Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

A work center has 3 machines that are all run at the same time with a single worker. The work center has an efficiency of 75% and a utilization of 100%. What is the work center's capacity in standard hours for an 8-hour shift?

Options:

A.

6 hours


B.

8 hours


C.

18 hours


D.

24 hours


Expert Solution
Questions # 47:

An organization wants to implement Zero Trust (ZT). The Information Technology (IT) department is already using Multi-Factor Authentication (MFA) and Identity and Access Management (IAM). Which of the following would be the BEST solution for the organization to implement in order to have a ZT network?

Options:

A.

Next-generation firewall


B.

Host-Based Intrusion Detection System (HIDS)


C.

Micro-segmentation


D.

Network Intrusion Detection System (NIDS)


Expert Solution
Questions # 48:

Which of the following environments is most suitable for the use of kanban systems?

Options:

A.

Short product life cycles


B.

High levels of customization


C.

Intermittent production


D.

Stable and predictable demand


Expert Solution
Questions # 49:

A multinational organization acquires a subsidiary. The acquisition results in the need to integrate a large population of new users into the organization's corporate cloud. What is the MAIN benefit of the organization's Federated Identity Management (FIM) system to address the need?

Options:

A.

Efficient access provisioning


B.

Increased robustness of authentication


C.

Greater flexibility of access control


D.

Reduced complexity of maintenance and changes


Expert Solution
Questions # 50:

Information regarding a major new customer is received from sales. The company's most appropriate initial response would be to adjust the:

Options:

A.

production volume.


B.

master production schedule (MPS).


C.

sales and operations plan.


D.

forecast.


Expert Solution
Questions # 51:

Which of the following incorporates design techniques promoted by Crime Prevention Through Environmental Design (CPTED)?

Options:

A.

Capacity of residents to act individually should be increased.


B.

Landscape design features should be used to create the impression of a fortress.


C.

Multiple entrances and exits should be used to keep traffic flowing smoothly through the facility.


D.

Communal areas with amenities should be created to encourage activity and use.


Expert Solution
Questions # 52:

An organization routes traffic between two of its sites using non-revenue network paths provided by peers on an Internet exchange point. What is the MOST appropriate recommendation the organization's security staff can make to prevent a compromise?

Options:

A.

Cease routing traffic over the Internet exchange point and use the transit provider exclusively.


B.

Ask the peers who route the traffic to sign a Non-Disclosure Agreement (NDA).


C.

Use Internet Protocol Security (IPsec) between the border gateways at either site.


D.

Nothing needs to be done because applications are already required to encrypt and authenticate network traffic.


Expert Solution
Questions # 53:

After a recent threat modeling workshop, the organization has requested that the Chief Information Security Officer (CISO) implement zero trust (ZT) policies. What was the MOST likely threat identified in the workshop?

Options:

A.

Natural threats


B.

Elevation of privilege


C.

Repudiation


D.

Information disclosure


Expert Solution
Questions # 54:

An organization is updating an Application Programming Interface (API) to support requests coming from mobile applications distributed on public application stores. The API’s primary function is to supply confidential documents when users request them within the mobile application. Which approach would BEST respond to this use case?

Options:

A.

Require that the user supplies their credential to access confidential documents.


B.

Require a Virtual Private Network (VPN) connection to the organization's network to access confidential documents.


C.

Implement Security Assertion Markup Language (SAML) to validate the identity of the user requesting access to confidential documents.


D.

Implement Open Authorization (OAuth) 2.0 to require the users to request permission to access confidential documents.


Expert Solution
Questions # 55:

An organization has hired a consultant to establish their Identity and Access Management (IAM) system. One of the consultant’s main priorities will be to understand the current state and establish visibility across the environment. How can the consultant start to establish an IAM governance process?

Options:

A.

Implement Attribute-Based Access Control (ABAC) process for sensitive applications.


B.

Determine authoritative identity sources.


C.

Understand connectivity to target applications.


D.

Implement Role-Based Access Control (RBAC) process for web-based applications.


Expert Solution
Questions # 56:

A contractor hacked into an unencrypted session on an organization's wireless network. Which authentication configuration is MOST likely to have enabled this?

Options:

A.

Remote Authentication Dial-In User Service (RADIUS)


B.

Captive web portal


C.

Lightweight Directory Access Protocol (LDAP)


D.

Token authentication


Expert Solution
Questions # 57:

An infrastructure team is setting up a wireless network for employees at a new location of the organization that is located near a very busy city transport hub. Which should be the MOST important antenna consideration with regard to securing the wireless network for the infrastructure team?

Options:

A.

Network's Service Set Identifier (SSID) visibility and vulnerabilities are not cast out too far.


B.

Parabolic antenna is used for signal convergence.


C.

Network efficiently allows maximum channel separation.


D.

Implement Wired Equivalent Privacy (WEP) encryption.


Expert Solution
Questions # 58:

Given the following data, calculate the appropriate takt time:

Question # 58

Options:

A.

0.25 minutes


B.

1 minute


C.

2 minutes


D.

4 minutes


Expert Solution
Questions # 59:

Which of the following measurements indicates there may be bias In the forecast model?

Options:

A.

Mean absolute deviation (MAD)


B.

Standard deviation


C.

Tracking signal


D.

Variance


Expert Solution
Questions # 60:

Which of the following BEST describes an individual modifying something the individual is not supposed to?

Options:

A.

Exfiltration


B.

Tampering


C.

Spoofing


D.

Repudiation


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions