FIN5203 Week-5

1.It could be argued that the best mix of Debt and Equity is the one whichSol: Minimizes the WACC. 2.Which of the methods listed below would be the least appropriate forevaluating mutually exclusive projects?Sol: The Rate of Return method. 3.One…

FIN5203 Week-4

1.A small manufacturing company with a gross income of $360,000 has thefollowing operating expenses: M&O = $76,000, insurance = $7,000, labor =$110,000, utilities = $29,000, debt service = $37,000, and taxes = $9,000. The netoperating income (NOI) is closest toA)…

FIN5203 Week-3

Q1.When comparing mutually exclusive alternatives that have different lives by the presentworth method, it is necessary toSol: Find the least common denominator and convert both periods to equal length Q2.To get the AW of a cash flow of $10,000 that…

IS5503 WEEK 4

1. Which four (4) factors does a stateless firewall look at to determine if a packet should be allowed pass? the source IP address the destination port the service or protocol used the destination IP address 2. Can a single…

IS5403 WEEK5 QUIZ

1. What type of scan can be conducted to determine what possible exploits exist given the client’s environment? Vulnerability Scan 2. Which three (3) forms of discovery can be conducted offline? Shoulder Surfing Social Engineering Dumpster Diving 3. Network Mapping,…

IS5403 WEEK 2

1. In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills? Effective Communications and Critical Thinking Firewalls and Antivirus 2. The statement:…

IS5403 WEEK6

1. Which three (3) of these were among the top 5 security drivers in 2019? (Select 3) IOT device attacks moving from targeting consumer electronics to targeting enterprise devices The number of breached records in 2019 more than 3 times…

IS5403 Week 3

1. Which of the bad guys are described as “They are “in” an organization but are human and make mistakes”? Inadvertant Actor 2. Which is NOT one of the security controls? Testing 3. What year did the European Union start…

IS5403

1. Jeff Crume described 5 challenges in security today. Which three (3) of these are challenges because their numbers are increasing rapidly? 2. About how many unfilled cybersecurity jobs are expected by the year 2022? 3. Which is the National…