Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions
Questions # 1:

Which of the following is the MOST significant flaw when using Federated Identity Management (FIM)?

Options:

A.

The initial cost of the setup is prohibitively high for small business.


B.

The token stored by the Identity Provider (IdP) may need to be renewed.


C.

The token generated by the Identity Provider (IdP) may be corrupted.


D.

The participating members in a federation may not adhere to the same rules of governance.


Expert Solution
Questions # 2:

An organization is designing a new Disaster Recovery (DR) site. What is the BEST option to harden security of the site?

Options:

A.

Physical access control


B.

Natural disaster insurance


C.

Natural surveillance


D.

Territorial reinforcement


Expert Solution
Questions # 3:

When developing information security policies, What is the PRIMARY concern?

Options:

A.

Alignment with business requirements


B.

Compliance with legal requirements


C.

Alignment with regulatory requirements


D.

Compliance with international standards


Expert Solution
Questions # 4:

A security practitioner notices that workforce members retain access to information systems after transferring to new roles within the organization, which could lead to unauthorized changes to the information systems.

This is a direct violation of which common security model?

Options:

A.

Clark-Wilson


B.

Bell-LaPadula


C.

Graham-Denning


D.

Take-Grant


Expert Solution
Questions # 5:

A healthcare organization’s new cloud-based customer-facing application is constantly receiving security events from dubious sources. What BEST describes a security event that compromises the confidentiality, integrity, or availability of the application and data?

Options:

A.

Attack


B.

Breach


C.

Failure


D.

Incident


Expert Solution
Questions # 6:

In which of the following phases of the product life cycle is product price most effective in influencing demand?

Options:

A.

Introduction


B.

Growth


C.

Maturity


D.

Decline


Expert Solution
Questions # 7:

An organization provides customer call center operations for major financial service organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?

Options:

A.

Frameworks that fit the organization’s risk appetite, as cybersecurity does not vary industry to industry


B.

Control Objectives For Information And Related Technology (COBIT) and Health Insurance Portability And Accountability Act (HIPAA) frameworks


C.

Frameworks specific to the industries and locations clients do business in


D.

National Institute Of Standards And Technology and International Organization For Standardization (ISO) frameworks


Expert Solution
Questions # 8:

If the total part failure rate of a machine is 0.00055 failures per hour, what would be the mean time between failures (MTBF) in hours?

Options:

A.

1,818.2


B.

59.99945


C.

1.98


D.

0.99945


Expert Solution
Questions # 9:

During the initiation phase of a project to acquire a customer relation management system, what is the FIRST step a project team will take for early integration of security?

Options:

A.

Develop a list of security requirements for the system.


B.

Conduct project planning and a feasibility assessment.


C.

Define system security classifications.


D.

Review relevant regulatory practices and standards.


Expert Solution
Questions # 10:

An organization is working to secure its Supervisory Control And Data Acquisition (SCADA) system, Which monitors water supply to the city. What type of security should the organization ensure FIRST?

Options:

A.

Endpoint security


B.

Network security


C.

Cyber physical security


D.

Cloud security


Expert Solution
Questions # 11:

An organization currently has a network with 55,000 unique Internet Protocol (IP) addresses in their private Internet Protocol version 4 (IPv4) network range and has acquired another organization and must integrate their 25,000 endpoints with the existing, flat network topology. If subnetting is not implemented, which network class is implied for the organization’s resulting private network segment?

Options:

A.

A


B.

B


C.

C


D.

E


Expert Solution
Questions # 12:

An organization suffered a loss to an asset at a frequency that was different than the initially estimated Annualized Rate of Occurrence (ARO). What is the appropriate course of action?

Options:

A.

Do nothing; the loss validates the ARO.


B.

DO nothing; the loss validates the exposure factor.


C.

Recalculate the value of the safeguard.


D.

Recalculate the cost of the countermeasure.


Expert Solution
Questions # 13:

An organization is running a cloud-based application to process the information obtained at point-of-sale devices. Which guideline should be applied to the application?

Options:

A.

Health Insurance Portability And Accountability Act (HIPAA)


B.

Application Security Verification Standard (ASVS)


C.

Payment Card Industry Data Security Standard (PCI DSS)


D.

Gramm-Leach-Bliley Act (GLBA)


Expert Solution
Questions # 14:

If fixed costs are §200,000 and 20,000 units are produced, a unit's fixed cost is §10. This is an example of:

Options:

A.

variable costing.


B.

activity-based costing (ABC).


C.

absorption costing.


D.

overhead costing.


Expert Solution
Questions # 15:

Which of the following attributes describes a company with a global strategy?

Options:

A.

Ituses the same basic competitive style worldwide and focuses efforts on building global brands.


B.

Itcustomizes the basic competitive style to fit markets but focuses efforts on building global brands.


C.

Itcoordinates major strategic decisions worldwide but gives country managers wide strategy-making latitude.


D.

Itoperates plants in many host countries and uses decentralized distribution.


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions