New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

In a make-to-stock (MTS) environment, the master production schedule (MPS) Is usually a schedule of which of the following types of items?

Options:

A.

Phantom items


B.

Finished goods items


C.

Component/subassembly items


D.

Raw material items


Expert Solution
Questions # 107:

One of the findings in the recent security assessment of a web application reads: "It appears that security is an afterthought in the web application development process. It is recommended that security be addressed earlier in the development process." Which of these choices would BEST remediate this security finding?

Options:

A.

The installation and use of Dynamic Application Security Testing (DAST) software to test written code.


B.

The installation and use of Static Application Security Testing (SAST) software to test written code.


C.

The introduction of a continuous integration/continuous development pipeline to automate security into the software development change process.


D.

The introduction of a security training program for the developers.


Expert Solution
Questions # 108:

A low-cost provider strategy works best when which of the following conditions are met?

Options:

A.

Price competition among rivals is similar.


B.

Buyers are more price sensitive.


C.

There are many ways to achieve product differentiation.


D.

There are few industry newcomers.


Expert Solution
Questions # 109:

For a process that is outside its upper control limit (UCL), which of the following techniques would best be used to return the process under control?

Options:

A.

Conduct a Pareto analysis


B.

Plan-do-check-action (PDCA)


C.

Plot histograms


D.

Monitor control charts


Expert Solution
Questions # 110:

An organization’s computer incident response team PRIMARILY responds to which type of control?

Options:

A.

Detective


B.

Administrative


C.

Preventative


D.

Corrective


Expert Solution
Questions # 111:

Which of the following is an access control method that organizations can use to prevent unauthorized access?

Options:

A.

Bring Your Own Device (BYOD)


B.

Man-in-the-Middle (MITM)


C.

Token-based authentication


D.

Digital verification


Expert Solution
Questions # 112:

An organization is having bandwidth utilization issues due to unauthorized devices on the network. Which action should be taken to solve the problem?

Options:

A.

Disable all unused ports.


B.

Implement a Network Access Control (NAC) solution.


C.

Rate limit on access ports.


D.

Restrict access with an Access Control List (ACL).


Expert Solution
Questions # 113:

An organization is migrating some of its applications to the cloud. The Chief Information Security Officer (CISO) is concerned about the accuracy of the reports showing which application should be migrated and how many applications reside on each server. As a result, the CISO is looking to establish asset management requirements. Which of these elements should be considered part of asset management requirements?

Options:

A.

Threat modelling and discovery


B.

Configuration Management (CM) database


C.

Risk management framework


D.

Integration testing program


Expert Solution
Questions # 114:

An infrastructure team is setting up a wireless network for employees at a new location of the organization that is located near a very busy city transport hub. Which should be the MOST important antenna consideration with regard to securing the wireless network for the infrastructure team?

Options:

A.

Network's Service Set Identifier (SSID) visibility and vulnerabilities are not cast out too far.


B.

Parabolic antenna is used for signal convergence.


C.

Network efficiently allows maximum channel separation.


D.

Implement Wired Equivalent Privacy (WEP) encryption.


Expert Solution
Questions # 115:

An order winner during the growth stage of a product's life cycle is:

Options:

A.

variety.


B.

availability.


C.

dependability.


D.

price.


Expert Solution
Questions # 116:

An organization is updating an Application Programming Interface (API) to support requests coming from mobile applications distributed on public application stores. The API’s primary function is to supply confidential documents when users request them within the mobile application. Which approach would BEST respond to this use case?

Options:

A.

Require that the user supplies their credential to access confidential documents.


B.

Require a Virtual Private Network (VPN) connection to the organization's network to access confidential documents.


C.

Implement Security Assertion Markup Language (SAML) to validate the identity of the user requesting access to confidential documents.


D.

Implement Open Authorization (OAuth) 2.0 to require the users to request permission to access confidential documents.


Expert Solution
Questions # 117:

A large retail organization will be creating new Application Programming Interfaces (API) as part of a customer-facing shopping solution. The solution will accept information from users both inside and outside of the organization. What is the safest software development practice the team can follow to protect the APIs against Structured Query Language Injection (SQLi) attacks?

Options:

A.

Strictly validate all inputs for safe characters.


B.

Grant database access using the principle of least authority.


C.

Escape special characters in input statements.


D.

Use prepared input statements.


Expert Solution
Questions # 118:

A disadvantage of a capacity-lagging strategy may be:

Options:

A.

lack of capacity to fully meet demand.


B.

risk of excess capacity if demand does not reach forecast.


C.

a high cost of inventories.


D.

planned capital investments occur earlier than needed.


Expert Solution
Questions # 119:

An organization wants to ensure a risk does not occur. The action taken is to eliminate the attack surface by uninstalling vulnerable software. Which risk response strategy did the organization take?

Options:

A.

Accepting risk


B.

Avoiding risk


C.

Mitigating risk


D.

Transferring risk


Expert Solution
Questions # 120:

What does the Role-Based Access Control (RBAC) method define?

Options:

A.

What equipment is needed to perform


B.

How information is accessed within a system


C.

What actions the user can or cannot do


D.

How to apply the security labels in a system


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions