Actg 474 Final Exam With
Complete Solution
Sabotage - ANSWER an intentional act where the intent is to destroy a
system or some of its components
cookie - ANSWER text file created by a website and stored on a visitors hard
drive. they store info about who the user is and what they have done on the
site
fraud - ANSWER any and all means a person uses to gain an unfair advantage
over another person
white collar criminals - ANSWER business people who commit fraud, usually
resort to trickery or cunning, and their crimes usually involve a violation of
trust or confidence
corruption - ANSWER dishonest conduct by those in power which often
involves actions that are illegitimate, immoral, or incompatible with ethical
standards
investment fraud - ANSWER misrepresenting or leaving out facts in order to
promote an investment that promises fantastic profits with little to no risk
misappropriation of assets - ANSWER theft of company assets by employees
fraudulent financial reporting - ANSWER intentional or reckless conduct,
whether by act or omission, that results in materially misleading financial
statements
,pressure - ANSWER a person's incentive or motivation for committing fraud
opportunity - ANSWER condition or situation that allows a person or
organization to commit and conceal a dishonest act and convert it to a
personal gain
lapping - ANSWER concealing the theft of cash by means of a series of delays
in posting collections to accounts receivable
check kiting - ANSWER creating cash using the lag between the time a check
is deposited and the time it clears the bank
rationalization - ANSWER excuse that fraud perpetrators use to justify their
illegal behaviors
computer fraud - ANSWER any type of fraud that requires computer
technology to perpetrate
information rights management - ANSWER software that offers the
capability to not only limit access to specific files or documents, but also to
specify the actions that individuals who are granted access to that resource
can perform
data loss prevention - ANSWER software that works like antivirus programs
in reverse, blocking outgoing messages that contain key words or phrases
associated with intellectual property or other sensitive data the organization
wants to protect
digital watermark - ANSWER code embedded in documents that enables an
organization to identify confidential information that has been disclosed
data masking - ANSWER program that protects privacy by replacing personal
information with fake values
, spam - ANSWER unsolicited emails that contain advertisements or offensive
content
identity theft - ANSWER assuming someones identity, usually for economic
gain
encryption - ANSWER process of transforming normal text, called plaintext,
into unreadable gibberish, called ciphertext
decryption - ANSWER process of turning ciphertext into plain text
symmetric encryption systems - ANSWER encryption systems that use the
same key to both encrypt and decrypt
asymmetric encryption systems - ANSWER encryption systems that use two
keys (public and private); either key can encrypt, but only the matching key
can decrypt
public key - ANSWER used in asymmetric encryption systems, widely
distributed and available to everyone
private key - ANSWER used in asymmetric encryption systems, it is kept
secret and known only to the owner of that pair of public and private keys
key escrow - ANSWER process of storing a copy of an encryption key in a
secure location
hashing - ANSWER transforming plaintext of any length into a shortcode -
called a hash
nonrepudiation - ANSWER creating legally binding agreements that cannot
be unilaterally repudiated by either party
digital signature - ANSWER hash encrypted with hash creator's private key
Complete Solution
Sabotage - ANSWER an intentional act where the intent is to destroy a
system or some of its components
cookie - ANSWER text file created by a website and stored on a visitors hard
drive. they store info about who the user is and what they have done on the
site
fraud - ANSWER any and all means a person uses to gain an unfair advantage
over another person
white collar criminals - ANSWER business people who commit fraud, usually
resort to trickery or cunning, and their crimes usually involve a violation of
trust or confidence
corruption - ANSWER dishonest conduct by those in power which often
involves actions that are illegitimate, immoral, or incompatible with ethical
standards
investment fraud - ANSWER misrepresenting or leaving out facts in order to
promote an investment that promises fantastic profits with little to no risk
misappropriation of assets - ANSWER theft of company assets by employees
fraudulent financial reporting - ANSWER intentional or reckless conduct,
whether by act or omission, that results in materially misleading financial
statements
,pressure - ANSWER a person's incentive or motivation for committing fraud
opportunity - ANSWER condition or situation that allows a person or
organization to commit and conceal a dishonest act and convert it to a
personal gain
lapping - ANSWER concealing the theft of cash by means of a series of delays
in posting collections to accounts receivable
check kiting - ANSWER creating cash using the lag between the time a check
is deposited and the time it clears the bank
rationalization - ANSWER excuse that fraud perpetrators use to justify their
illegal behaviors
computer fraud - ANSWER any type of fraud that requires computer
technology to perpetrate
information rights management - ANSWER software that offers the
capability to not only limit access to specific files or documents, but also to
specify the actions that individuals who are granted access to that resource
can perform
data loss prevention - ANSWER software that works like antivirus programs
in reverse, blocking outgoing messages that contain key words or phrases
associated with intellectual property or other sensitive data the organization
wants to protect
digital watermark - ANSWER code embedded in documents that enables an
organization to identify confidential information that has been disclosed
data masking - ANSWER program that protects privacy by replacing personal
information with fake values
, spam - ANSWER unsolicited emails that contain advertisements or offensive
content
identity theft - ANSWER assuming someones identity, usually for economic
gain
encryption - ANSWER process of transforming normal text, called plaintext,
into unreadable gibberish, called ciphertext
decryption - ANSWER process of turning ciphertext into plain text
symmetric encryption systems - ANSWER encryption systems that use the
same key to both encrypt and decrypt
asymmetric encryption systems - ANSWER encryption systems that use two
keys (public and private); either key can encrypt, but only the matching key
can decrypt
public key - ANSWER used in asymmetric encryption systems, widely
distributed and available to everyone
private key - ANSWER used in asymmetric encryption systems, it is kept
secret and known only to the owner of that pair of public and private keys
key escrow - ANSWER process of storing a copy of an encryption key in a
secure location
hashing - ANSWER transforming plaintext of any length into a shortcode -
called a hash
nonrepudiation - ANSWER creating legally binding agreements that cannot
be unilaterally repudiated by either party
digital signature - ANSWER hash encrypted with hash creator's private key