Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

The help desk received a call from a user noting the digital certificate on the organization-issued security identification card was invalid. Which is the BEST reason the certificate stopped working?

Options:

A.

The user's certificate was compromised by the public key of the user.


B.

The public key of the Certificate Authority (CA) is known to attackers.


C.

The user's certificate was absent from the Certificate Revocation List (CRL).


D.

The user's certificate has expired and needs to be renewed.


Expert Solution
Questions # 47:

Which approach will BEST mitigate risks associated with root user access while maintaining system functionality?

Options:

A.

Creating a system where administrative tasks are performed under monitored sessions using the root account, with audits conducted regularly


B.

Implementing a policy where users log in as root for complex tasks but use personal accounts for everyday activities, with strict logging of root access


C.

Configuring individual user accounts with necessary privileges for specific tasks and employing “sudo” for occasional administrative needs


D.

Allowing key authorized personnel to access the root account for critical system changes, while other staff use limited accounts with “sudo” for routine tasks


Expert Solution
Questions # 48:

A semiconductor manufacturer is writing a physical asset handling policy. Which of the following is MOST likely to be the rationale for the policy?

Options:

A.

Access of system logs to authorized staff


B.

Accurate and prompt tagging of all business files


C.

Assurance of safe and clean handling of company property


D.

Adoption of environmental controls in the server room


Expert Solution
Questions # 49:

When resolving conflicts, which canon within the ISC2 Code of Ethics requires members to consider duties to principals and Individuals?

Options:

A.

Maintain the privacy and confidentiality of information obtained.


B.

Advance and protect the profession.


C.

Act honorably, honestly, justly, responsibly, and legally.


D.

Maintain competency in their respective fields.


Expert Solution
Questions # 50:

Which of the following techniques is BEST suited to preserve the confidentiality of a system’s data?

Options:

A.

Audit log review


B.

Database encryption


C.

Immutable backups


D.

Database record locking


Expert Solution
Questions # 51:

While conducting an information asset audit, it was determined that several devices were running unpatched Operating Systems (0S). Further review Indicated the OS was no longer supported by the vendor. Which of the following BEST indicates the appropriate asset lifecycle stage of the devices?

Options:

A.

Maintain


B.

Modify


C.

Procure


D.

Dispose


Expert Solution
Questions # 52:

A logistics manager Is faced with delivering an order via rail or truck. Shipping via rail costs S300 and takes 14 days. Shipping via truck costs $600 and takes 3 days. If the holding cost is $40 per day, what is the cost to deliver the order?

Options:

A.

$340for rail,$600 for truck


B.

$340for rail.$720 for truck


C.

$860for rail,$720 for truck


D.

$860for rail.$600 for truck


Expert Solution
Questions # 53:

The planned channels of Inventory disbursement from one or more sources to field warehouses are known as:

Options:

A.

a supply chain community.


B.

interplant demand.


C.

a bill of distribution.


D.

logistics data interchange (LDI).


Expert Solution
Questions # 54:

Which of the following is the MOST significant flaw when using Federated Identity Management (FIM)?

Options:

A.

The initial cost of the setup is prohibitively high for small business.


B.

The token stored by the Identity Provider (IdP) may need to be renewed.


C.

The token generated by the Identity Provider (IdP) may be corrupted.


D.

The participating members in a federation may not adhere to the same rules of governance.


Expert Solution
Questions # 55:

A security assessor has been engaged to perform a penetration test on control system components located on a shipping vessel. The individuals on the ship do not have any knowledge of how the component is configured or its internal workings. Which of the following test types does this scenario call for?

Options:

A.

Tandem testing


B.

Blind testing


C.

Double-gray testing


D.

Double-blind testing


Expert Solution
Questions # 56:

Zombieload, Meltdown, Spectre, and Fallout are all names of bugs that utilized which of the following types of attack?

Options:

A.

Mai-In-The-Middle (MITM)


B.

Side-Channel


C.

Frequency analysis


D.

Fault injection


Expert Solution
Questions # 57:

The horizon for forecasts that are input to the sales and operations planning (S&OP) process should be long enough that:

Options:

A.

cumulative forecast deviation approaches zero.


B.

planned product launches can be incorporated.


C.

required resources can be properly planned.


D.

supply constraints can be resolved.


Expert Solution
Questions # 58:

If all other factors remain the same, when finished goods inventory investment is increased, service levels typically will:

Options:

A.

remain the same.


B.

increase in direct (linear) proportion.


C.

increase at a decreasing rate.


D.

increase at an increasing rate.


Expert Solution
Questions # 59:

When performing threat modeling using Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation of Privilege (STRIDE), which of the following is an example of a repudiation threat?

Options:

A.

Using someone else's account


B.

Distributed Denial-Of-Service (DDoS)


C.

SQL Injection (SQLi)


D.

Modifying a file


Expert Solution
Questions # 60:

Which of the following is a core subset of The Open Group Architecture Framework (TOGAF) enterprise architecture model?

Options:

A.

Security architecture


B.

Availability architecture


C.

Privacy architecture


D.

Data architecture


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions