New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

A consultant has been engaged to support the team in analyzing why the development of a new software product has slipped schedule by a year. The consultant discovered an increase of the functionality requirements due to the failure of the asset tracking program. Which of the following BEST describes which system lifecycle element is impacted?

Options:

A.

Stakeholder identification


B.

Vision statement


C.

Operational efficiency


D.

Solution boundary


Expert Solution
Questions # 62:

What document MOST likely states an organization’s values?

Options:

A.

Union labor agreement


B.

Information protection policy


C.

Code of conduct


D.

Management standards


Expert Solution
Questions # 63:

During an onsite audit, an assessor inspected an organization’s asset decommission practice. Which of the following would MOST likely be a finding from a security point of view?

Options:

A.

Solid State Drives (SSD) were degaussed along with hard drives.


B.

The Non-Disclosure Agreement (NDA) between the organization and its data disposal service was more than 3 years old.


C.

Hard drives from older assets replaced defective hard drives from current assets of similar classification levels.


D.

Data classifications were not clearly identified.


Expert Solution
Questions # 64:

Which of the following provides that redundancy and failover capabilities are built into a system to maximize its uptime?

Options:

A.

Offsite backup


B.

High availability


C.

Diverse routing


D.

System mirroring


Expert Solution
Questions # 65:

What is the BEST protection method to ensure that an unauthorized entry attempt would fail when securing highly sensitive areas?

Options:

A.

Employee badge with a picture and video surveillance


B.

Keyed locks and Closed-Circuit Television (CCTV) at entrances


C.

Combination lock and a gate that prevents piggybacking


D.

Proximity badge requiring a Personal Identification Number (PIN) entry at entrances


Expert Solution
Questions # 66:

An organization has hired a new auditor to review its critical systems infrastructure for vulnerabilities. Which of the following BEST describes the methodology the auditor will use?

Options:

A.

Select an appropriate sample size of changes to production servers related to critical systems within the audit period and ensure they adhere to documented policies and standards.


B.

Select an appropriate sample size of recently deployed servers and review their configuration files against the organization's policies and standards.


C.

Select all production servers related to critical systems and review their configuration files against the organization's policies and standards.


D.

Select an appropriate sample size of changes to recently deployed servers within the audit period and ensure they adhere to documented policies and standards.


Expert Solution
Questions # 67:

What is the MAIN reason security is considered as part of the system design phase instead of deferring to later phases?

Options:

A.

To ensure complexity introduced by security design is addressed in the beginning stages.


B.

To reduce the overall cost of incorporating security in a system.


C.

To prevent the system from being tampered with in the future.


D.

To prevent the users from performing unauthorized actions during the testing or operational phases.


Expert Solution
Questions # 68:

Which assessing whether real-world threats to the security of an application have been mitigated, what is MOST effective source to confirm that sufficient security controls are in place for both end users and customers?

Options:

A.

Software security team


B.

Product management


C.

Third-party reviews


D.

Senior management


Expert Solution
Questions # 69:

When performing threat modeling using Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation of Privilege (STRIDE), which of the following is an example of a repudiation threat?

Options:

A.

Using someone else's account


B.

Distributed Denial-Of-Service (DDoS)


C.

SQL Injection (SQLi)


D.

Modifying a file


Expert Solution
Questions # 70:

As the organization requires user friendly access to a new web-based application, a software developer decides to implement Single Sign-On (SSO). The developer uses the de-facto standard for web-based applications and the implementation includes the use of a JavaScript Object Notation (JSON) web token. With this information, which is the BEST way for the software developer to establish SSO capability?

Options:

A.

The developer Inputs the user's account, the user's password, and a token.


B.

The developer uses the user's credentials stored within the web-based application.


C.

The developer uses Transport Layer Security (TLS) certificates and Open ID Connect (OIDC).


D.

The developer uses Open ID Connect (OIDC) and Open Authorization (OAuth).


Expert Solution
Questions # 71:

What is the MOST likely cause for a penetration tester having difficulties finding the stack to inject code?

Options:

A.

Advanced Threat Protection (ATP)


B.

Address Space Layout Randomization (ASLR)


C.

Structured exception handling overwrite protection


D.

Export address table filtering


Expert Solution
Questions # 72:

A cybersecurity analyst is responsible for identifying potential security threats and vulnerabilities in the organization's software systems. Which action BEST demonstrates the understanding and application of threat modeling concepts and methodologies?

Options:

A.

Implementing a Business Continuity Plan (BCP)


B.

Conducting access control assessments for the data center


C.

Analyzing potential attack vectors for a new software application


D.

Developing a Disaster Recovery Plan (DRP) for critical systems


Expert Solution
Questions # 73:

Which burden of proof has been applied when a workplace investigation has a 51 percent or greater certainty that allegations are true?

Options:

A.

Preponderance of evidence


B.

Beyond a reasonable doubt


C.

Some credible evidence


D.

Clear and convincing


Expert Solution
Questions # 74:

An organization is transitioning from a traditional server-centric infrastructure to a cloud-based Infrastructure. Shortly after the transition, a major breach occurs to the organization's databases. In an Infrastructure As A Service (IaaS) model, who would be held responsible for the breach?

Options:

A.

The database vendor


B.

The third-party auditor


C.

The organization


D.

The Cloud Service Provider (CSP)


Expert Solution
Questions # 75:

Plans are being made to move an organization’s software systems to the cloud in order to utilize the flexibility and scalability of the cloud. Some of these software systems process highly sensitive data. The organization must follow strict legal requirements regarding the location of the highly sensitive data processed by the software systems. Which cloud model will BEST fit the organization’s requirements?

Options:

A.

Private cloud


B.

Multicloud


C.

Public cloud


D.

Hybrid cloud


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions