Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
Questions # 106:

An organization has received the results of their network security risk assessment. What is the BEST course of action for the organization to take in response to the analyzed report findings?

Options:

A.

Hire a security consulting firm with specialized expertise to fix all the issues on the report and ensure the organization’s system are secure.


B.

Work with the organization’s legal team to ensure their cyber liability insurance policy will fully cover the costs of any breach related to the network risk assessment findings.


C.

Create an organizational risk response team and assign them the task of remediating all the issues or identifying and implementing compensating controls.


D.

Accept the risk of the issues within the organization’s risk tolerance and identify responses for the remainder of the issues.


Expert Solution
Questions # 107:

An organization provides customer call center operations for major financial services organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?

Options:

A.

Control Objectives For Information And Related Technology (COBIT) and Health Insurance Portability And Accountability Act (HIPAA) frameworks


B.

National Institute Of Standards And Technology (NIST) and International Organization For Standardization (ISO) frameworks


C.

Frameworks specific to the industries and locations clients do business in


D.

Frameworks that fit the organization’s risk appetite, as cybersecurity does not vary industry to industry


Expert Solution
Questions # 108:

Open Authorized (OAuth) has been chosen as technology to use across applications in the enterprise. Which of the following statements is TRUE about an OAuth token?

Options:

A.

Does not specify a time interval


B.

Can be used for authentication


C.

Can be used across multiple sites


D.

Specifies what information can be accessed


Expert Solution
Questions # 109:

A consultant has been engaged to support the team in analyzing why the development of a new software product has slipped schedule by a year. The consultant discovered an increase of the functionality requirements due to the failure of the asset tracking program. Which of the following BEST describes which system lifecycle element is impacted?

Options:

A.

Stakeholder identification


B.

Vision statement


C.

Operational efficiency


D.

Solution boundary


Expert Solution
Questions # 110:

A Software As A Service (SaaS) solution was compromised due to multiple missing security controls. The SaaS deployment was rushed and the Software Development Life Cycle (SDLC) was not followed. Which SDLC phase would have been MOST effective in preventing this failure?

Options:

A.

Design


B.

Requirements


C.

Maintenance


D.

Testing


Expert Solution
Questions # 111:

What are the FIRST two steps an organization should conduct to classify its assets?

Options:

A.

Define user requirements and collate existing inventories


B.

Categorize assets and set minimum security controls


C.

Conduct an inventory of assets and determine the owners


D.

Obtain senior management buy-in and conduct a risk assessment


Expert Solution
Questions # 112:

Which of the following BEST describes web service security conformance testing as it relates to web services security testing?

Options:

A.

Generally includes threat modeling, requirements risk analysis, and security modeling


B.

Focused on ensuring that the security functionally performed by a web service meets its stated requirements


C.

Ensure individual protocol implementations adhere to the relevant published standards


D.

Focused on the smallest unit of the web service application, apart from the rest of the application


Expert Solution
Questions # 113:

Which of the following security features is utilized to validate both user credentials and the health of the client device on a network?

Options:

A.

Intrusion Detection System (IDS)


B.

Internet Protocol Security (IPSec)


C.

Virtual Private Network (VPN)


D.

Network Access Control (NAC)


Expert Solution
Questions # 114:

As a result of a fault at a cloud service provider’s data center, the customer accounts of a utility organization were corrupted. Under the European Union’s (EU) General Data Protection Regulation (GDPR), which entity bears responsibility for resolving this?

Options:

A.

Data steward


B.

Data processor


C.

Data controller


D.

Data custodian


Expert Solution
Questions # 115:

Which of the following is the benefit of using Security Content Automation Protocol (SCAP) version 2 on endpoint devices?

Options:

A.

Apply patches to endpoints across the enterprise.


B.

Use software configuration management for endpoints.


C.

Monitor endpoints by collecting software inventory and configuration settings.


D.

Enforce Two-Factor Authentication (2FA) on endpoints across the enterprise.


Expert Solution
Questions # 116:

The development team wants new commercial software to Integrate into the current systems. What steps can the security office take to ensure the software has no vulnerabilities?

Options:

A.

Request a copy of the most recent System and Organization Controls (SOC) report and/or most recent security audit reports and any vulnerability scans of the software code from the vendor.


B.

Purchase the software, deploy it in a test environment, and perform Dynamic Application Security Testing (DAST) on the software.


C.

Request a software demo with permission to have a third-party penetration test completed on it.


D.

Ask the development team to reevaluate the current program and have a toolset developed securely within the organization.


Expert Solution
Questions # 117:

A statistical safety stock calculation would be appropriate for:

Options:

A.

components used in multiple end items.


B.

new products at time of introduction.


C.

end items with stable demand.


D.

supply-constrained raw materials.


Expert Solution
Questions # 118:

An organization is updating an Application Programming Interface (API) to support requests coming from mobile applications distributed on public application stores. The API’s primary function is to supply confidential documents when users request them within the mobile application. Which approach would BEST respond to this use case?

Options:

A.

Require that the user supplies their credential to access confidential documents.


B.

Require a Virtual Private Network (VPN) connection to the organization's network to access confidential documents.


C.

Implement Security Assertion Markup Language (SAML) to validate the identity of the user requesting access to confidential documents.


D.

Implement Open Authorization (OAuth) 2.0 to require the users to request permission to access confidential documents.


Expert Solution
Questions # 119:

A security engineer developing software for a professional services organization has a requirement that users cannot have concurrent access to data of clients that are competitors. Which security model should the security engineer implement to meet this requirement?

Options:

A.

Brewer-Nash


B.

Bell-LaPadula


C.

Biba Integrity


D.

Clark Wilson


Expert Solution
Questions # 120:

What is the total load requirement for this work center based on the following data?

Question # 120

Options:

A.

1.326


B.

1.525


C.

1,533


D.

2,880


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions