ✔✔Asset misappropriation, Corruption, financial records/ statement
Skimming - ✔✔Taking money before it has been recorded
Larceny - ✔✔Theft of property without breaking and entering
Embezzlement - ✔✔Misusing entrusted funds
Lapping - ✔✔Manipulating accounts to conceal theft
Shell Company - ✔✔Fake company for fraudulent activities
Payroll Manipulation - ✔✔Unauthorized changes to payroll records
Ghost employees - ✔✔Fake employees for payroll fraud
Who commits fraud, and the most expensive fraud - ✔✔Many people commit fraud but
mainly employees. C suite employees commit most expensive fraud
Red Flags for fraud - ✔✔Unusual behavior, living beyond means, uncommon relationships, etc
How does social engineering work - ✔✔Manipulating and individual to release sensitive information
, Four roles of segregation of duties - ✔✔Authorization
Recording/ documenting
Custody of assets
Reconciliation/ Review
3 stages of fraud investigation - ✔✔Detection
Investigation/ gather evidence
Resolution/ prosecution
State Breach Notification Laws - ✔✔require businesses or governments to notify consumers
or citizens if their personal information is breached.
HIPPA - ✔✔national standards to protect sensitive patient health information from being disclosed
without the patient's consent or knowledge
Sarbanes-Oxley - ✔✔federal law designed to further protect shareholders and the public from
general accounting fraud in public and private companies by improving the accuracy of
corporate disclosures
Gramm-Leach-Bliley - ✔✔requires financial institutions to protect the privacy of consumer
information. It also mandates that companies provide consumers with privacy statements that describe
in detail the companies' information-sharing policies and practices
Red Flags Rule - ✔✔requires specified firms to create a written Identity Theft Prevention Program
(ITPP) designed to identify, detect and respond to "red flags"—patterns, practices or specific activities—
that could indicate identity theft
FISMA - ✔✔defines a framework of guidelines and security standards to protect
government information and operations
PCI DSS - ✔✔aims to enhance security for consumers by setting guidelines for any company
that accepts, stores, processes, or transmits credit card information and credit card transactions