Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the below represent the GREATEST cloud-specific policy and organizational risk?

Options:

A.

Loss of governance between the client and cloud provider


B.

Loss of business reputation due to co-tenant activities


C.

Supply chain failure


D.

Cloud service termination or failure


Expert Solution
Questions # 17:

In Company XYZ, transaction-costing capability has been Integrated into the shop floor reporting system. A batch of 20 units was started in production. At the fourth operation, 20 units are reported as complete. At the fifth operation, 25 units are reported as complete. When all operations are complete, 20 units are checked into the stockroom. If the error at the fifth operation is undetected, which of the following conditions will be true?

Options:

A.

Stockroom inventory balance will be incorrect.


B.

Operator efficiency for the fifth operation will be overstated.


C.

Units in process will be understated.


D.

Work-in-process (WIP) cost will be understated.


Expert Solution
Questions # 18:

A security engineer is reviewing Incident Response (IR) roles and responsibilities. Several roles have static elevated privileges in case an incident occurs. Instead of static access, what is the BEST access method to manage elevated privileges?

Options:

A.

Just-in-time


B.

Delegated


C.

Break-glass


D.

Automated


Expert Solution
Questions # 19:

An executive wants to ensure that risk related to information operations is managed in accordance with the enterprise's risk management thresholds. What is the BEST way to ensure this consistently occurs?

Options:

A.

Publish and enforce enterprise policies that assign risk decisions to corporate officers.


B.

Publish and enforce enterprise policies that assign risk decisions to cybersecurity analysts.


C.

Publish and enforce enterprise policies that assign risk decisions to business unit managers.


D.

Publish and enforce enterprise policies that assign risk decisions to system administrators.


Expert Solution
Questions # 20:

An example of an assignable cause of variation in process performance is:

Options:

A.

power fluctuation during machine operation.


B.

machine vibration during operation.


C.

incorrect setup of a machine by the operator.


D.

changes in temperature in the machine shop.


Expert Solution
Questions # 21:

Which of the following is the BEST reason to conduct a penetration test?

Options:

A.

To verify compliance with organizational patching policies.


B.

To document that all relevant patches have been installed.


C.

To identify technical vulnerabilities.


D.

To determine if weaknesses can be exploited.


Expert Solution
Questions # 22:

Business management should be engaged in the creation of Business Continuity (BC) and Disaster Recovery plans (DRP) because they need to

Options:

A.

Ensure that the technology chosen for implementation meets all of the requirements.


B.

Provide resources and support for the development and testing of the plan.


C.

Predetermine spending for development and implantation of the plan.


D.

Specify the solution and options around which the plans will be developed.


Expert Solution
Questions # 23:

When implementing solutions for information security continuous monitoring, which method provides the MOST interoperability between security tools?

Options:

A.

Continuous Integration and Continuous Delivery (CI/CD)


B.

Common Vulnerabilities and Exposures (CVE)


C.

Security Content Automation Protocol (SCAP)


D.

Common Vulnerability Scoring System (CVSS)


Expert Solution
Questions # 24:

An organization decides to conduct penetration testing. Senior management is concerned about the potential loss of information through data exfiltration. The organization is currently preparing a major product launch that is time-sensitive. Which of the following methods of testing is MOST appropriate?

Options:

A.

Gray box


B.

Green box


C.

Black box


D.

White box


Expert Solution
Questions # 25:

Which of the following is the GREATEST threat for a Border Gateway Protocol (BGP) deployment on the internet?

Options:

A.

Ability to use weak hashing algorithms for peer authentication


B.

Ability to perform unauthenticated peering across autonomous systems


C.

Failure to validate legitimacy of received route advertisements


D.

Failure to encrypt route announcement across autonomous systems


Expert Solution
Questions # 26:

An organization is implementing improvements to secure the Software Development Life Cycle (SDLC). When should defensive three modeling occur?

Options:

A.

Standards review


B.

Static Application Security Testing (SAST)


C.

Design and requirements gathering


D.

Dynamic Application Security Testing (DAST)


Expert Solution
Questions # 27:

A Structured Query Language (SQL) database is hosted on a hardened, secure server. All unused ports are locked down, but external connections from untrusted networks are still required to be allowed through. What is the BEST way to ensure transactions to/from this server remain secure?

Options:

A.

Secure SQL service port with a Transport Layer Security (TLS) certificate.


B.

Use Multi-Factor Authentication (MFA) for all logins to the server.


C.

Secure SQL service port with a Secure Sockets Layer (SSL) certificate.


D.

Scan all connections to the server for malicious packets.


Expert Solution
Questions # 28:

In order to meet retention requirements, it may be necessary to migrate digital records to different media because of which of the following issues?

Options:

A.

Deduplication conserves storage.


B.

Regulatory guidance requires compliance.


C.

Digital media can degrade.


D.

Hierarchical storage facilitates access.


Expert Solution
Questions # 29:

Open Authorized (OAuth) has been chosen as technology to use across applications in the enterprise. Which of the following statements is TRUE about an OAuth token?

Options:

A.

Does not specify a time interval


B.

Can be used for authentication


C.

Can be used across multiple sites


D.

Specifies what information can be accessed


Expert Solution
Questions # 30:

The primary purpose for engaging in cycle count activities is to:

Options:

A.

eliminate the need for a traditional physical inventory count.


B.

more frequently reconcile the actual on-hand and system on-hand for items.


C.

smooth out the tasks of counting inventory throughout the fiscal year.


D.

improve material handling processes and reduce or eliminate errors.


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions