Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions
Questions # 1:

A company implementing a localized multi-country strategy to increase market share should engage in which of the following actions?

Options:

A.

Sell different product versions in different countries under different brand names.


B.

Sell the same products under the same brand name worldwide.


C.

Locate plants on the basis of maximum location advantage.


D.

Use the best suppliers regardless of geographic location.


Expert Solution
Questions # 2:

Check sheets can be used to:

Options:

A.

determine the frequency of a defect and the time period between occurrences.


B.

provide a quick method to identify if possible defects exist.


C.

allow improvement teams to see if action items are being completed on time.


D.

provide an indication of correlation between defects.


Expert Solution
Questions # 3:

What is the FIRST element that must be evaluated in a security governance program?

Options:

A.

An organization’s business objectives and strategy


B.

Review of Information Technology (IT) and technical controls


C.

Review of organization’s Information Technology (IT) security policies


D.

An organization’s utilization of resources


Expert Solution
Questions # 4:

A security engineer has determined the need to implement preventative controls into their Wireless Local Area Network (WLAN) for added protection. Which preventative control provides the MOST security?

Options:

A.

Enabling software to enforce authorized network profiles


B.

Having an automated alerting capability when a problem is detected


C.

Third-party software to monitor configuration changes on the network


D.

Using a monitoring tool to capture all network activity


Expert Solution
Questions # 5:

Bad actors with little expense can easily make calls. Which social engineer strategy is a telecommunications ONLY risk concept?

Options:

A.

Pretexting


B.

Diversion theft


C.

Phreaking


D.

Baiting


Expert Solution
Questions # 6:

Which of the following actions provides the BEST evidence for forensic analysis of powered-off device?

Options:

A.

Copy all potentially useful files from the system to a network drive.


B.

Image the entire hard disk on an external drive.


C.

Copy all system and application log files to an external drive.


D.

Collect the memory, running processes, and temporary files.


Expert Solution
Questions # 7:

An organization has been struggling to improve their security posture after a recent breach.

Where should the organization focus their efforts?

Options:

A.

Common configuration enumerations


B.

Business Continuity Plan (BCP)


C.

Service-Level Agreements (SLA)


D.

National vulnerability database


Expert Solution
Questions # 8:

A security team member is assessing an organization’s backup strategy that follows the 3-2-1 rule. How many different types of media should they inspect to validate?

Options:

A.

6


B.

3


C.

2


D.

1


Expert Solution
Questions # 9:

What BEST describes the end goal of a Disaster Recovery (DR) program?

Options:

A.

Review the status of mission-critical applications.


B.

Prevent business interruption.


C.

Continue business operations during a contingency.


D.

Restore normal business operations.


Expert Solution
Questions # 10:

Which of the below represents the GREATEST cloud-specific policy and organizational risk?

Options:

A.

Supply chain failure


B.

Loss of business reputation due to co-tenant activities


C.

Loss of governance between the client and cloud provider


D.

Cloud service termination or failure


Expert Solution
Questions # 11:

In which of the following circumstances is an organization MOST likely to report the accidental release of personal data to the European Union (EU) General Data Protection Regulation (GDPR) supervisory authority and affected users?

Options:

A.

The release of personal data was made to a highly trusted third-party vendor and there was confirmation that the data was not accessed before it was returned.


B.

The personal data was stored in a highly encrypted format and there is confirmation that the encryption keys were not accessed or released.


C.

All the personal data from the accidental release was from individuals who are not living in the EU.


D.

The personal data released only contained the ages and names of children who may or may not be living in the EU.


Expert Solution
Questions # 12:

While doing a penetration test, auditors found an old credential hash for a privileged user. To prevent a privileged user's hash from being cached, what is the MOST appropriate policy to mandate?

Options:

A.

Add privileged user to the domain admin group.


B.

Add privileged users to the protected users group.


C.

Enable security options for each privileged user.


D.

Place each privileged user in a separate Kerberos policy.


Expert Solution
Questions # 13:

Which of the following MUST be checked during the validation of software verification capabilities?

Options:

A.

Security


B.

Completeness


C.

Vulnerabilities


D.

Logic


Expert Solution
Questions # 14:

Moving average forecasting methods are best when demand shows:

Options:

A.

a clear trend.


B.

high random variation.


C.

consistent seasonality.


D.

a cyclical pattern.


Expert Solution
Questions # 15:

Which of the following is the BEST option for a security director to use in order to mitigate the risk of inappropriate use of credentials by individuals with administrative rights?

Options:

A.

Have administrators sign appropriate access agreements.


B.

Define the Acceptable Use Policy (AUP) for administrators.


C.

Have administrators accept a Non-Disclosure Agreement.


D.

Perform extensive background checks on administrators.


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions