Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

The production plan defines which of the following targets?

Options:

A.

Sales forecast


B.

Quantities of each product to be produced


C.

Level of output to be produced


D.

Business plans for the company


Expert Solution
Questions # 77:

Information regarding a major new customer is received from sales. The company's most appropriate initial response would be to adjust the:

Options:

A.

production volume.


B.

master production schedule (MPS).


C.

sales and operations plan.


D.

forecast.


Expert Solution
Questions # 78:

Which of the following BEST describes the purpose of black hat testing during an assessment?

Options:

A.

Assess systems without the knowledge of end-users.


B.

Focus on identifying vulnerabilities.


C.

Examine the damage or impact an adversary can cause.


D.

Determine the risk associated with unknown vulnerabilities.


Expert Solution
Questions # 79:

Health information stored in paper form may be destroyed using which of the following methods?

Options:

A.

Shredding


B.

Degaussing


C.

De-identification


D.

Archiving


Expert Solution
Questions # 80:

A vendor has been awarded a contract to supply key business software. The vendor has declined all requests to have its security controls audited by customers. The organization insists the product must go live within 30 days. However, the security team is reluctant to allow the project to go live. What is the organization's BEST next step?

Options:

A.

Shift the negative impact of the risk to a cyber insurance provider, i.e., risk transference.


B.

Document a risk acceptance, in accordance with internal risk management procedures, that will allow the product to go-live.


C.

Gain assurance on the vendor's security controls by examining independent audit reports and any relevant certifications the vendor can provide.


D.

Evaluate available open source threat intelligence pertaining to the vendor and their product.


Expert Solution
Questions # 81:

If the total part failure rate of a machine is 0.00055 failures per hour, what would be the mean time between failures (MTBF) in hours?

Options:

A.

1,818.2


B.

59.99945


C.

1.98


D.

0.99945


Expert Solution
Questions # 82:

A planner has chosen to increase the order point for a raw material. Which of the following costs is most likely to increase?

Options:

A.

Carrying


B.

Ordering


C.

Landed


D.

Product


Expert Solution
Questions # 83:

Which of the following is the BEST option for a security director to use in order to mitigate the risk of inappropriate use of credentials by individuals with administrative rights?

Options:

A.

Have administrators sign appropriate access agreements.


B.

Define the Acceptable Use Policy (AUP) for administrators.


C.

Have administrators accept a Non-Disclosure Agreement.


D.

Perform extensive background checks on administrators.


Expert Solution
Questions # 84:

An effective approach to projecting requirements for materials with long lead times Includes which of the following options?

Options:

A.

Initiate a multilevel master schedule.


B.

Use phantom bills of materials (BOMs).


C.

Increase the level of safety stock.


D.

Decrease the planning horizon.


Expert Solution
Questions # 85:

Which authentication method is used by an email server to verify that a sender’s Internet Protocol (IP) address is authorized to send messages by the sending domain?

Options:

A.

DomainKeys Identified Mail (DKIM)


B.

Sender policy framework


C.

Pointer record


D.

Secure/Multipurpose Internet Mail Extensions (S/MIME)


Expert Solution
Questions # 86:

One of the findings in the recent security assessment of a web application reads: "It appears that security is an afterthought in the web application development process. It is recommended that security be addressed earlier in the development process." Which of these choices would BEST remediate this security finding?

Options:

A.

The installation and use of Dynamic Application Security Testing (DAST) software to test written code.


B.

The installation and use of Static Application Security Testing (SAST) software to test written code.


C.

The introduction of a continuous integration/continuous development pipeline to automate security into the software development change process.


D.

The introduction of a security training program for the developers.


Expert Solution
Questions # 87:

Which of the following should recommendations from a Plan Of Action And Milestones (POA&M) be based on?

Options:

A.

Continuous monitoring


B.

Change Control Board (CCB) coordination


C.

Risk acceptance


D.

Root cause analysis


Expert Solution
Questions # 88:

Which of the following BEST represents a security benefit of Software-Defined Networking (SDN)?

Options:

A.

Improved threat detection


B.

Flexible firewall configuration


C.

Network availability


D.

Improved threat prevention


Expert Solution
Questions # 89:

When implementing solutions for information security continuous monitoring, which method provides the MOST interoperability between security tools?

Options:

A.

Continuous Integration and Continuous Delivery (CI/CD)


B.

Common Vulnerabilities and Exposures (CVE)


C.

Security Content Automation Protocol (SCAP)


D.

Common Vulnerability Scoring System (CVSS)


Expert Solution
Questions # 90:

A manufacturer has a primary assembly line supported by output from several subassembly lines. Which of the following scenarios would be the best argument for a multilevel master scheduling process?

Options:

A.

Low variation in aggregate subassembly demand


B.

High variation in aggregate subassembly demand


C.

Low variation in subassembly demand mix


D.

High variation in subassembly demand mix


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions