Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions
Questions # 61:

The development team wants new commercial software to Integrate into the current systems. What steps can the security office take to ensure the software has no vulnerabilities?

Options:

A.

Request a copy of the most recent System and Organization Controls (SOC) report and/or most recent security audit reports and any vulnerability scans of the software code from the vendor.


B.

Purchase the software, deploy it in a test environment, and perform Dynamic Application Security Testing (DAST) on the software.


C.

Request a software demo with permission to have a third-party penetration test completed on it.


D.

Ask the development team to reevaluate the current program and have a toolset developed securely within the organization.


Expert Solution
Questions # 62:

A security team is analyzing the management of data within the human resources systems, as well as, the intended use of the data, and with whom and how the data will be shared. Which type of assessment is the team MOST likely performing?

Options:

A.

Privacy Impact Assessment (PIA)


B.

Vulnerability assessment


C.

Sensitive data assessment


D.

Personally Identifiable Information (PII) risk assessment


Expert Solution
Questions # 63:

A newly hired Chief Information Security Officer (CISO) is now responsible to build a third-party assurance for their organization. When assessing a third-party, which of the following questions needs to be answered?

Options:

A.

How many employees the third-party employs?


B.

Which level of support does the third-party provide related to security?


C.

What is the monetary value of the third-party contract?


D.

To which standards does the third-party need to be assessed?


Expert Solution
Questions # 64:

What is the MOST important security benefit of comprehensive asset management?

Options:

A.

Enforces information security policies


B.

Supports understanding of enterprise security posture


C.

Supports locating security components at end of life


D.

Enforces network security access controls


Expert Solution
Questions # 65:

What is the BEST item to consider when designing security for information systems?

Options:

A.

The comprehensive level of assurance required


B.

The jurisdiction of the information system


C.

The security requirements of the board


D.

The Disaster Recovery Plan (DRP)


Expert Solution
Questions # 66:

In the Session layer of the Open Systems Interconnection (OSI) model, which of the following modes allows only one host to send information to its peer?

Options:

A.

Half-duplex


B.

Simplex


C.

Unicast


D.

Full-duplex


Expert Solution
Questions # 67:

In conducting a new corporate payroll system security review, which of the following individuals should answer questions regarding the data classification?

Options:

A.

Head of human capital


B.

Head of compliance


C.

Chief Information Security Officer (CISO)


D.

Chief Information Officer (CIO)


Expert Solution
Questions # 68:

Which of the following should be done FIRST when implementing an Identity and Access Management (IAM) solution?

Options:

A.

List and evaluate IAM available products.


B.

Evaluate the existing Information Technology (IT) environment.


C.

Evaluate business needs.


D.

Engage the sponsor and identify key stakeholders.


Expert Solution
Questions # 69:

A security specialist is responsible to improve the security awareness program of a medium-sized organization and tasked to track blocked targeted attacks. Which of the following BEST describes the outcome of the security specialist’s use of metrics for this task?

Options:

A.

A decrease in reported suspicious activity that aligns with an increase in detection of malware and Domain Name Server (DNS) queries to blocked sites.


B.

An increase in reported suspicious activity that aligns with a decrease in detection of malware and Domain Name Server (DNS) queries to blocked sites.


C.

An increase in reported changes in click percentage that aligns with a decrease in the number of phishes and incidents reported.


D.

A decrease in reported changes in click percentages that aligns with an increase in the number of phishes and incidents reported.


Expert Solution
Questions # 70:

Which of the following is the BEST way to identify the various types of software installed on an endpoint?

Options:

A.

Active network scanning


B.

Passive network scanning


C.

Authenticated scanning


D.

Port scanning


Expert Solution
Questions # 71:

Which of the following is a methodology for threat modeling in application?

Options:

A.

Disaster, Reproducibility, Exploitability, Affected Users, And Discoverability (DREAD)


B.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE)


C.

Pretend, Allow, Crash, Modify, Ascertain, Name


D.

Confidentiality, Authentication, Integrity, Nonrepudiation, Availability


Expert Solution
Questions # 72:

A contractor hacked into an unencrypted session on an organization's wireless network. Which authentication configuration is MOST likely to have enabled this?

Options:

A.

Remote Authentication Dial-In User Service (RADIUS)


B.

Captive web portal


C.

Lightweight Directory Access Protocol (LDAP)


D.

Token authentication


Expert Solution
Questions # 73:

An organization recently created a new accounting department, and that department is critical in the event of a disaster for the operations to continue. Which steps should the organization take to create a Business Continuity Plan (BCP)?

Options:

A.

Test, maintain, implement, deliver, and execute


B.

Plan, implement, execute, deliver, and document


C.

Understand, plan, deliver, implement, and execute


D.

Understand, plan, deliver, test, and maintain


Expert Solution
Questions # 74:

An organization needs a firewall that maps packets to connections and uses Transmission Control Protocol/Internet Protocol (TCP/IP) header fields to keep track of connections. Which type of firewall will be recommended?

Options:

A.

Network


B.

Stateless


C.

Stateful


D.

Packet


Expert Solution
Questions # 75:

The primary reason for tracing a component with scheduling problems to Its master production schedule (MPS) item is to:

Options:

A.

revise the rough-cut capacity plan.


B.

reschedule a related component on the shop floor.


C.

check the accuracy of the bills for the MPS items.


D.

determine if a customer order will be impacted.


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions