Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions
Questions # 91:

An organization’s computer incident responses team PRIMARY responds to which type of control?

Options:

A.

Administrative


B.

Detective


C.

Corrective


D.

presentative


Expert Solution
Questions # 92:

Which of the following ensures privileges are current and appropriately reflect an individual’s authorized roles and responsibilities?

Options:

A.

Access authorization


B.

Identity management


C.

Access approval


D.

Access review


Expert Solution
Questions # 93:

The question below is based on the following standard and actual data of a production order

Question # 93

Which of the following statements about variances is true?

Options:

A.

The material price vanance for Component A is favorable by S10


B.

The labor pnce variance is unfavorable by S20


C.

The material usage variance for Component B is favorable by $36


D.

The labor efficiency variance is favorable by S20


Expert Solution
Questions # 94:

A security practitioner has been asked to investigate the presence of customer Personally Identifiable Information (PII) on a social media website. Where does the practitioner begin?

Options:

A.

Review logs of all user's social media activity.


B.

Review the organizational social media policy.


C.

Initiate the organization's incident response plan.


D.

Determine a list of information assets that contain PII.


Expert Solution
Questions # 95:

A cybersecurity analyst is reviewing a recent incident in which the adversaries were able to move vertically within the network. Which attack phase MOST clearly represents this scenario?

Options:

A.

System browsing


B.

Escalating privileges


C.

Gaining access


D.

Installing additional tools


Expert Solution
Questions # 96:

A cybersecurity professional has been tasked with instituting a risk management function at a new organization. Which of the following is the MOST important step the professional should take in this endeavor?

Options:

A.

Determine the acceptable level of loss exposure at which the organization is comfortable operating.


B.

Conduct a gap assessment and produce a risk rating report for the executive leadership.


C.

Engage consultants to audit the organization against best practices and provide a risk report.


D.

Implement an enterprise Governance, Risk, and Compliance (GRC) management solution.


Expert Solution
Questions # 97:

A Software As A Service (SaaS) solution was compromised due to multiple missing security controls. The SaaS deployment was rushed and the Software Development Life Cycle (SDLC) was not followed. Which SDLC phase would have been MOST effective in preventing this failure?

Options:

A.

Maintenance


B.

Design


C.

Testing


D.

Requirements


Expert Solution
Questions # 98:

The development team wants new commercial software to Integrate into the current systems. What steps can the security office take to ensure the software has no vulnerabilities?

Options:

A.

Request a copy of the most recent System and Organization Controls (SOC) report and/or most recent security audit reports and any vulnerability scans of the software code from the vendor.


B.

Purchase the software, deploy it in a test environment, and perform Dynamic Application Security Testing (DAST) on the software.


C.

Request a software demo with permission to have a third-party penetration test completed on it.


D.

Ask the development team to reevaluate the current program and have a toolset developed securely within the organization.


Expert Solution
Questions # 99:

What are the FIRST two steps an organization should conduct to classify its assets?

Options:

A.

Define user requirements and collate existing inventories


B.

Categorize assets and set minimum security controls


C.

Conduct an inventory of assets and determine the owners


D.

Obtain senior management buy-in and conduct a risk assessment


Expert Solution
Questions # 100:

Which of the following statements best characterizes enterprise resources planning (ERP) systems?

Options:

A.

They track activity from customer order through payment.


B.

They are expensive but easy to implement.


C.

They provide real-time planning and scheduling, decision support, available-to-promise (ATP), and capable-to-promise (CTP) capabilities.


D.

They are used for strategic reporting requirements.


Expert Solution
Questions # 101:

A large organization wants to implement a vulnerability management system in its internal network. A security professional has been hired to set up a vulnerability scanner on premises and to execute the scans periodically. Which of the following should be the FIRST action performed by the security professional?

Options:

A.

Configure internal firewalls to accept and pass all scanner traffic and responses


B.

Execute a vulnerability scan to determine the current organization security posture


C.

Select two different vulnerability scanners to get comprehensive reporting


D.

Obtain support from the computing systems' stakeholders


Expert Solution
Questions # 102:

An support technician is contacted by an imposter claiming to be a supervisor and is asked specifically to perform a task that violates the organization’s security policies. What type of attack is this?

Options:

A.

Spoofing


B.

Spear phishing


C.

Piggybacking


D.

Insider threat


Expert Solution
Questions # 103:

An organization is implementing Zero Trust Network Access (ZTNA) and needs a strategy to measure device trust for employee laptops. Which measurement strategy is BEST suited and why?

Options:

A.

Remote using a Trusted Platform Module (TPM) due to better protection of the keys


B.

Local using Trusted Platform Module (TPM) because low-level access software can be accessed


C.

Local using Trusted Platform Module (TPM) because of benefits from Segregation Of Duties (SoD)


D.

Remote using a scanning device because of benefits from Segregation Of Duties (SoD)


E.

Local using Mobile Device Management (MDM) because of device policy enforcement


Expert Solution
Questions # 104:

Which of the common vulnerabilities below can be mitigated by using indexes rather than actual portions of file names?

Options:

A.

Open redirect


B.

Cross-Site Request Forgery (CSRF)


C.

Path traversal


D.

Classic buffer overflow


Expert Solution
Questions # 105:

Which of the following situations is most likely to occur when using a push system?

Options:

A.

Work centers receive work even if capacity is not available.


B.

Work centers are scheduled using finite capacity planning.


C.

Work centers operate using decentralized control.


D.

Work centers signal previous work centers when they are ready for more work.


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions