100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Actg 474 Final Exam With Complete Solution

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
01-02-2025
Written in
2024/2025

Actg 474 Final Exam With Complete Solution...

Institution
Actg 474
Course
Actg 474










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Actg 474
Course
Actg 474

Document information

Uploaded on
February 1, 2025
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • actg 474 final exam

Content preview

Actg 474 Final Exam With
Complete Solution

Sabotage - ANSWER an intentional act where the intent is to destroy a
system or some of its components

cookie - ANSWER text file created by a website and stored on a visitors hard
drive. they store info about who the user is and what they have done on the
site

fraud - ANSWER any and all means a person uses to gain an unfair advantage
over another person

white collar criminals - ANSWER business people who commit fraud, usually
resort to trickery or cunning, and their crimes usually involve a violation of
trust or confidence

corruption - ANSWER dishonest conduct by those in power which often
involves actions that are illegitimate, immoral, or incompatible with ethical
standards

investment fraud - ANSWER misrepresenting or leaving out facts in order to
promote an investment that promises fantastic profits with little to no risk

misappropriation of assets - ANSWER theft of company assets by employees

fraudulent financial reporting - ANSWER intentional or reckless conduct,
whether by act or omission, that results in materially misleading financial
statements

,pressure - ANSWER a person's incentive or motivation for committing fraud

opportunity - ANSWER condition or situation that allows a person or
organization to commit and conceal a dishonest act and convert it to a
personal gain

lapping - ANSWER concealing the theft of cash by means of a series of delays
in posting collections to accounts receivable

check kiting - ANSWER creating cash using the lag between the time a check
is deposited and the time it clears the bank

rationalization - ANSWER excuse that fraud perpetrators use to justify their
illegal behaviors

computer fraud - ANSWER any type of fraud that requires computer
technology to perpetrate

information rights management - ANSWER software that offers the
capability to not only limit access to specific files or documents, but also to
specify the actions that individuals who are granted access to that resource
can perform

data loss prevention - ANSWER software that works like antivirus programs
in reverse, blocking outgoing messages that contain key words or phrases
associated with intellectual property or other sensitive data the organization
wants to protect

digital watermark - ANSWER code embedded in documents that enables an
organization to identify confidential information that has been disclosed

data masking - ANSWER program that protects privacy by replacing personal
information with fake values

, spam - ANSWER unsolicited emails that contain advertisements or offensive
content

identity theft - ANSWER assuming someones identity, usually for economic
gain

encryption - ANSWER process of transforming normal text, called plaintext,
into unreadable gibberish, called ciphertext

decryption - ANSWER process of turning ciphertext into plain text

symmetric encryption systems - ANSWER encryption systems that use the
same key to both encrypt and decrypt

asymmetric encryption systems - ANSWER encryption systems that use two
keys (public and private); either key can encrypt, but only the matching key
can decrypt

public key - ANSWER used in asymmetric encryption systems, widely
distributed and available to everyone

private key - ANSWER used in asymmetric encryption systems, it is kept
secret and known only to the owner of that pair of public and private keys

key escrow - ANSWER process of storing a copy of an encryption key in a
secure location

hashing - ANSWER transforming plaintext of any length into a shortcode -
called a hash

nonrepudiation - ANSWER creating legally binding agreements that cannot
be unilaterally repudiated by either party

digital signature - ANSWER hash encrypted with hash creator's private key

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Belina West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
69
Member since
2 year
Number of followers
23
Documents
1434
Last sold
5 days ago

4.2

19 reviews

5
8
4
8
3
2
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions