Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

A hot Disaster Recovery (DR) data center is the victim of a data breach. The hackers are able to access and copy 10GB of clear text confidential information. Which of the following could have decreased the amount of exposure from this data breach?

Options:

A.

Encryption in transit


B.

Layer 7 filtering


C.

Encryption at rest


D.

Password hashing


Expert Solution
Questions # 77:

What document MOST likely states an organization’s values?

Options:

A.

Union labor agreement


B.

Information protection policy


C.

Code of conduct


D.

Management standards


Expert Solution
Questions # 78:

An organization’s external auditors have issued a management letter identifying significant deficiencies related to the effectiveness of the previous year’s global access certification. The organization wants to move from a department-based access control system to a Role-Based Access Control (RBAC) system. In addition to quickly and securely provisioning users by granting membership into predefined and approved roles, which of these presents the BEST reason to do so?

Options:

A.

The organization can implement both mandatory and dynamic access controls, except where they would be in conflict.


B.

The organization can clone roles, saving time and granting broad access to persons within the same department.


C.

The organization can give a person holding multiple roles the appropriate levels of access to specific data for each role.


D.

The organization can implement both static and dynamic access controls, adjusting them to fit any individual’s access needs.


Expert Solution
Questions # 79:

The Information Technology (IT) manager of a large organization has been tasked with implementing a distributed third-party Identity As A Service (IDaaS). The local security team is concerned that the Identity Provider (IdP) and resource provider have direct connectivity outside of enterprise control. Which of the following authentication methods BEST address this concern?

Options:

A.

Federation authorities access list


B.

Manual registration


C.

Proxied federation


D.

Signed assertion


Expert Solution
Questions # 80:

An agency has the requirement to establish a direct data connection with another organization for the purpose of exchanging data between the agency and organization systems. There is a requirement for a formal agreement between the agency and organization. Which source of standards can the system owners use to define the roles and responsibilities along with details for the technical and security requirements?

Options:

A.

International Organization For Standardization (ISO)


B.

European Committee for Electrotechnical Standardization


C.

Caribbean Community Regional Organization for Standards and Quality


D.

Institute of Electrical and Electronics Engineers (IEEE)


Expert Solution
Questions # 81:

A cybersecurity analyst has recently been assigned to work with a product development team. The team has usually needed to perform a lot of rework late in the development cycle on past projects due to application security concerns. They would like to minimize the amount of rework necessary. Which would be the BEST option to enable secure code review early in the product development?

Options:

A.

Implement dynamic code analysis


B.

Perform manual code reviews


C.

Implement static code analysis


D.

Perform fuzz testing


Expert Solution
Questions # 82:

Which compensating control is the MOST effective to prevent fraud within an organization?

Options:

A.

Principle of least privilege


B.

Log monitoring


C.

Separation of privilege


D.

Pre-employment background checks


Expert Solution
Questions # 83:

Which of the following Internet Protocol Security (IPSec) components provides the MOST confidentiality for the information that is being transmitted?

Options:

A.

Authentication Header (AH)


B.

Generic Routing Encapsulation (GRE)


C.

Encapsulation Security Payload


D.

Internet Key Exchange (IKE)


Expert Solution
Questions # 84:

Under which of the following conditions is excess capacity most likely a good substitute for safety stock?

Options:

A.

The cost of excess capacity is less than the cost of an additional unit of safety stock in the same period.


B.

The cost to maintain one unit in inventory for a year is less than the direct labor cost.


C.

The service level with safety stock is more than the service level with excess capacity.


D.

Lead time for the product is longer than customers are willing to wait.


Expert Solution
Questions # 85:

The development team wants new commercial software to integrate into the current system. What steps can the security office take to ensure the software has no vulnerabilities?

Options:

A.

Ask the development team to reevaluate the current program and have a toolset developed securely within the organization.


B.

Request a copy of the most recent System and Organization Controls (SOC) report and/or most recent security audit reports and any vulnerability scans of the software code from the vendor.


C.

Purchase the software, deploy it in a test environment, and perform Dynamic Application Security Testing (DAST) on the software.


D.

Request a software demo with permission to have a third-party penetration test completed on it.


Expert Solution
Questions # 86:

Disaster Recovery Plan (DRP) training can be considered complete when the participants

Options:

A.

understand the rationale behind why a specific Disaster Recovery Plan (DRP) strategy was chosen.


B.

receive a complete, accurate, and detailed explanation of the Disaster Recovery Plan (DRP).


C.

understand their roles and interactions with other roles.


D.

have demonstrated their understanding during an actual disaster.


Expert Solution
Questions # 87:

Which of the following mechanisms should a practitioner focus on for the MOST effective information security continuous monitoring?

Options:

A.

Implementing automated methods for data collection and reporting where possible


B.

Updating security plans, security assessment reports, hardware, and software inventories


C.

Defining specific methods for monitoring that will maintain or improve security posture


D.

Collecting risk metrics from teams, such as business, testing, QA, development, and operations with security controls


Expert Solution
Questions # 88:

Which of the following combines multiple software programming tools into one package?

Options:

A.

Integrated development environments


B.

Software development kit


C.

Dynamic Link Libraries (DLL)


D.

Program language compilers


Expert Solution
Questions # 89:

Which of the following statements is true about total productive maintenance (TPM)?

Options:

A.

It uses statistical tools.


B.

It is part of the business strategy.


C.

It influences the product design process.


D.

It minimizes unscheduled breakdowns.


Expert Solution
Questions # 90:

What is the MAIN privacy risk raised by federated identity solutions?

Options:

A.

The potential for tracking and profiling an individual's transactions


B.

The potential to break the chain of trust between identity brokers


C.

The potential for exposing an organization's sensitive business information


D.

The potential for unauthorized access to user attributes


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions