Answer:
B.
Explanation:
Threat Modeling is the process of identifying and optimizing network security. This practice helps to find the possible threats to confidential information.
<u>Threat Modeling is used to protect the systems. In this practice, the consultant identifies the enterprise's assets and analyze the work of all applications. Then it sets the security profile on all applications and documenting adverse effects of it</u>.
In the given scenario, the consultant will use the tool or technique of threat modeling to identify the potential attackers.
So, the correct answer is option B.
Answer: Option E
Explanation: In simple words, it refers to the situation in which two rival companies in an industry cut their prices with the objective of cutting the others customers and gaining a higher market share.
Generally it is performed for short term so that other firm could be demolished from the market but a company having strong reserves can perform it for a long term as well.
It is more evident in industries where the products of two companies are close substitutes of each other and there are few firs in the industry.
Answer:
a. cost of debt
Explanation:
The formula to compute the weighted average cost of capital is shown below:
= Weightage of debt × cost of debt × ( 1- tax rate) + (Weightage of preferred stock) × (cost of preferred stock) + (Weightage of common stock) × (cost of common stock)
Since the payment for the dividend is not entitled to a tax deduction but the payment for interest is entitled to a tax deduction. And, the after-tax is considered for the cost of debt and the same is shown in the formula above
Answer: All of the above
Explanation:
The options include:
a. Face-to-face
b. Telephone
c. Electronic mail
d. All of the above
Since the manager manager has a message for Bob, any of the communication channels given here can be used.
There is no preferred communication channel here. The manager may decided to tell Bob the message face to face when he sees him. Also, he can call him on the telephone or send an email to him.
Therefore, the correct option is All of the above.
Answer:
The correct answer is True.
Explanation:
The concept of “Disruptive Innovation” is relatively new, it was introduced by Clayton Christensen in 1997 in the book “The innovators dilemma” and refers to how a product or service that originally was born as something residual or as a simple application without Many followers or users quickly become the leading product or service in the market.
Disruption therefore occurs when emerging companies use new technologies or new business models and outperform the market that were the leaders until then.
There comes a time when users do not perceive as a differential advantage the type of evolutionary innovation that has been applied to a product, because they no longer need all those new features that the manufacturer has added to increase the profit and then the manufacturer becomes vulnerable and the evolution of that particular product ceases to be decisive, from that moment the price of that product can become decisive or another product will arrive with a new disruptive technology that will compete with the previous product and with the established technology. The most normal is that new products or services are easier to use and cheaper than products that were already on the market before and thus quickly capture the interest of consumers.