Foundations of Finance
Foundations of Communication
Foundations of Marketing
Cybersecurity
International Business
100

The best example of a diversified investment is _____. 

A) defensive stocks 

B) growth stocks 

C) a mutual fund

D) real estate

C) a mutual fund

100

Fill in the blank with the correct word. The dog has ______ the pizza. 

A) eat 

B) eaten 

C) aten 

D) ate

B) eaten

100

The market plan describes the group of people that they are trying to reach and encourage. The group is called a _____. 

A) market share 

B) market sample 

C) market segment 

D) target market

D) target market

100

The below report indicates that the system is most likely infected by which of the following? Protocol LOCAL IP FOREIGN IP STATE, TCP 0.0.0:445 0.0.0.0:0 Listening, TCP 0.0.0.0:3390 0.0.0.0:0  

A) worm 

B) trojan 

C) listening 

D) logic bomb

C) listening 

100

______ is an example of a natural disaster that will have an impact on international business. 

A) Terrorism 

B) Civil unrest 

C) War 

D) Drought

D) Drought

200

Banks are investing heavily in _____ banking technology, in which customers use mobile, web platforms to use banking services. 

A) personalized 

B) long distance 

C) real time 

D) digital

D) digital

200

_____ is a view or judgment formed about something, not necessarily based on fact or knowledge. 

A) Fact 

B) Opinion 

C) Thought 

D) Perspective

B) Opinion

200

S.M.A.R.T. is an approach for sales. Which of the following descriptors is not part of S.M.A.R.T? 

A) accurate 

B) specific 

C) relevant 

D) measurable

A) accurate 

200

What can best be defined as the sum of protection mechanisms inside the computer, including hardware, firmware, and software? 

A) security perimeter 

B) trusted computing base 

C) trusted system 

D) security kernel

B) trusted computing base 

200

The most price-effective form of transportation is by _____. 

A) airplane 

B) train 

C) truck 

D) water

D) water

300

The Federal Reserve does not regulate _____. 

A) insurance agencies 

B) foreign branches of U.S. national and state member banks 

C) state-chartered member banks 

D) bank holding companies

A) insurance agencies

300

Multimedia presentation software is known for incorporating ______ into presentations. 

A) sound 

B) cinematic-like special effects 

C) all answers are correct

D) animation effects

C) all answers are correct

300

To be socially responsible is when the organization is concerned about _____ with whom and where it conducts business. 

A) all answers are correct 

B) society 

C) environment 

D) people

A) all answers are correct 

300

Which of the following are not a countermeasure to traffic analysis? 

A) eavesdropping 

B) sending noise 

C) padding messages 

D) covert channel analysis

A) eavesdropping 

300

The International Monetary Fund _____. 

A) acts as the reservoir of the currencies of all the member countries 

B) all answers are correct 

C) has been instrumental to the growth of international trade 

D) allows a borrowing country can borrow the currency of another country out of this reservoir

B) all answers are correct 

400

A _____ is a debt security that doesn't pay interest (a coupon) but is traded at a deep discount, rendering profit at maturity when the bond is redeemed for its full-face value. 

A) bank note 

B) savings bond 

C) treasury note 

D) zero coupon bond

D) zero coupon bond

400

In which of the following regions are bare legs, arms, shoulders, or heads on the street or in holy buildings considered offensive? 

A) Middle East 

B) North America 

C) Europe 

D) South America

A) Middle East

400

_____ is a data analysis tool. 

A) Cloudera 

B) 101Data 

C) all answers are correct 

D) Actian

C) all answers are correct 

400

Which of the following statements pertaining to the trusted computing base (TCB) is false? 

A) it originates from the Orange Book 

B) it includes hardware, firmware, and software 

C) a higher TCB rating will require that details of their testing procedures and documentation be reviewed with more granularity 

D) its enforcement of security policy is independent of parameters supplied by system administrators

D) its enforcement of security policy is independent of parameters supplied by system administrators

400

The first step for successful international business is to ______. 

A) understand the social and business cultures of other countries 

B) determine acceptable bribery for conducting international business 

C) learn the language of business trade partners 

D) understand the banking systems of other countries

A) understand the social and business cultures of other countries 

500

Earnings that corporations keep for expansion and research are _____ earnings. 

A) retained 

B) preferred stock 

C) common stock 

D) distributed

A) retained

500

The ability to consider something in a new way is called _______. 

A) analytical skill 

B) long-term planning 

C) goal setting 

D) creative reasoning

D) creative reasoning

500

An automobile dealership offers complimentary repair and oil changes for 4 years or 50,000 miles (whichever occurs first). This is an example of a(n) _____. 

A) assurance 

B) guarantee 

C) promise 

D) warranty

D) warranty

500

Which one of the following functions provides the least effective organizational reporting structure for the Information Systems Security function? 

A) IS resource management 

B) corporate security 

C) IS quality assurance 

D) IS operations

D) IS operations

500

Individuals taking jobs in other parts of the world 

A) should count on their employers to pay for required medical procedures. 

B) do not have to worry about medical issues since their company is insulated from the rest of the public. 

C) should make sure that all medical vaccinations are up to date. 

D) should wait to receive medical vaccinations when they arrive to their final destination.

C) should make sure that all medical vaccinations are up to date. 

M
e
n
u