New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which of the following methods most likely Introduces a temporary variance between the inventory balance and the inventory record?

Options:

A.

Inventory write-off


B.

Backflushing


C.

Cycle count


D.

Kanban


Expert Solution
Questions # 92:

If all other factors remain the same, when finished goods inventory investment is increased, service levels typically will:

Options:

A.

remain the same.


B.

increase in direct (linear) proportion.


C.

increase at a decreasing rate.


D.

increase at an increasing rate.


Expert Solution
Questions # 93:

An organization’s external auditors have issued a management letter identifying significant deficiencies related to the effectiveness of the previous year’s global access certification. The organization wants to move from a department-based access control system to a Role-Based Access Control (RBAC) system. In addition to quickly and securely provisioning users by granting membership into predefined and approved roles, which of these presents the BEST reason to do so?

Options:

A.

The organization can implement both mandatory and dynamic access controls, except where they would be in conflict.


B.

The organization can clone roles, saving time and granting broad access to persons within the same department.


C.

The organization can give a person holding multiple roles the appropriate levels of access to specific data for each role.


D.

The organization can implement both static and dynamic access controls, adjusting them to fit any individual’s access needs.


Expert Solution
Questions # 94:

A large volume of outbound Transmission Control Protocol (TCP) connections from the same source Internet Protocol (IP) address was observed at a satellite office firewall. Which of the following is the MOST likely explanation?

Options:

A.

There is only one managed switch port device on the satellite network.


B.

The command and control server has shut down all but one host.


C.

The network hosts are behind a Network Address Translation (NAT) device.


D.

The malware has shut down all but one host used for command and control.


Expert Solution
Questions # 95:

Which security concept states that a subject (user, application, or asset) be given only the access needed to complete a task?

Options:

A.

Discretionary Access Control (DAC)


B.

Principle of least privilege


C.

Need to know


D.

Role-Based Access Control (RBAC)


Expert Solution
Questions # 96:

In a large organization, the average time for a new user to receive access is seven days. Which of the following is the BEST enabler to shorten this time?

Options:

A.

Implement a self-service password management capability


B.

Increase system administration personnel


C.

Implement an automated provisioning tool


D.

Increase authorization workflow steps


Expert Solution
Questions # 97:

Given the information below, reducing which measure by 10% would contribute most to shortening the cash-to-cash cycle time?

Question # 97

Options:

A.

Accounts receivable


B.

Inventory value


C.

Accounts payable


D.

Cost of capital


Expert Solution
Questions # 98:

An organization is attempting to address the security risk introduced by employees writing down door entry passcodes. Which of the following security measures BEST mitigates this risk?

Options:

A.

Privileged Access Management (PAM) policy


B.

Multi-Factor Authentication (MFA)


C.

Video log monitoring


D.

Notification alerts


Expert Solution
Questions # 99:

Which of the following BEST describes the responsibility of an information System Security Officer?

Options:

A.

Establish the baseline, architecture, and management direction and ensure compliance


B.

Ensure adherence to physical security policies and procedures


C.

Direct, coordinate, plan, and organize information security activities


D.

Ensure the availability of the systems and their contents


Expert Solution
Questions # 100:

What General Data Protection Regulation (GDPR) principle says that data should be collected lawfully and with the person’s consent?

Options:

A.

Legitimate data collection


B.

Limitation of use


C.

Collection Categorization


D.

Collection limitation


Expert Solution
Questions # 101:

An support technician is contacted by an imposter claiming to be a supervisor and is asked specifically to perform a task that violates the organization’s security policies. What type of attack is this?

Options:

A.

Spoofing


B.

Spear phishing


C.

Piggybacking


D.

Insider threat


Expert Solution
Questions # 102:

The time spent In queue by a specific manufacturing job is determined by which of the following factors related to the order?

Options:

A.

Lot size


B.

Priority


C.

Setup time


D.

Run time


Expert Solution
Questions # 103:

One of the most useful tools for analyzing the sustainable footprint is:

Options:

A.

process mapping.


B.

lean six sigma.


C.

SWOT analysis.


D.

ISO 9000.


Expert Solution
Questions # 104:

Before securing a email system using OpenPGP in an organization, Which of the following actions MUST be performed?

Options:

A.

Definition of anti-spam policies


B.

Removal of previous email servers


C.

Definition of key management policies


D.

Backup of email messages and folders


Expert Solution
Questions # 105:

A manufacturing facility uses common wireless technologies to communicate. The head of security is concerned about eavesdropping by attackers outside the perimeter fence. The distance between the facility and fence is at least 300 feet (100 m). Which of the following wireless technologies is MOST likely to be available to an attacker outside the fence?

Options:

A.

ZigBee


B.

Radio-Frequency Identification (RFID)


C.

Long-Term Evolution (LTE)


D.

Bluetooth


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions