Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which of the following benefits typically will be realized when switching from a functional to a cellular layout?

Options:

A.

Equipment utilization will be higher.


B.

Quality inspections will be reduced.


C.

Capital expenditures will be reduced.


D.

Products will have faster throughput.


Expert Solution
Questions # 107:

What is the MOST beneficial principle of threat modeling?

Options:

A.

To focus on specific adversaries, assets, or techniques


B.

To improve the security and privacy of a system through early and frequent analysis


C.

To create meaningful outcomes when they are of value to external agencies


D.

To create a single threat model representation as multiple models may be inconsistent


Expert Solution
Questions # 108:

An organization’s system engineer arranged a meeting with the system owner and a few major stakeholders to finalize the feasibility analysis for a new application.

Which of the following topics will MOST likely be on the agenda?

Options:

A.

Results of the preliminary cost-benefit studies


B.

Design of the application system and database processes


C.

Communication of procedures and reporting requirements


D.

Identification of inter-application dependencies


Expert Solution
Questions # 109:

Which of the following is a component of the Clark-Wilson model?

Options:

A.

Enforcement rules


B.

Transformation procedures


C.

Data classifications


D.

Integrity labels


Expert Solution
Questions # 110:

A company's primary performance objective Is flexibility. Which of the following measurements is most important?

Options:

A.

Labor productivity


B.

Schedule adherence


C.

Machine changeover time


D.

Cycle time


Expert Solution
Questions # 111:

An organization has network services in a data center that are provisioned only for internal use, and staff at offices and staff working from home both use the services to store sensitive customer data. The organization does not want the Internet Protocol (IP) address of the service to receive traffic from users not related to the organization. Which technology is MOST useful to the organization in protecting this network?

Options:

A.

Intrusion Detection System (IDS)


B.

Domain Name System (DNS)


C.

Network Address Translation (NAT)


D.

Virtual Private Network (VPN)


Expert Solution
Questions # 112:

What MUST be completed before developing physical security controls?

Options:

A.

Develop a comprehensive security policy


B.

Provide the annual security awareness training


C.

Contract for licensed and bonded security force


D.

Perform a physical security audit


Expert Solution
Questions # 113:

To ensure the quality of its newly developed software, an organization is aiming to deploy an automated testing tool that validates the source code. What type of testing BEST supports this capability?

Options:

A.

Network vulnerability scanning


B.

Dynamic Application Security Testing (DAST)


C.

Static Application Security Testing (SAST)


D.

Fuzz parsing


Expert Solution
Questions # 114:

Which authentication method is used by an email server to verify that a sender’s Internet Protocol (IP) address is authorized to send messages by the sending domain?

Options:

A.

DomainKeys Identified Mail (DKIM)


B.

Sender policy framework


C.

Pointer record


D.

Secure/Multipurpose Internet Mail Extensions (S/MIME)


Expert Solution
Questions # 115:

What is the PRIMARY benefit an organization obtains by cybersecurity framework to their cybersecurity program?

Options:

A.

A common set of security capabilities


B.

A common language and methodology


C.

A structured cybersecurity program


D.

A structured risk management process


Expert Solution
Questions # 116:

An organization needs a firewall that maps packets to connections and uses Transmission Control Protocol/Internet Protocol (TCP/IP) header fields to keep track of connections. Which type of firewall will be recommended?

Options:

A.

Network


B.

Stateless


C.

Stateful


D.

Packet


Expert Solution
Questions # 117:

Which of the following factors is the MOST important consideration for a security team when determining whether cryptographic erasure can be used for disposal of a device?

Options:

A.

If the data on the device exceeds what cryptographic erasure can safely process


B.

If the methods meet the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001


C.

If security policies allow for cryptographic erasure based on the data stored on the device


D.

If the device was encrypted prior using cipher block chaining


Expert Solution
Questions # 118:

A company implementing a localized multi-country strategy to increase market share should engage in which of the following actions?

Options:

A.

Sell different product versions in different countries under different brand names.


B.

Sell the same products under the same brand name worldwide.


C.

Locate plants on the basis of maximum location advantage.


D.

Use the best suppliers regardless of geographic location.


Expert Solution
Questions # 119:

An audit of antivirus server reports shows a number of workstations do not have current signatures installed. The organization security standard requires all systems to have current antivirus signatures. What distinct part of the audit finding did the auditor fail to include?

Options:

A.

Criteria


B.

Condition


C.

Effect


D.

Cause


Expert Solution
Questions # 120:

A financial organization is using an internally developed application. The internal software development team has to adhere to the coding standards of the Software Development Cycle (SDLC). For applications whose functionality is exposed through the public Internet, this requirement consists of testing the application for potential vulnerabilities before it is deployed into production. What is the BEST type of vulnerability test to perform?

Options:

A.

Web application unit test


B.

Online application development test


C.

Web application penetration test


D.

Online application assurance test


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions