Question: 1.Ransomware is a malicious program that can encrypt intercepted data. The attacker controlling the software can demand a ransom before allowing the data to be
1.Ransomware is a malicious program that can encrypt intercepted data. The attacker controlling the software can demand a ransom before allowing the data to be decrypted, rendering it useless until the price is paid. Which of the following is TRUE about ransomware?
Ransomware is a type of malware.
Up-to-date antivirus software will effectively prevent all possible ransomware attacks.
Using a VPN to exchange information prevents it from being encrypted, making ransomware attacks impossible.
Defining a password security policy will prevent system infection with ransomware.
2.Key risks in international trade finance include Foreign Exchange/Currency Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE
3.A ____________ is a standalone cyberthreat program, one that runs from its own executable, which is a type of program or file
4.EXW (Ex Works) and FCA (Free Carrier) are both rules for what kind of transport
Only land transport
Only inland waterway or sea transport
Any mode of transport
Only rail transport
5.What is a cyber threat?
A direct threat to your computer
Any malicious act that attempts to gain access to a computer network without authorization
A hack only
A virus only
6.A letter of credit at sight is payable as soon as the documentation has been presented and verified.
True
False
7.In an L/C, the beneficiary is the person or company who will be paid.
True
False
8.Key risks in international trade finance include Corporate Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE
Your answer
9.What cyber threat may occur when computer updates are not performed?
Attack on unpatched software
Phishing
Worms
Trojans
10.What are Canada's 3 branches of government?
Your answer
11.Incoterms discuss when the title and the _____ for the goods pass from seller to buyer.
documentation
carrier
shipping containers
risk
12.The irrevocable letter of credit can be changed at any time by either the buyer or the issuing bank with no notification to the beneficiary.
True
False
13.Alternative dispute resolution is any means used to resolve a conflict other than through litigation.
True
False
14._____ are common terms and rules developed to mitigate language barriers in international shipping.
Incoterms
Maritime codes
Maritime laws
Steerage laws
15.What are hackers?
People who perform malicious acts by gaining personal information for profit
People who gain unauthorized access to networks for profit or to commit malicious acts by acquiring confidential personal information
People who gain access to networks
People with high-level access to confidential information
16.Key risks in international trade finance include Commercial Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE
Your answer
17.Identify each of the following classes of Dangerous Goods in order, 1 through 9 and include the class number and exact classification wording
Your answer
18.Federal _____________________ passes laws that affect all of Canada.
Your answer
19.When did the International Chamber of Commerce last modify the rules of Incoterms?
1936
2016
2010
2020
20.A _____ attack is a cyber attack where the attacker tries guessing system access credentials like passwords by trying different character combinations until a correct combination is identified.
Brute force
Phishing
Man-in-the-Middle
Malware
21.Key risks in international trade finance include Country Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE
Your answer
22.Which of the following is an example of a cybercrime?
Identity theft
Software piracy
Network intrusions
All of the responses are correct.
23.Litigation is the act or process of bringing about or contesting a claim (that is, using the traditional court system).
True
False
24.FAS (Free Alongside Ship) and FOB (Free On Board) are rules for which kind of transport?
Air transport only
Rail transport only
Any kind of transport - sea, land or air
Inland waterway or sea transport
25.Key risks in international trade finance include Documentary Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE
Your answer
26.Key risks in international trade finance include Fraud Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE
Your answer
27.What does cybercrime consist of?
It consists of illegal activity achieved by use of violence.
It consists of illegal activity achieved by utilizing a gun.
It consists of illegal activity by means of utilizing a computer to achieve the desired criminal results.
None of the above responses are correct.
28.Chapter __________ of the North American Free Trade Agreement (now called USMCA) contains provisions designed to protect cross-border investors and facilitate the settlement of investment disputes.
Your answer
29.A ________________ is a document issued by a third party that guarantees payment for goods or services when the seller provides acceptable documentation.
letter of credit
documentary credit
wire transfer
bank draft
30.In securing information and information systems, an organization can implement an SMS-based password authentication protocol in an addition to the username/password combination requirement for system access.
Which aspect of information security is addressed by the additional layer of security?
Integrity
Availability
Confidentiality
None of these
31.What is the most common type of cyber threat?
Trojan
Virus
Phishing
Worm
32.________________ is an international financial institution which offers political risk insurance and credit enhancement guarantees. These guarantees help investors protect foreign direct investments against political and non-commercial risks in developing countries.
Your answer
33.In an L/C, an issuing bank is a bank where the beneficiary is their client.
True
False
34.Key risks in international trade finance include Transport Risk. Describe what this is (3 marks) POINT FORM ONLY - NO CUT AND PASTE
Your answer
35.How did cybercrime initially start?
With criminals hacking into high-level security networks.
None of the responses are correct.
With criminals engaging in identity theft.
With criminals engaging in software piracy.
36.ICSID is:
international center for settlement of investment disputes
immigration center for settlement of international disputes
international center for security and integrated defense
none of these
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
