100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Actg 474 Final Exam Study Guide Verified And Updated 2025

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
06-02-2025
Written in
2024/2025

©THESTAR 2024/2025 ALL RIGHTS RESERVED 12:43 PM. 1 | P a g e Actg 474 Final Exam Study Guide Verified And Updated 2025 Sabotage - Answeran intentional act where the intent is to destroy a system or some of its components cookie - Answertext file created by a website and stored on a visitors hard drive. they store info about who the user is and what they have done on the site fraud - Answerany and all means a person uses to gain an unfair advantage over another person white collar criminals - Answerbusiness people who commit fraud, usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence corruption - Answerdishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards investment fraud - Answermisrepresenting or leaving out facts in order to promote an investment that promises fantastic profits with little to no risk misappropriation of assets - Answertheft of company assets by employees fraudulent financial reporting - Answerintentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements pressure - Answera person's incentive or motivation for committing fraud opportunity - Answercondition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to a personal gain lapping - Answerconcealing the theft of cash by means of a series of delays in posting collections to accounts receivable check kiting - Answercreating cash using the lag between the time a check is deposited and the time it clears the bank rationalization - Answerexcuse that fraud perpetrators use to justify their illegal behaviors ©THESTAR 2024/2025 ALL RIGHTS RESERVED 12:43 PM. 2 | P a g e computer fraud - Answerany type of fraud that requires computer technology to perpetrate information rights management - Answersoftware that offers the capability to not only limit access to specific files or documents, but also to specify the actions that individuals who are granted access to that resource can perform data loss prevention - Answersoftware that works like antivirus programs in reverse, blocking outgoing messages that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect digital watermark - Answercode embedded in documents that enables an organization to identify confidential information that has been disclosed data masking - Answerprogram that protects privacy by replacing personal information with fake values spam - Answerunsolicited emails that contain advertisements or offensive content identity theft - Answerassuming someones identity, usually for economic gain encryption - Answerprocess of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext decryption - Answerprocess of turning ciphertext into plain text symmetric encryption systems - Answerencryption systems that use the same key to both encrypt and decrypt asymmetric encryption systems - Answerencryption systems that use two keys (public and private); either key can encrypt, but only the matching key can decrypt public key - Answerused in asymmetric encryption systems, widely distributed and available to everyone private key - Answerused in asymmetric encryption systems, it is kept secret and known only to the owner of that pair of public and private keys key escrow - Answerprocess of storing a copy of an encryption key in a secure location hashing - Answertransforming plaintext of any length into a shortcode - called a hash nonrepudiation - Answercreating legally binding agreements that cannot be unilaterally repudiated by either party digital signature - Answerhash encrypted with hash creator's private key digital certificate - Answerelectronic document that certifies the identity of the owner of a particular public key and contains that

Show more Read less
Institution
ACTG 474
Course
ACTG 474









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ACTG 474
Course
ACTG 474

Document information

Uploaded on
February 6, 2025
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©THESTAR 2024/2025 ALL RIGHTS RESERVED 12:43 PM.




Actg 474 Final Exam Study Guide Verified
And Updated 2025



Sabotage - Answer✔an intentional act where the intent is to destroy a system or some of its
components

cookie - Answer✔text file created by a website and stored on a visitors hard drive. they store
info about who the user is and what they have done on the site

fraud - Answer✔any and all means a person uses to gain an unfair advantage over another
person

white collar criminals - Answer✔business people who commit fraud, usually resort to trickery or
cunning, and their crimes usually involve a violation of trust or confidence

corruption - Answer✔dishonest conduct by those in power which often involves actions that
are illegitimate, immoral, or incompatible with ethical standards

investment fraud - Answer✔misrepresenting or leaving out facts in order to promote an
investment that promises fantastic profits with little to no risk

misappropriation of assets - Answer✔theft of company assets by employees

fraudulent financial reporting - Answer✔intentional or reckless conduct, whether by act or
omission, that results in materially misleading financial statements

pressure - Answer✔a person's incentive or motivation for committing fraud

opportunity - Answer✔condition or situation that allows a person or organization to commit
and conceal a dishonest act and convert it to a personal gain

lapping - Answer✔concealing the theft of cash by means of a series of delays in posting
collections to accounts receivable

check kiting - Answer✔creating cash using the lag between the time a check is deposited and
the time it clears the bank

rationalization - Answer✔excuse that fraud perpetrators use to justify their illegal behaviors


1|Page

, ©THESTAR 2024/2025 ALL RIGHTS RESERVED 12:43 PM.


computer fraud - Answer✔any type of fraud that requires computer technology to perpetrate

information rights management - Answer✔software that offers the capability to not only limit
access to specific files or documents, but also to specify the actions that individuals who are
granted access to that resource can perform

data loss prevention - Answer✔software that works like antivirus programs in reverse, blocking
outgoing messages that contain key words or phrases associated with intellectual property or
other sensitive data the organization wants to protect

digital watermark - Answer✔code embedded in documents that enables an organization to
identify confidential information that has been disclosed

data masking - Answer✔program that protects privacy by replacing personal information with
fake values

spam - Answer✔unsolicited emails that contain advertisements or offensive content

identity theft - Answer✔assuming someones identity, usually for economic gain

encryption - Answer✔process of transforming normal text, called plaintext, into unreadable
gibberish, called ciphertext

decryption - Answer✔process of turning ciphertext into plain text

symmetric encryption systems - Answer✔encryption systems that use the same key to both
encrypt and decrypt

asymmetric encryption systems - Answer✔encryption systems that use two keys (public and
private); either key can encrypt, but only the matching key can decrypt

public key - Answer✔used in asymmetric encryption systems, widely distributed and available
to everyone

private key - Answer✔used in asymmetric encryption systems, it is kept secret and known only
to the owner of that pair of public and private keys

key escrow - Answer✔process of storing a copy of an encryption key in a secure location

hashing - Answer✔transforming plaintext of any length into a shortcode - called a hash

nonrepudiation - Answer✔creating legally binding agreements that cannot be unilaterally
repudiated by either party

digital signature - Answer✔hash encrypted with hash creator's private key

digital certificate - Answer✔electronic document that certifies the identity of the owner of a
particular public key and contains that party's public key

2|Page

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheStar Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
616
Member since
2 year
Number of followers
179
Documents
24416
Last sold
7 hours ago
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

122 reviews

5
58
4
22
3
21
2
4
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions