Question: 1.Ransomware is a malicious program that can encrypt intercepted data. The attacker controlling the software can demand a ransom before allowing the data to be

1.Ransomware is a malicious program that can encrypt intercepted data. The attacker controlling the software can demand a ransom before allowing the data to be decrypted, rendering it useless until the price is paid. Which of the following is TRUE about ransomware?

Ransomware is a type of malware.

Up-to-date antivirus software will effectively prevent all possible ransomware attacks.

Using a VPN to exchange information prevents it from being encrypted, making ransomware attacks impossible.

Defining a password security policy will prevent system infection with ransomware.

2.Key risks in international trade finance include Foreign Exchange/Currency Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE

3.A ____________ is a standalone cyberthreat program, one that runs from its own executable, which is a type of program or file

4.EXW (Ex Works) and FCA (Free Carrier) are both rules for what kind of transport

Only land transport

Only inland waterway or sea transport

Any mode of transport

Only rail transport

5.What is a cyber threat?

A direct threat to your computer

Any malicious act that attempts to gain access to a computer network without authorization

A hack only

A virus only

6.A letter of credit at sight is payable as soon as the documentation has been presented and verified.

True

False

7.In an L/C, the beneficiary is the person or company who will be paid.

True

False

8.Key risks in international trade finance include Corporate Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE

Your answer

9.What cyber threat may occur when computer updates are not performed?

Attack on unpatched software

Phishing

Worms

Trojans

10.What are Canada's 3 branches of government?

Your answer

11.Incoterms discuss when the title and the _____ for the goods pass from seller to buyer.

documentation

carrier

shipping containers

risk

12.The irrevocable letter of credit can be changed at any time by either the buyer or the issuing bank with no notification to the beneficiary.

True

False

13.Alternative dispute resolution is any means used to resolve a conflict other than through litigation.

True

False

14._____ are common terms and rules developed to mitigate language barriers in international shipping.

Incoterms

Maritime codes

Maritime laws

Steerage laws

15.What are hackers?

People who perform malicious acts by gaining personal information for profit

People who gain unauthorized access to networks for profit or to commit malicious acts by acquiring confidential personal information

People who gain access to networks

People with high-level access to confidential information

16.Key risks in international trade finance include Commercial Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE

Your answer

17.Identify each of the following classes of Dangerous Goods in order, 1 through 9 and include the class number and exact classification wording

Your answer

18.Federal _____________________ passes laws that affect all of Canada.

Your answer

19.When did the International Chamber of Commerce last modify the rules of Incoterms?

1936

2016

2010

2020

20.A _____ attack is a cyber attack where the attacker tries guessing system access credentials like passwords by trying different character combinations until a correct combination is identified.

Brute force

Phishing

Man-in-the-Middle

Malware

21.Key risks in international trade finance include Country Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE

Your answer

22.Which of the following is an example of a cybercrime?

Identity theft

Software piracy

Network intrusions

All of the responses are correct.

23.Litigation is the act or process of bringing about or contesting a claim (that is, using the traditional court system).

True

False

24.FAS (Free Alongside Ship) and FOB (Free On Board) are rules for which kind of transport?

Air transport only

Rail transport only

Any kind of transport - sea, land or air

Inland waterway or sea transport

25.Key risks in international trade finance include Documentary Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE

Your answer

26.Key risks in international trade finance include Fraud Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE

Your answer

27.What does cybercrime consist of?

It consists of illegal activity achieved by use of violence.

It consists of illegal activity achieved by utilizing a gun.

It consists of illegal activity by means of utilizing a computer to achieve the desired criminal results.

None of the above responses are correct.

28.Chapter __________ of the North American Free Trade Agreement (now called USMCA) contains provisions designed to protect cross-border investors and facilitate the settlement of investment disputes.

Your answer

29.A ________________ is a document issued by a third party that guarantees payment for goods or services when the seller provides acceptable documentation.

letter of credit

documentary credit

wire transfer

bank draft

30.In securing information and information systems, an organization can implement an SMS-based password authentication protocol in an addition to the username/password combination requirement for system access.

Which aspect of information security is addressed by the additional layer of security?

Integrity

Availability

Confidentiality

None of these

31.What is the most common type of cyber threat?

Trojan

Virus

Phishing

Worm

32.________________ is an international financial institution which offers political risk insurance and credit enhancement guarantees. These guarantees help investors protect foreign direct investments against political and non-commercial risks in developing countries.

Your answer

33.In an L/C, an issuing bank is a bank where the beneficiary is their client.

True

False

34.Key risks in international trade finance include Transport Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE

Your answer

35.How did cybercrime initially start?

With criminals hacking into high-level security networks.

None of the responses are correct.

With criminals engaging in identity theft.

With criminals engaging in software piracy.

36.ICSID is:

international center for settlement of investment disputes

immigration center for settlement of international disputes

international center for security and integrated defense

none of these

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!