Which of the following statements best describes the steps required to construct a custom security-based benchmark?
| ||
| ||
| ||
|
The three steps required to construct a custom security-based benchmark are as follows: 1. Identify the managers investment process including asset selection and weighting.
2. Use the same assets and weighting for the benchmark.
3. Assess and rebalance the benchmark on a predetermined schedule.
1. Identify the managers investment process including asset selection and weighting.
2. Use the same assets and weighting for the benchmark.
3. Assess and rebalance the benchmark on a predetermined schedule.
Which of the following is least likely to be a step in the construction of a custom security-based benchmark?
| ||
| ||
| ||
|
Although calculating the historical mean and standard deviation for the benchmark is something that many portfolio managers will do, it is not specified as one of the steps in the construction of a custom security-based benchmark.
Which of the following is least likely to be a step in the construction of a custom security-based benchmark?
| ||
| ||
| ||
|
Misfit risk results from differences between the managers normal portfolio and the broader asset class benchmark. In a custom security-based benchmark, there will be and should be misfit risk if the managers style is different than the broad market and if the custom benchmark accurately reflects the managers style.
欢迎光临 CFA论坛 (http://forum.theanalystspace.com/) | Powered by Discuz! 7.2 |