Some sensitive computer systems are particularly attractive to cyber criminals. Passwords may be used as one element of restricting access to legitimate users, but the password systems should be designed with great care.
Which of the following methods would enhance a password access system?
A UK manufacturing company has simultaneously:
• purchased a put option to sell USD 1million at an exercise price of GBP1.00 = USD1.65
• sold a call option that grants the option holder the right to buy USD 1million at a price of GBP1.00 = USD1.61 (this option has the same maturity date as the put).
Which of the following is a valid explanation for entering into these option positions?
Which of the following are the Committee of Sponsoring Organisations (COSO) key principles of enterprise risk management?
Select ALL that apply.
W plc is a large international supermarket chain. It has many thousands of suppliers and many thousands of others competing for "shelf space" in its supermarkets.
Which of the following would be appropriate provisions for W plc to include in its Ethical Code in relation to its suppliers?