New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following is a threat modeling methodology used for accessing threats against applications and Operating Systems (OS)?

Options:

A.

Basically Available, Soft-State, Eventual-Consistency (BASE)


B.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation Of Privilege (STRIDE)


C.

Control Objectives For Information And Related Technology (COBIT)


D.

Security, Trust, Assurance And Risk (STAR)


Expert Solution
Questions # 47:

An organization is considering options to outsource their Information Technology (IT) operations. Although they do not sell anything on the Internet, they have a strong requirement in uptime of their application. After evaluating the offerings received by the Cloud Service Provider (CSP), the IT manager decided it was mandatory to develop processes to continue operations without access to community or public cloud-based applications. Which of the following arguments MOST likely led the IT manager to make this decision?

Options:

A.

Circumstances may force a cloud provider to discontinue operations


B.

Most cloud service offerings are unique to each provider and may not be easily portable


C.

Integrity and confidentiality are not ensured properly on most cloud service offerings


D.

The need to develop alternative hosting strategies for applications deployed to the cloud


Expert Solution
Questions # 48:

Which of the following roles is the BEST choice for classifying sensitive data?

Options:

A.

Information system owner


B.

Information system security manager


C.

Information owner


D.

Information system security officer


Expert Solution
Questions # 49:

An organization is opening a new data center and is looking for a facilities security officer to provide best practices for the site and facility design. The two major requirements for this organization are not to attract undue attention and avoid proximity to potentially hazardous sites.

What site selection considerations do these requirements BEST fall under when deciding on the location for a facility?

Options:

A.

Visibility and natural disasters


B.

Visibility and locale


C.

Visibility and hazardous sites


D.

Visibility and transportation


Expert Solution
Questions # 50:

During a security incident investigation, a security analyst discovered an unauthorized module was compiled into an application package as part of the application assembly phase. This incident occurred immediately prior to being digitally signed and deployed using a deployment pipeline.

Which of the following security controls would BEST prevent this type of incident in the future?

Options:

A.

Invoke code repository vulnerability scanning on a regularly scheduled basis.


B.

Implement Role-Based Access Controls (RBAC) in each component of the deployment pipeline.


C.

Encrypt the application package after being digitally signed.


D.

Implement a software Bill of Materials (BOM) for each application package.


Expert Solution
Questions # 51:

In preparing for a facility location decision, proximity to suppliers would be classified as which kind of criteria?

Options:

A.

Service level requirements


B.

Future flexibility factors


C.

Access to transportation


D.

Cost factors


Expert Solution
Questions # 52:

An audit report of security operations has listed some anomalies with third parties being granted access to the internal systems and data without any restrictions.

Which of the following will BEST help remediate this issue?

Options:

A.

Provide access restrictions for resources stored in a low-volume network or subnetwork location.


B.

Provide access restrictions for resources stored on a network that uses a unique platform.


C.

Provide access restrictions for resources stored in a high-volume network or subnetwork location.


D.

Provide access restrictions for resources stored on a network or on a subnetwork.


Expert Solution
Questions # 53:

Which of the following tools shows process changes and random variation over time?

Options:

A.

Check sheet


B.

Control chart


C.

Histogram


D.

Pareto analysis


Expert Solution
Questions # 54:

Which of the following trade-offs should be evaluated when determining where to place inventory in a multi-echelon supply chain network?

Options:

A.

Production cost and lot size quantity


B.

Purchase cost and shrinkage rates


C.

Transportation cost and delivery time


D.

Customer price and order quantity


Expert Solution
Questions # 55:

An organization wants to implement Zero Trust (ZT). The Information Technology (IT) department is already using Multi-Factor Authentication (MFA) and Identity and Access Management (IAM). Which of the following would be the BEST solution for the organization to implement in order to have a ZT network?

Options:

A.

Next-generation firewall


B.

Host-Based Intrusion Detection System (HIDS)


C.

Micro-segmentation


D.

Network Intrusion Detection System (NIDS)


Expert Solution
Questions # 56:

What is the BEST item to consider when designing security for information systems?

Options:

A.

The comprehensive level of assurance required


B.

The jurisdiction of the information system


C.

The security requirements of the board


D.

The Disaster Recovery Plan (DRP)


Expert Solution
Questions # 57:

An example of a flexibility metric for an organization Is:

Options:

A.

average batch size.


B.

scrap rate.


C.

percentageof orders delivered late.


D.

cycle time.


Expert Solution
Questions # 58:

What priority control technique is most appropriate for a firm using a cellular production system?

Options:

A.

Shortest processing time (SPT) rule


B.

Distribution requirements planning (DRP)


C.

Pull production activity control (PAC)


D.

Push production activity control (PAC)


Expert Solution
Questions # 59:

Employees at an organization use web based services provided by an affiliate. Which of the following risks is unique to this situation?

Options:

A.

Watering hole attack


B.

Man-In-Middle (MITM) attack


C.

Cross-Site Request Forgery (CSRF) attack


D.

PowerShell attack


Expert Solution
Questions # 60:

During an emergency management and planning session, an organization is discussing how to identify, prevent, prepare for, or respond to emergencies. Which of the following will provide the BEST possible outcome?

APerform drills on a recurring basis.

B.Harden all critical facilities.

C.Outsource to an external organization.

D.Allocate 100% of required funds.


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions