MSTM5003 Week 6 Quiz

 1. Authentication was a one-way process for SSL v1 and v2, with only the server providing authentication. True 2. A browser helper object (BHO) has unrestricted access to the Internet Explorer event model and can perform tasks such as capturing…

FIN5203 Week-8

1.The equipment for applying specialty coatings that provide a high angle of skid forthe paperboard and corrugated box industries has a delivered cost of $390,000. Ifthe overall cost factor for the complete system is 3.96, the total plant cost isapproximatelySol:…

FIN5203 Week-7

1.When conducting a sensitivity analysis using three estimates for each parameter, allof the following are estimates that should be made, exceptSol: improbable 2.In conducting a sensitivity analysis of a proposed project, the present worth valuesof $–10,000, $40,000, and $50,000 were…

FIN5203 Week-6

1.Which of the statements below is correct?Sol. Simple (no-return) payback is always shorter than discounted payback. 2.All of the below are disadvantages of the simple (no-return) payback method ofevaluation when compared to the present worth, annual worth, and rate of…

FIN5203 Week-5

1.It could be argued that the best mix of Debt and Equity is the one whichSol: Minimizes the WACC. 2.Which of the methods listed below would be the least appropriate forevaluating mutually exclusive projects?Sol: The Rate of Return method. 3.One…

FIN5203 Week-4

1.A small manufacturing company with a gross income of $360,000 has thefollowing operating expenses: M&O = $76,000, insurance = $7,000, labor =$110,000, utilities = $29,000, debt service = $37,000, and taxes = $9,000. The netoperating income (NOI) is closest toA)…

FIN5203 Week-3

Q1.When comparing mutually exclusive alternatives that have different lives by the presentworth method, it is necessary toSol: Find the least common denominator and convert both periods to equal length Q2.To get the AW of a cash flow of $10,000 that…

IS5503 WEEK 4

1. Which four (4) factors does a stateless firewall look at to determine if a packet should be allowed pass? the source IP address the destination port the service or protocol used the destination IP address 2. Can a single…

IS5403 WEEK5 QUIZ

1. What type of scan can be conducted to determine what possible exploits exist given the client’s environment? Vulnerability Scan 2. Which three (3) forms of discovery can be conducted offline? Shoulder Surfing Social Engineering Dumpster Diving 3. Network Mapping,…