Test Bank Ch07
14 Pages

Test Bank Ch07

Course Number: ECON 202085, Spring 2011

College/University: University of Jordan

Word Count: 3638

Rating:

Document Preview

Chapter 7 MULTIPLE CHOICE 1. The AICPA and the CICA have created an evaluation service known as SysTrust. SysTrust follows four principles to determine if a system is reliable. The reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as a) b) c) d) availability. security. maintainability. integrity. 2. According to SysTrust, the...

Unformatted Document Excerpt
Coursehero >> Jordan >> University of Jordan >> ECON 202085

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

7 Chapter MULTIPLE CHOICE 1. The AICPA and the CICA have created an evaluation service known as SysTrust. SysTrust follows four principles to determine if a system is reliable. The reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as a) b) c) d) availability. security. maintainability. integrity. 2. According to SysTrust, the reliability principle of integrity is achieved when a) the system is available for operation and use at times set forth by agreement. b) the system is protected against unauthorized physical and logical access. c) the system can be maintained as required without affecting system availability, security, and integrity. d) system processing is complete, accurate, timely, and authorized. 3. Which of the following is not one of the five basic principles that contribute to systems reliability according to the Trust Services framework. a) b) c) d) Confidentiality Processing speed Security System availability 4. Which of the following is not one of the three fundamental information security concepts? a) b) c) d) Information security is a technology issue that hinges on prevention. Security is a management issue, not a technology issue. The idea of defense-in-depth employs multiple layers of controls. The time-based model of security focuses on the relationship between preventive, detective and corrective controls. 5. The trust services framework identifies four essential criteria for successfully implementing each of the principles that contribute to systems reliability. Which of the following is not one of those four essential criteria? a) b) c) d) Developing and documenting policies Effectively communicating policies to all outsiders Designing and employing appropriate control procedures to implement policies Monitoring the system and taking corrective action to maintain compliance with policies 6. Giving users regular, periodic reminders about security policies and training in complying with them is an example of which of the following trust services criteria? a) b) c) d) Policy development Effective communication of policies Design/use of control procedures Monitoring and remedial action 7. Because planning is more effective than reacting, this is an important criteria for successfully implementing systems reliability: a) b) c) d) Policy development Effective communication of policies Design/use of control procedures Monitoring and remedial action 8. If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is a) b) c) d) effective ineffective overdone undermanaged 9. Preventive controls require two related functions, which are: a) b) c) d) Access and control Authentication and authorization Detection and correction Physical access and logical access 10. Verifying the identity of the person or device attempting to access the system is a) b) c) d) Authentication Authorization Identification Threat monitoring 11. Restricting access of users to specific portions of the system as well as specific tasks, is a) b) c) d) Authentication Authorization Identification Threat monitoring 12. Which of the following is an example of a preventive control? a) b) c) d) Encryption Log analysis Intrusion detection Emergency response teams 13. Which of the following is an example of a detective control? a) b) c) d) Physical access controls Encryption Log analysis Emergency response teams 14. Which of the following is an example of a corrective control? a) Physical access controls b) Encryption c) Intrusion detection d) Emergency response teams 15. Which of the following is not a requirement of effective passwords? a) b) c) d) Passwords should be changed at regular intervals. Passwords should be no more than 8 characters in length. Passwords should contain a mixture of upper and lowercase letters, numbers and characters. Passwords should not be words found in dictionaries. 16. Multi-factor authentication a) b) c) d) Involves the use of two or more basic authentication methods. Is a table specifying which portions of the systems users are permitted to access. Provides weaker authentication than the use of effective passwords. Requires the use of more than one effective password. 17. An access control matrix a) b) c) d) Does not have to be updated. Is a table specifying which portions of the system users are permitted to access. Is used to implement authentication controls. Matches the user's authentication credentials to his authorization. 18. Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security. a) b) c) d) Training Controlling physical access Controlling remote access Host and application hardening 19. Which of the following preventive controls are necessary to provide adequate security that deals with social engineering? a) b) c) d) Controlling remote access Encryption Host and application hardening Training 20. The device that connects an organization's information system to the Internet is a a) b) c) d) Demilitarized zone Firewall Gateway Router 21. A special purpose hardware device or software running on a general purpose computer which filters information that is allowed to enter and leave the organization's information system. a) b) c) d) Demilitarized zone Intrusion detection system Intrusion prevention system Firewall 22. This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet. a) b) c) d) Access control list Internet protocol Packet switching protocol Transmission control protocol 23. This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination. a) b) c) d) Access control list Internet protocol Packet switching protocol Transmission control protocol 24. This determines which packets are allowed entry and which are dropped.. a) b) c) d) Access control list Deep packet inspection Stateful packet filtering Static packet filtering 25. 26. Compatibility tests utilize a(n) __________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate. a) b) c) d) validity test biometric matrix logical control matrix access control matrix 27. This screens individual IP packets based solely on the contents of the source and/ or destination fields in the packet header.. a) b) c) d) Access control list Deep packet inspection Stateful packet filtering Static packet filtering 28. This maintains a table that lists all established connections between the organization's computers and the Internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer.. a) b) c) d) Access control list Deep packet inspection Stateful packet filtering Static packet filtering 29. This processes involves the firewall examining the data in the body of an IP packet. a) b) c) d) Access control list Deep packet inspection Stateful packet filtering Static packet filtering 30. This is designed to identify and drop packets that are part of an attack. a) b) c) d) Deep packet inspection Intrusion prevention system Stateful packet filtering Static packet filtering 31. This is used to identify rogue modems (or by hackers to identify targets). a) b) c) d) War chalking War dialing War driving None of the above 32. The process of turning off unnecessary features in the system is known as a) b) c) d) Deep packet inspection Hardening Intrusion detection War dialing 33. The most common input-related vulnerability is a) b) c) d) Buffer overflow attack Hardening War dialing Encryption 34. The final layer of preventive controls. a) b) c) d) Authentication Authorization Encryption Intrusion detection 35. The process of transforming normal text into cipher text a) b) c) d) Encryption Decryption Filtering Hardening 36. Which of the following is not one of the three important factors determining the strength of any encryption system? a) b) c) d) a) b) c) d) Key length Key management policies Encryption algorithm Privacy Asymmetric encryption Hashing encryption Public key encryption Symmetric encryption 37. These systems use the same key to encrypt and to decrypt. 38. Which of the following descriptions is not associated with symmetric encryption? a) b) c) d) A shared secret key Faster encryption Lack of authentication Separate keys for each communication party. 39. Which of the following is not associated with asymmetric encryption? a) b) c) d) No need for key exchange Public keys Private keys Speed 40. A process that takes plaintext of any length and transforms it into a short code. a) b) c) d) Asymmetric encryption Encryption Hashing Symmetric encryption 41. These are used to create digital signatures. a) b) c) d) Asymmetric encryption and hashing Hashing and packet filtering Packet filtering and encryption Symmetric encryption and hashing 42. Information encrypted with the creator's private key that is used to authenticate the sender is. a) b) c) d) Asymmetric encryption Digital certificate Digital signature Public key 43. An electronic document that certifies the identity of the owner of a particular public key. a) b) c) d) Asymmetric encryption Digital certificate Digital signature Public key 44. The system and processes used to issue and manage asymmetric keys and digital certificates. a) b) c) d) Asymmetric encryption Certificate authority Digital signature Public key infrastructure 45. In a private key system the sender and the receiver have __________, and in the public key system they have __________. a) b) c) d) different keys; the same key a decrypting algorithm; an encrypting algorithm the same key; two separate keys an encrypting algorithm; a decrypting algorithm 46. One way to circumvent the counterfeiting of public keys is by using a) b) c) d) a digital certificate. digital authority. encryption. cryptography. 47. Which of the following describes one weakness of encryption? a) b) c) d) Encrypted packets cannot be examined by a firewall. Encryption protects the confidentiality of information while in storage. Encryption protects the privacy of information during transmission. Encryption provides for both authentication and non-repudiation. 48. 49. This creates logs of network traffic that was permitted to pass the firewall a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan 50. 51. This uses automated tools to identify whether a given system possesses any wellknown security problems. a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan 52. 53. This is an authorized attempt by an internal audit team or an external security consultant to break into the organization's information system. a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan 54. 55. A more rigorous test of the effectiveness of an organization's computer security. a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan 56. 57. These are established to deal with major security breaches. a) b) c) d) CERTs CSOs FIRSTs Intrusion detection systems The ___________ disseminates information about fraud, errors, breaches and other improper system uses and their consequences. e) f) g) h) Chief information officer Chief operations officer Chief security officer Computer emergency response team In 2007, a major U.S. financial institution hired a security firm to attempt to compromise its computer network. A week later, the firm reported that it had successfully entered the system without apparent detection and presented an analysis the of vulnerabilities that had been found. This is an example of a i) j) k) l) preventive control. detective control. corrective control. standard control. It was 9:08 A.M. when Jiao Jan, the Network Administrator for Folding Squid Technologies, was informed that the intrusion detection system had identified an ongoing attempt to breach network security. By the time that Jiao had identified and blocked the attack, the hacker had accessed and downloaded several files from the companys server. Using the notation for the time-based model of security, in this case m) n) o) p) P>D D>P C>P P>C Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to conceal messages. One of the earliest methods, attributed to an ancient Roman emperor, was the simple substitution of numbers for letters, for example A = 1, B = 2, etc. This is an example of q) r) s) t) a hashing algorithm. symmetric key encryption. asymmetric key encryption. a public key. Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses random digits. Two documents are prepared with the same random sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follows. Suppose that the word to be encrypted is SPY and the random digits are 352. Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of u) v) w) x) a hashing algorithm. asymmetric key encryption. symmetric key encryption. public key encryption. Using a combination of symmetric and asymmetric key encryption, Chris Kai sent a report to her home office in Syracuse, New York. She received an email acknowledgement that the document had been received and then, a few minutes later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report. This most likely explanation for this result is that y) z) aa) ab) the public key had been compromised. the private key had been compromised. the symmetric encryption key had been compromised. the asymmetric encryption key had been compromised. Which of the following is commonly true of the default settings for most commercially available wireless access points? ac) ad) ae) af) The security level is set at the factory and cannot be changed. Wireless access points present little danger of vulnerability so security is not a concern. Security is set to the lowest level that the device is capable of. Security is set to the highest level that the device is capable of. In recent years, many of the attacks carried out by hackers have relied on this type of vulnerability in computer software. ag) ah) ai) aj) Code mastication Boot sector corruption Weak authentication Buffer overflow Meaningful Discussions is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits. As a consequence, the size of the information technology department has been growing very rapidly, with many new hires. Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility. This is an example of a(an) ak) authentication control. al) biometric device. am) remote access control. an) authorization control. When new employees are hired by Folding Squid Technologies, they are assigned user names and appropriate permissions are entered into the information systems access control matrix. This is an example of a(an) ao) ap) aq) ar) authentication control. biometric device. remote access control. authorization control. When new employees are hired by Folding Squid Technologies, they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader. In order to log in, the users fingerprint must be recognized by the reader. This is an example of a(an) as) at) au) av) authorization control. biometric device. remote access control. defense in depth. Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of aw) the user of encrypted data. ax) the provider of encrypted data. ay) both the user and the provider of encrypted data. az) either the user or the provider of encrypted data. Information technology managers are often in a bind when a new exploit is discovered in the wild. They can respond by updating the affected software or hardware with new code provided by the manufacturer, which runs the risk that a flaw in the update will break the system. Or they can wait until the new code has been extensively tested, but that runs the risk that they will be compromised by the exploit during the testing period. Dealing with these issues is referred to as ba) bb) bc) bd) change management. hardening. patch management. defense in depth Murray Snitzel called a meeting of the top management at Snitzel Capital Management. Number one on the agenda was computer system security. The risk of security breach incidents has become unacceptable, he said, and turned to the Chief Information Officer. This your responsibility! What do you intend to do? Which of the following is the best answer? be) bf) bg) bh) Evaluate and modify the system using the Trust Services framework Evaluate and modify the system using the COBIT framework. Evaluate and modify the system using the CTC checklist. Evaluate and modify the system using COBOL. Which of the following is the most effective method of protecting against social engineering attacks on a computer system? bi) bj) bk) bl) stateful packet filtering. employee training. a firewall. a demilitarized zone. The most effective way to protect network resources, like email servers, that are outside of the network and are exposed to the internet is bm) stateful packet filtering. bn) employee training. bo) a firewall. bp) a demilitarized zone. On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jans car while he was attending a conference in Cleveland, Ohio. After reporting the theft, Jiao considered the implications of the theft for the companys network security and concluded there was nothing to worry about because bq) the computer was protected by a password. br) the computer was insured against theft. bs) it was unlikely that the thief would know how to access the company data stored on the computer. bt) the data stored on the computer was encrypted. All employees of E.C. Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted. Entry to secure areas, such as the Information Technology Department offices, requires further procedures. This is an example of a(an) bu) authentication control. bv) authorization control. bw) physical access control. bx) hardening procedure. On February 14, 2008, students enrolled in an economics course at Swingline College received an email stating that class would be cancelled. The email claimed to be from the professor, but it wasn't. Computer forensic experts determined that the email was sent from a computer in one of the campus labs at 9:14 A.M. They were then able to uniquely identify the computer that was used by means of its network interface card's ______ address. Security cameras revealed the identity of the student responsible for spoofing the class. by) bz) ca) cb) TCP/IP MAC DMZ IDS There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the latter. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into the attack he was locked out of the system. Using the notation of the timebased model of security, which of the following must be true? cc) cd) ce) cf) P<6 D=6 P=6 P>6 In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is cg) security. ch) confidentiality. ci) privacy. cj) availability. SHORT ANSWER 58. Identify the four basic principles that contribute to systems reliability according to the Trust Services framework developed by the AICPA and the CICA. 59. What are the three fundamental information security concepts? 60. What are three ways users can be authenticated? 61. What three factors determine the strength of any encryption system? 62. How does an intrusion detection system work? 63. What is a penetration test? ESSAY 64. Describe four requirements of effective passwords 65. Explain social engineering. 66. What are the problems with symmetric encryption? 67. Explain the value of penetration testing. ANSWER KEY 1) A 2) D 3) B 4) A 5) B 6) B 7) A 8) A 9) B 10) A 11) B 12) A 13) C 14) D 15) B 16) A 17) B 18) C 19) D 20) D 21) D 22) D 23) B 24) A 25) D 26) D 27) C 28) B 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50) 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) 73) 74) 75) 76) 77) 78) B B B A C A D D C D C A C B D C A A A D C C A C B A B C C C D A D B D C A B D D C B D C Security, confidentiality, privacy, processing integrity, availability. 1. Security is a management issue, not a technology issue. 2. The time-based model of security. 3. Defense-in-depth. Users can be authenticated by verifying: 1. something they know (password). 2. something they have (smart card or ID badge). 3. Something they are (biometric identification of fingerprint). 1. Key length. 2. Key management policies. 3. Encryption algorithm. An intrusion detection system creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions. An authorized attempt by either an internal audit team or an external security consultant to break into the organization's information system. 79) 1. Strong passwords should be at least 8 characters. 2. Passwords should use a mixture of upper and lowercase letters, numbers and characters. 3. Passwords should be random and not words found in dictionaries. 4. Passwords should be changes frequently. 80) Social engineering attacks use deception to obtain unauthorized access to information resources, such as attackers who post as a janitor or as a legitimate system user. Employees must be trained not to divulge passwords or other information about their accounts to anyone who contacts them and claims to be part of the organization's security team. 81) Symmetric encryption is much faster than asymmetric encryption, but it has several problems. 1. Both parties (sender and receiver) need to know the shared secret key. 2. Separate secret keys must be maintained for use with each different communication party. 3. There is no way to prove who created a specific document. 82) Penetration testing involves an authorized attempt by an internal audit team or an external security consultant to break into the organization's information system. This type of service is provided by risk management specialists in all the Big Four accounting firms. These specialists spend more than half of their time on security matters. The team attempts to compromise the system using every means possible. With a combination of systems technology skills and social engineering, these teams often find weaknesses in systems that were believed to be secure.

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

University of Jordan - ECON - 202085
Chapter 8 MULTIPLE CHOICE1. Concerning virtual private networks (VPN), which of the following is not true?a) VPNs provide the functionality of a privately owned network using the Internet. b) Using VPN software to encrypt information while it is in tran
University of Jordan - ECON - 202085
Chapter 9 MULTIPLE CHOICE1. Which characteristics below is not a characteristic of auditing?a) b) c) d) evidence collection establishing audit criteria objectivity systems development2. Auditing involves thea) b) c) d) collection, review, and document
University of Jordan - ECON - 202085
Chapter 10 MULTIPLE CHOICE1. The credit manager reports to the _ and the treasurer reports to the _.a) b) c) d) controller; vice president of finance treasurer; controller marketing manager; vice president of finance treasurer; vice president of finance
University of Jordan - ECON - 202085
Chapter 11 MULTIPLE CHOICE1. In the expenditure cycle, the primary external exchange of information occurs witha) b) c) d) customers. suppliers. management. the audit committee.2. Within the expenditure cycle, internal information flowsa) b) c) d) fro
University of Jordan - ECON - 202085
CH 12 MULTIPLE CHOICE1. The AIS compiles and feeds information among the business cycles. What is the relationship between the revenue and production cycles regarding the exchange of information?a) The revenue cycle provides sales forecast and customer
University of Jordan - ECON - 202085
Chapter 13 MULTIPLE CHOICE 1. Which activity below is not performed by the HRM?a) b) c) d)compensation training discharge recruitment and hiring2. In most companies the HRM/payroll cycle activities are accomplished by two separate systems. Which task b
University of Jordan - ECON - 202085
Chapter 14 MULTIPLE CHOICE1. The general ledger and reporting system consists of the _ involved in _ the general ledger and _ reports.a) b) c) d) business transactions; updating; processing data processing; business transactions for; printing informatio
University of Jordan - ECON - 202085
Chapter 15 MULTIPLE CHOICE1. There are five basic stages in the database design process. The step which includes developing the conceptual-, external-, and internal-level schema into the actual database structures is known asa) b) c) d) stage one. stage
University of Jordan - ECON - 202085
Chapter 16 MULTIPLE CHOICE1. Integrating separate REA diagrams developed for individual transaction cycles into a single, comprehensive enterprise-wide data modela) is possible. b) requires understanding what the cardinalities in each separate diagram r
University of Jordan - ECON - 202085
University of Jordan - ECON - 202085
CH 18 MULTIPLE CHOICE1. Organizations continually face the need for new, faster, and more reliable ways of obtaining information. One reason why companies change their systems is to increase quality, quantity, and the speed with which information can be
University of Jordan - ECON - 202085
CH 19 MULTIPLE CHOICE1. Which statement below regarding the development of an AIS is false?a) A newly designed AIS always meets user needs for a time period. b) Changes to the AIS are often difficult to make after requirements have been frozen into spec
University of Jordan - ECON - 202085
Chapter 20 MULTIPLE CHOICE1. What is one activity that is not one of the responsibilities of accountants to help keep a project on track?a) b) c) d) ensuring that the project is on schedule evaluating and measuring benefits helping programmers write cod
University of Jordan - ECON - 202098
Chapter 001 Introduction to Corporate FinanceMultiple Choice Questions 1. The person generally directly responsible for overseeing the tax management, cost accounting, financial accounting, and data processing functions is the: a. treasurer. b. director.
University of Jordan - ECON - 202098
Chapter 002 Financial Statements, Taxes and Cash FlowMultiple Choice Questions 1. The financial statement summarizing the value of a firm's equity on a particular date is the: a. income statement. B. balance sheet. c. statement of cash flows. d. cash flo
University of Jordan - ECON - 202098
Chapter 003 Working with Financial StatementsMultiple Choice Questions 1. Activities of a firm which require the spending of cash are known as: a. sources of cash. B. uses of cash. c. cash payments. d. cash receipts. e. cash on hand.SECTION: 3.1 TOPIC:
University of Jordan - ECON - 202098
Chapter 004 Long-Term Financial Planning and GrowthMultiple Choice Questions 1. The long-range time period, usually the next two to five years, over which the financial planning process focuses is known as the: A. planning horizon. b. planning strategy.
University of Jordan - ECON - 202098
Chapter 005 Introduction to Valuation: The Time Value of MoneyMultiple Choice Questions 1. The amount an investment will be worth after one or more periods of time is the _ value. A. future b. present c. principal d. discounted e. simpleSECTION: 5.1 TOP
University of Jordan - ECON - 202098
Chapter 006 Discounted Cash Flow ValuationMultiple Choice Questions 1. An annuity is a(n): a. level stream of perpetual cash flows. B. level stream of cash flows occurring for a fixed period of time. c. increasing stream of perpetual cash flows. d. incre
University of Jordan - ECON - 202098
Chapter 007 Interest Rates and Bond ValuationMultiple Choice Questions 1. The stated interest payment, in dollars, made on a bond each period is called the bond's: A. coupon. b. face value. c. maturity. d. yield to maturity. e. coupon rate.SECTION: 7.1
University of Jordan - ECON - 202098
Chapter 008 Stock ValuationMultiple Choice Questions 1. The stock valuation model that determines the current stock price by dividing the next annual dividend amount by the excess of the discount rate less the dividend growth rate is called the _ model.
University of Jordan - ECON - 202098
Chapter 009 Net Present Value and Other Investment CriteriaMultiple Choice Questions 1. The difference between an investment's market value and its cost is the: A. net present value. b. internal rate of return. c. payback period. d. profitability index.
University of Jordan - ECON - 202098
Chapter 010 Making Capital Investment DecisionsMultiple Choice Questions 1. The changes in a firm's future cash flows that are a direct consequence of accepting a project are called _ cash flows. A. incremental b. stand-alone c. after-tax d. net present
University of Jordan - ECON - 202098
Chapter 011 Project Analysis and EvaluationMultiple Choice Questions 1. Forecasting risk is defined as the: a. possibility that some proposed projects will be rejected. b. process of estimating future cash flows relative to a project. C. possibility that
University of Jordan - ECON - 202098
Chapter 012 Some Lessons from Capital Market HistoryMultiple Choice Questions 1. The excess return required from a risky asset over that required from a risk-free asset is called the: A. risk premium. b. geometric premium. c. excess return. d. average re
University of Jordan - ECON - 202098
Chapter 013 Return Risk and the Security Market LineMultiple Choice Questions 1. The return on a risky asset which is anticipated being earned in the future is called the _ return. a. average b. historical C. expected d. geometric e. requiredSECTION: 13
University of Jordan - ECON - 202098
Chapter 014 Options and Corporate FinanceMultiple Choice Questions 1. A contract that grants its owner the right to buy or sell a specified asset at an agreed-upon price on or before a given date is called a(n): A. option. b. invoice. c. exercise. d. swa
University of Jordan - ECON - 202098
Chapter 015 Cost of CapitalMultiple Choice Questions 1. The return shareholders require on their investment in a firm is called the: a. dividend yield. B. cost of equity. c. capital gains yield. d. cost of capital. e. income return.SECTION: 15.2 TOPIC:
University of Jordan - ECON - 202098
Chapter 016 Raising CapitalMultiple Choice Questions 1. What is venture capital? a. equity funds from internal sources used to finance high-risk projects b. capital raised from issuing equity securities in order to retire debt securities C. financing for
University of Jordan - ECON - 202098
Chapter 017 Financial Leverage and Capital Structure PolicyMultiple Choice Questions 1. The use of personal borrowing to change the overall amount of financial leverage to which an individual is exposed is called: A. homemade leverage. b. restructured le
University of Jordan - ECON - 202098
Chapter 018 Dividends and Dividend PolicyMultiple Choice Questions 1. A payment made out of a firm's earnings to its owners in the form of either cash or stock is called a: A. dividend. b. distribution. c. repurchase. d. payment-in-kind. e. stock split.
University of Jordan - ECON - 202098
Chapter 019 Short-Term Finance and PlanningMultiple Choice Questions 1. The length of time between the acquisition of inventory and the collection of cash from receivables is called the: A. operating cycle. b. inventory period. c. accounts receivable per
University of Jordan - ECON - 202098
Chapter 020 Cash and Liquidity ManagementMultiple Choice Questions 1. The speculative motive is the need to hold cash: a. to pay outstanding checks. b. to maintain a firm's daily operations. C. to invest in opportunities which may arise. d. to compensate
University of Jordan - ECON - 202098
Chapter 021 Credit and Inventory ManagementMultiple Choice Questions 1. The conditions under which a firm sells its goods and services for cash or credit are called the: A. terms of sale. b. credit analysis. c. collection policy. d. payables policy. e. c
University of Jordan - ECON - 202098
Chapter 022 International Corporate FinanceMultiple Choice Questions 1. A security issued in the United States that represents shares of a foreign stock and allows that stock to be traded in the United States is called a(n): A. American Depository Receip
University of Jordan - ECON - 202098
Chapter 023 Risk Management: An Introduction to Financial EngineeringMultiple Choice Questions 1. The process of lowering a firm's exposure to rate or price fluctuations is called: a. abating. b. deriving. C. hedging. d. forwarding. e. manipulating.SECT
University of Jordan - ECON - 202098
Chapter 024 Option ValuationMultiple Choice Questions 1. Which one of the following entails the purchase of a put option on a stock to limit the downside risk associated with owning that stock? a. put-call parity b. covered call C. protective put d. stra
University of Jordan - ECON - 202098
Chapter 025 Mergers and AcquisitionsMultiple Choice Questions 1. The complete absorption of one company by another, wherein the acquiring firm retains its identity and the acquired firm ceases to exist as a separate entity, is called a: A. merger. b. con
University of Jordan - ECON - 202098
Chapter 026 LeasingMultiple Choice Questions 1. The user of an asset in a leasing arrangement is called the: A. lessee. b. lessor. c. guarantor. d. trustee. e. manager.SECTION: 26.1 TOPIC: LESSEE TYPE: DEFINITIONS2. The owner of an asset in a leasing a
UCF - BIO - 2010
Group1 Group2 Group3 Group4 Group5 Group6 Group7 Group8 Group9 Group10 Group11 Group12 Average: StandardDeviation:050.73 1.48 0.55 1.02 0.95 0.88 1.17 0.59 0.99 0.63 0.01 0.99 0.83 0.37Temp 20251.8 1.84 1.16 1.57 1.7 1.61 1.53 1.23 1.47 1.25 0.13 1.47
UCF - BIO - 2010
A.Compared to most hibernating alpine mammals, Pikas ingest a wide variety of vegetation during summer months and the hay pile during winter months. Pikas need a very specific environment narrowed to talus fields, which are rich in nutrients and food. Ta
UCF - BIO - 2010
The Effects of Temperature and pH on Rate of Enzyme ReactionAlexa Graves BSC2010c Section:21 Seat:6 February 23, 2011By signing below, I guarantee that I am the sole author of this laboratory report: _ Name _ DateIntroduction: Enzymes are a very common
UCF - BIO - 2010
The Effects of Temperature and pH on Rate of Enzyme ReactionAlexa Graves BSC2010c Section:21 Seat:6 February 23, 2011By signing below, I guarantee that I am the sole author of this laboratory report: _ Name _ DateIntroduction: Enzymes are a very common
UCF - BIO - 2010
A.Compared to most hibernating alpine mammals, Pikas ingest a wide variety of vegetation during summer months and the hay pile during winter months. Pikas need a very specific environment narrowed to talus fields, which are rich in nutrients and food. Ta
UCF - BIO - 2010
Alexa Graves Ethridge ENC 1101 October 14, 2010 Analysis of my writing skills During my many forced upon years of writing I have picked up various techniques and skills. I dont believe that my writing is very interesting. In fact, I do not enjoy writing w
UCF - ENC - 1102
Alexa Graves Alexie writing prompt ENC 1102.0038 January 21, 2011 Valencia Alexie writing prompts When Sherman Alexie was a child he adored his father and wanted to be just like him. His father would bring home books from basically where ever he could fin
UCF - ENC - 1102
Alexa Graves Brothers and Worms ENC1102.0038 02/09/11 Valencia 1242 words Brothers and Worms Growing up on a farm, I learned at an early age how to entertain myself through boredom. I was born and raised in Gainesville, which many people do not consider c
UCF - ENC - 1102
Alexa Graves Bullock Questions ENC 1102.0038 January 26, 2011 Valencia 295 Bullock Questions A positive sponsor displayed in Bullocks literacy narrative is his grandmother. She babysat him as a child and taught him to read and to love to read. She influen
UCF - ENC - 1102
Alexa Graves Literacy Sponsors ENC 1102.0038 01/24/11 Valencia 216 words Brandt defines a literacy sponsor many ways. For one he says that sponsors are any agents, local or distant, concrete or abstract, who enable, support, teach, model, as well as recru
Morris County - ECON - 102
Chapter 1Introduction to Corporate FinanceMcGraw-Hill/IrwinCopyright 2010 by the McGraw-Hill Companies, Inc. All rights reserved.Key Concepts and Skills Knowthe basic types of financial management decisions and the role of the Financial Manager Know
Morris County - ECON - 102
C hapte 6 rMaking Capital Investment DecisionsMcGraw-Hill/IrwinCopyright 2010 by the McGraw-Hill Companies, Inc. All rights reserved.Key Concepts and SkillsUnderstand how to determine the relevant cash flows for various types of capital investments B
Morris County - ECON - 102
C hapte 4 rDiscounted Cash Flow ValuationMcGraw-Hill/IrwinCopyright 2010 by the McGraw-Hill Companies, Inc. All rights reserved.Key Concepts and SkillsBe able to compute the future value and/or present value of a single cash flow or series of cash fl
Morris County - ECON - 102
Chapter 2Financial Statements and Cash FlowMcGraw-Hill/IrwinCopyright 2010 by the McGraw-Hill Companies, Inc. All rights reserved.Key Concepts and SkillsUnderstand the information provided by financial statements Differentiate between book and market
Morris County - ECON - 102
C hapte 9 rStock ValuationMcGraw-Hill/IrwinCopyright 2010 by the McGraw-Hill Companies, Inc. All rights reserved.Key Concepts and SkillsUnderstand how stock prices depend on future dividends and dividend growth Be able to compute stock prices using t
Morris County - ECON - 102
Qualitative Research- Content Analysis of Web Sites What is Content Analysis: It is a scientific research method based on scanning, categorizing, summarizing of the data and analyzing the outputs within the frame of research objective (Bafrnc, 2008) Purpo
Morris County - ECON - 102
www.nike.com by http:/www.websitecontentanalysis.comMeaningful Keywords and Keyphrases for http:/www.nike.com Related Categories for &quot;http:/www.nike.com/nikeos/p/nike/en_US/?ref=http%3A%2F %2Fwww.google.com.tr%2Fsearch%3Fq%3Dnike%26ie%3Dutf-8%26oe%3Dutf-
Morris County - ECON - 102
Consumer Goods Coca-Cola Company (United States) Addresses to both emotional and functional side of public relations. There are main contents like sports, music, community and fun.Sports Motto: If you play it, sweat it, drive it, or just wish you did, th
Morris County - ECON - 102
w ww.websitecontentanalysis.comhttp:/www.ameccollege.com/web.php http:/academic.csuohio.edu/kneuendorf/content/ http:/academic.csuohio.edu/kneuendorf/content/cpuca/ccap.htm
Morris County - ECON - 102
How to Apply (Undergraduate Students)1) Fill out the personal information; Note that information should be same exactly with it appears on passport.2) Education InformationLanguage Proficiency3) Programme Choice &amp; Scholarship Opportunity4) Upload the
San Jose State - CMPE - 126
P r actice Questions L ab Exam 3 NOTE: Some structure of code wil l be given l ike lab exam 2 Q1. Please use the given code to demonstrate the feature of a b inary search tree. All the functions should be clearly i mplemented and tested by main. T he Bina
San Jose State - CMPE - 126
Practice Questions for Mid Term 1. Explain different stages in the waterfall model. 2. What are the different types of testing techniques used at different stages to ensure that the software is working perfectly? 3. Why is copy constructor/assignment oper