Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions
Questions # 61:

For a process that is outside its upper control limit (UCL), which of the following techniques would best be used to return the process under control?

Options:

A.

Conduct a Pareto analysis


B.

Plan-do-check-action (PDCA)


C.

Plot histograms


D.

Monitor control charts


Expert Solution
Questions # 62:

An organization identified a Distributed Denial-of-Service (DDoS) attack in which a large number of packets were broadcast with the intent of exploiting vulnerabilities of the Internet Protocol (IP) and the Internet Control Message Protocol (ICMP). Which Transmission Control Protocol/Internet Protocol (TCP/IP) layer would be affected by the attack?

Options:

A.

Transport layer


B.

Application layer


C.

Internet layer


D.

Network layer


Expert Solution
Questions # 63:

What is the BEST protection method to ensure that an unauthorized entry attempt would fail when securing highly sensitive areas?

Options:

A.

Employee badge with a picture and video surveillance


B.

Keyed locks and Closed-Circuit Television (CCTV) at entrances


C.

Combination lock and a gate that prevents piggybacking


D.

Proximity badge requiring a Personal Identification Number (PIN) entry at entrances


Expert Solution
Questions # 64:

The question below is based on the following information:

Beginning inventory = 43Week 1Week 2Week 3

Forecast202020

Customer orders221710

Projected on-hand

Master production schedule (MPS)80

Available-to-promise (ATP)

What is the largest customer order that could be accepted for delivery at the end of week 3 without making changes to the master production schedule (MPS)?

Options:

A.

74


B.

63


C.

61


D.

31


Expert Solution
Questions # 65:

Which of the following may authorize an organization to monitor an employee’s company computer and phone usage?

Options:

A.

Signed Non-Disclosure Agreement (NDA)


B.

Signed Acceptable Use Policy (AUP)


C.

ISC2 Code of Ethics


D.

Suspicious that a crime is being committed


Expert Solution
Questions # 66:

A company can easily change Its workforce, but inventory carrying costs are high. Which of the following strategies would be most appropriate during times of highly fluctuating demand?

Options:

A.

Produceto backorders


B.

Produceat a constant level


C.

Produceto the sales forecast


D.

Produceto demand


Expert Solution
Questions # 67:

Which of the following items does the master scheduler have the authority to change in the master scheduling process?

Options:

A.

Product mix


B.

Aggregate volume


C.

Engineering change effectivity date


D.

Customer order quantities


Expert Solution
Questions # 68:

A security engineer developing software for a professional services organization has a requirement that users cannot have concurrent access to data of clients that are competitors. Which security model should the security engineer implement to meet this requirement?

Options:

A.

Brewer-Nash


B.

Bell-LaPadula


C.

Biba Integrity


D.

Clark Wilson


Expert Solution
Questions # 69:

A security analyst has been asked to build a data retention policy for a hospital. What is the FIRST action that needs to be performed in building this policy?

Options:

A.

Determine local requirements.


B.

Determine federal requirements.


C.

Ensure that all data has been classified.


D.

Designate a person of authority.


Expert Solution
Questions # 70:

Based on the above table, calculate the mean absolute deviation (MAD).

Question # 70

Options:

A.

-25


B.

6.25


C.

18.75


D.

20


Expert Solution
Questions # 71:

Which of the following are compromised in an untrusted network using public key cryptography when a digitally signed message is modified without being detected?

Options:

A.

Integrity and authentication


B.

Integrity and non-repuditation


C.

Integrity and availability


D.

Confidentiality and availability


Expert Solution
Questions # 72:

An organization’s security team is looking at ways to minimize the security risk of the container infrastructure. The lead engineer needs to select a suite of remediation actions to minimize risks. Which programmatic approach will result in preventing, detecting , and responding to the GREATEST number of threats aimed at container operations?

Options:

A.

Use of hardware-based countermeasures to provide a basis for trusted computing


B.

Use of container-aware runtime defense tools


C.

Grouping containers with the same sensitivity level on a single host


D.

Adoption of container-specific vulnerability management tools


Expert Solution
Questions # 73:

Which Open Systems Interconnection (OSI) layer is concerned with Denial-Of-Service (DoS) SYN flood attacks?

Options:

A.

Data


B.

Physical


C.

Network


D.

Transport


Expert Solution
Questions # 74:

Which of the following is an access control method that organizations can use to prevent unauthorized access?

Options:

A.

Bring Your Own Device (BYOD)


B.

Man-in-the-Middle (MITM)


C.

Token-based authentication


D.

Digital verification


Expert Solution
Questions # 75:

A large organization is planning to lay off half of its staff. From an information security point of view, what is the BEST way of approaching affected staff?

Options:

A.

Discuss the Non-Disclosure Agreement (NDA) with the affected staff before revoking access.


B.

Revoke the user certificates and add them to the Certificate Revocation List (CRL).


C.

Revoke user access at the time of informing them.


D.

Ask human resources to conduct exit interviews before revoking access.


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions