Which of the following incoterms relate specifically to transporting items over water?
As a procurement officer for a large organisation, a supplier approaches you on social media offering to take you out for dinner to discuss a recent open opportunity and mentions a financial reward if you help them win the business. You accept the invite. Was this the right thing to do?
Why is it important, when awarding high-value contracts, for a buyer to conduct a financial assessment of a supplier?
Credit rating agencies can assist procurement professionals. Typically, which of the following can be obtained from a credit rating agency report? Select TWO that apply.
When evaluating a supplier's proposal in relation to ESC (Environmental, Social, Governance, and ethical elements), it is common to send questionnaires to suppliers requesting information, which can later be scored. Which of the following questions would be assessing any of the ESC criteria?
Could you provide details on your manufacturing and raw material costs as part of an open-book pricing contract?
How do you promote equal opportunity for your employees, customers, and suppliers?
What is the annual turnover and profitability of your company?
Does your company have an anti-bribery policy?
Which of the following are considerations when evaluating quality as a criterion for supplier selection? Select TWO that apply.
Daniel is evaluating bids from new suppliers who are looking to supply his company XYZ Indus-tries with components for manufacturing. Although price is important, Daniel wishes to consider 'added value'. Which of the following is considered an 'added-value solution'? Select THREE
A procurement manager for a major retail group is using ratio analysis to assess the financial viability of suppliers who have tendered for a logistics services tender. The recommended supplier has a current ratio of 0.6. What are the potential consequences of awarding the contract to this supplier, given their current ratio is below 1?
'Phishing' is an activity that can occur when an employee within an organisation receives an email that appears to be from a genuine supplier but is false. These types of emails expose the organisation to the activities of expert cyber criminals. Which type of crime category does this activity fall within?