Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

When assessing a new vendor as a possible business partner, what would BEST demonstrate that the vendor has a proactive approach to data security compliance?

Options:

A.

The vendor provides documented safeguards in handling confidential data.


B.

The vendor provides a copy of their externally performed risk assessment.


C.

The vendor has a Business Associate Agreement (BAA) in place before work begins.


D.

The vendor has a signed contract in place before work with data begins.


Expert Solution
Questions # 32:

A security engineer needs to perform threat modeling on a microprocessor design for an Internet of Things (IoT) application. Using the MITRE Common Weakness Enumeration (CWE) catalog for hardware, a risk analysis is performed. What kind of threat modeling approach would be BEST to identify entry points into the system based on motivation?

Options:

A.

System centric


B.

Attacker centric


C.

Threat centric


D.

Asset centric


Expert Solution
Questions # 33:

Substituting capital equipment in place of direct labor can be economically Justified for which of the following scenarios?

Options:

A.

Volumes are forecasted to increase


B.

Material prices are forecasted to increase


C.

Implementing a pull system in production


D.

Functional layouts are being utilized


Expert Solution
Questions # 34:

The trade-off of increasing safety stock to improve customer fill rate would be a decrease in:

Options:

A.

pipeline inventory.


B.

transportation costs.


C.

inventory turns.


D.

sales revenue.


Expert Solution
Questions # 35:

An example of a flexibility metric for an organization Is:

Options:

A.

average batch size.


B.

scrap rate.


C.

percentageof orders delivered late.


D.

cycle time.


Expert Solution
Questions # 36:

In choosing suppliers, a company wishes to maintain maximum leverage to reduce costs. Which of the following supply chain strategies would provide this opportunity?

Options:

A.

Single sourcing


B.

Multisourcing


C.

Long-term agreement


D.

Service-level agreement (SLA)


Expert Solution
Questions # 37:

Improvements in an Input/output control (I/O control) system will most likely lead to:

Options:

A.

flattened bills of material (BOMs).


B.

a change in operation sequencing.


C.

reduction in queue size and queue time.


D.

fewer engineering change notifications.


Expert Solution
Questions # 38:

A company confirms a customer order based on available capacity and inventory, even though the current production plan does not cover the entire order quantity. This situation is an example of what type of order fulfillment policy?

Options:

A.

Assemble-to-order (ATO)


B.

Capable-to-promise (CTP)


C.

Available-to-promise (ATP)


D.

Configure-to-order (CTO)


Expert Solution
Questions # 39:

An advantage of applying ABC classification to a firm's replenishment items is that:

Options:

A.

it distinguishes independent demand from dependent demand.


B.

it allows planners to focus on critical products.


C.

it provides better order quantities than the economic order quantity (EOQ).


D.

it allows the firm to utilize time-phased order point (TPOP).


Expert Solution
Questions # 40:

After reviewing the output of a threat modelling workshop, the development manager decides not to implement the application features where issues were identified. What is the BEST description of how the threats from the workshop are being addressed?

Options:

A.

Eliminated


B.

Mitigated


C.

Transferred


D.

Accepted


Expert Solution
Questions # 41:

An organization is looking to integrate security concepts into the code development process early in development to detect issues before the software is launched. Which advantage does the organization gain from using Static Application Security Testing (SAST) techniques versus dynamic application security testing techniques?

Options:

A.

Allows tailored techniques


B.

Executes code to detect issues


C.

Allows for earlier vulnerability detection


D.

Simulates attacker patterns


Expert Solution
Questions # 42:

The cost accountant has discovered a consistent overage in actual run time for one operation. This information should be sent first to the:

Options:

A.

product manager to increase the selling price of the product.


B.

quality manager to add a new quality measurement to the operation.


C.

production supervisor to review and explain the overage.


D.

the engineering manager to evaluate the run time for the routing.


Expert Solution
Questions # 43:

What should an organization do to prepare for Disaster Recovery (DR) efforts?

Options:

A.

Create a list of key personnel


B.

Create a list of decommissioned hardware


C.

Review tabletop exercises


D.

Replicate access logs


Expert Solution
Questions # 44:

An organization experienced multiple compromises of endpoints, leading to breaches of systems and data. In updating its strategy to defend against these threats, which of the following BEST considers the organization’s needs?

Options:

A.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE)


B.

Zero Trust (ZT) threat modeling


C.

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)


D.

Process for Attack Simulation and Threat Analysis (PASTA)


Expert Solution
Questions # 45:

Which security concept applies if an architecture diagram illustrates a particular user/role combination with access to an asset or applicaton?

Options:

A.

Non-repudiation


B.

Identification


C.

Authorization


D.

Authentication


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions