New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

Components of an organization's Immediate industry and competitive environment Include:

Options:

A.

political factors.


B.

interest rates.


C.

substitute products.


D.

sociocultural forces.


Expert Solution
Questions # 2:

After a recent threat modeling workshop, the organization has requested that the Chief Information Security Officer (CISO) implement zero trust (ZT) policies. What was the MOST likely threat identified in the workshop?

Options:

A.

Natural threats


B.

Elevation of privilege


C.

Repudiation


D.

Information disclosure


Expert Solution
Questions # 3:

An organization has integrated its enterprise resource planning system into its centralized Identity and Access Management (IAM) system to automate provisioning of access. A security audit revealed that privileged access granted within the ERP system is not visible in the IAM system. Which of the following controls BEST mitigates this risk?

Options:

A.

Implement step-up authentication for privileged functions within the ERP system.


B.

Implement a periodic review of privileged access within the ERP system.


C.

Implement an automated reconciliation process between ERP and IAM systems.


D.

Implement a periodic review of all ERP access within the IAM system.


Expert Solution
Questions # 4:

Which of the following documents is the BEST reference to describe application functionality?

Options:

A.

Disaster Recovery Plan (DRP)


B.

System security plan


C.

Business Impact Analysis (BIA) report


D.

Vulnerability assessment report


Expert Solution
Questions # 5:

Moving average forecasting methods are best when demand shows:

Options:

A.

a clear trend.


B.

high random variation.


C.

consistent seasonality.


D.

a cyclical pattern.


Expert Solution
Questions # 6:

Typically, rough-cut capacity planning (RCCP) in a job shop environment would review which of the following work centers to determine the ability to execute the plan?

Options:

A.

Critical work centers only


B.

Gateway work centers only


C.

Final assembly work centers only


D.

All work centers


Expert Solution
Questions # 7:

Which of the following vulnerability types is also known as a serialization flaw and affects the integrity of two processes interacting with the same resource at the same time?

Options:

A.

Boundary condition


B.

Buffer overflow


C.

Race condition


D.

Integer overflow


Expert Solution
Questions # 8:

An organization’s computer incident responses team PRIMARY responds to which type of control?

Options:

A.

Administrative


B.

Detective


C.

Corrective


D.

presentative


Expert Solution
Questions # 9:

Which of the following planes directs the flow of data within a Software-Defined Networking (SDN) architecture?

Options:

A.

Security


B.

Data


C.

Application


D.

Control


Expert Solution
Questions # 10:

Who is responsible for ensuring compliance when an organization uses a cloud provider to host its Virtual Machine (VM) instances?

Options:

A.

An independent auditor employed by the cloud provider is responsible for ensuring compliance.


B.

The cyber insurance carrier is responsible for ensuring compliance.


C.

The cloud provider may have a level of responsibility; however, the customer is ultimately responsible for ensuring compliance.


D.

Compliance is equally shared between the cloud provider, the customer, and third-party vendors that interact with the VM instances.


Expert Solution
Questions # 11:

Database security includes which of the following requirements?

Options:

A.

Physical database integrity, logical database integrity, and ownership integrity


B.

Availability, auditability, and screening


C.

Physical database integrity, logical database integrity, and element integrity


D.

User authentication, availability, and accountability


Expert Solution
Questions # 12:

Company A has acquired Company B. Company A has decided to start a project to convert Company B's enterprise resource planning (ERP) software to the same ERP software that Company A uses. What is a likely reason for this decision?

Options:

A.

The ERP system has business processes which both companies can adopt


B.

Company A wants to save on software licensing costs


C.

Each ERP package has unique and distinctive business processes


D.

Company A wishes to close Company B's data center


Expert Solution
Questions # 13:

Which of the following describes the 3 MAIN roles of the identity-delegation model?

Options:

A.

Application server, web server, and delegate


B.

Application server, proxy server, and delegate


C.

Delegator, delegate, and service provider


D.

Delegator, application server, and service provider


Expert Solution
Questions # 14:

Which of the following is the benefit of using Security Content Automation Protocol (SCAP) version 2 on endpoint devices?

Options:

A.

Apply patches to endpoints across the enterprise.


B.

Use software configuration management for endpoints.


C.

Monitor endpoints by collecting software inventory and configuration settings.


D.

Enforce Two-Factor Authentication (2FA) on endpoints across the enterprise.


Expert Solution
Questions # 15:

Which of the following regarding authentication protocols is a PRIMARY consideration when designing an authentication and key management system?

Options:

A.

Refresh


B.

Visibility


C.

Authorization


D.

Integrity


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions