Question 1A
Which of the following is NOT true regarding IRP, PPP, IFE and
FEP?
Question options:
FEP states that any forward premium or discount is equal to the
change in the exchange rate.
IFE suggests that a currency's spot rate will change according
to interest rate differentials.
IRP suggests that a currency's spot rate will change according
to interest rate differentials.
PPP suggests that a currency's spot rate will change according
to inflation rate differentials.
Question 1B
According to...
Discuss the differing ways that an established dominant firm in
an industry can react to the
threat of small firms and potential entrants. In particular,
consider the determinants of an
aggressive entry-limiting and/or predatory approach vs. a more
accommodative strategy. From
the standpoint of society is there a preference for one or the
other?
There are three types of hedges that a firm can use to protect
itself against transaction exposure. Choose one type of hedge and
explain it. Forward market hedge,Money market hedge and Options
market hedge
Evaluate the ways that sustainability can improve firm
performance.
What are the ways that a company can benefit from being more
sustainable?
(Please include more than lowering costs/expenses)
Looking at the various ways to protect assets in a business,
choose which policy/procedure is the most important for your work
and tell us why.
2. Have you ever been a customer and observed a situation where
the company was not protecting it's assets? or an employee and your
company overlooks asset protection? For example, inventory is not
protected because there is no alarm for big ticket items at the
main doors. Be specific on what needs to be done...
1- Perform research on the Web and find how Cisco
routers and switches can protect against DDOS. Give a specific
example of a Cisco device model. Show the Cisco CLI commands that
are used for this purpose
2- The Session Initiation Protocol (SIP) is an important
protocol used in Voice over IP phones over the net. Give ONE
detailed example of a security attack type of SIP. Explain how we
can prevent or mitigate this specific type of attack.
Can...