Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Risk pooling would work best for items with:

Options:

A.

low demand uncertainty and short lead times.


B.

low demand uncertainty and long lead times.


C.

high demand uncertainty and short lead times.


D.

high demand uncertainty and long lead times.


Expert Solution
Questions # 122:

It takes an average of 3 hours to set up a model and 1 hour to run, but depending on the complexity of the models, the setup time can be significantly different. Last week. 2 modelers were working on different projects. Each worked 40 hours. One modeler finished 5 models a day, and the other finished 1 model a day. What was the demonstrated capacity last week?

Options:

A.

25models


B.

15models


C.

10models


D.

30models


Expert Solution
Questions # 123:

Which Open Systems Interconnection (OSI) layer is concerned with Denial-Of-Service (DoS) SYN flood attacks?

Options:

A.

Data


B.

Physical


C.

Network


D.

Transport


Expert Solution
Questions # 124:

Which of the following methods would be appropriate for forecasting the demand for a product family when there is a significant trend and seasonality in the demand history?

Options:

A.

Econometric models


B.

Computer simulation


C.

Time series decomposition


D.

Weighted moving average


Expert Solution
Questions # 125:

An organization has hired a new auditor to review its critical systems infrastructure for vulnerabilities. Which of the following BEST describes the methodology the auditor will use?

Options:

A.

Select an appropriate sample size of changes to production servers related to critical systems within the audit period and ensure they adhere to documented policies and standards.


B.

Select an appropriate sample size of recently deployed servers and review their configuration files against the organization's policies and standards.


C.

Select all production servers related to critical systems and review their configuration files against the organization's policies and standards.


D.

Select an appropriate sample size of changes to recently deployed servers within the audit period and ensure they adhere to documented policies and standards.


Expert Solution
Questions # 126:

An organization has deployed an Identity And Access Management (IAM) tool and is expanding their information governance program. Which of the following would BEST be included in the governance for IAM?

Options:

A.

Employ password masking, obfuscation, and tokenization and automate account updates based on human resources reporting.


B.

Implementing Multi-Factor Authentication (MFA) and account lookout controls.


C.

Create and enforce a strong password policy and implementing security awareness training for all users.


D.

Control physical access to the IAM system and implementing Data Loss Prevention (DPL) for credentials.


Expert Solution
Questions # 127:

An organization is preparing for a natural disaster, and management is creating a Disaster Recovery Plan (DRP). What is the BEST input for prioritizing the restoration of vital Information Technology (IT) services?

Options:

A.

By priority as defined by the critical assets list


B.

The latest Continuity Of Operations Plan (COOP)


C.

Senior management assessment and approval


D.

The latest Business Impact Analysis (BIA)


Expert Solution
Questions # 128:

When a third-party needs to receive privileged information, which of the following would be the BEST to

transport the data?

Options:

A.

Layer 2 Tunneling Protocol


B.

Encrypted at rest


C.

Virtual Private Network (VPN)


D.

Encrypted in transit


Expert Solution
Questions # 129:

The project manager has updated the project steering committee that a security vulnerability was found after applying the system security baseline, and remediation has been completed to close the vulnerability. What is the BEST next step for the project?

Options:

A.

Update the security baseline and continue with the next project task.


B.

Proceed with the next project task to meet the project deadlines.


C.

Obtain approval from the project steering, committee to revise the system security baseline.


D.

Create a change request for the system baseline revision.


Expert Solution
Questions # 130:

Which of the following can allow an attacker to bypass authentication?

Options:

A.

Response tampering


B.

Machine enumeration


C.

User agent manipulation


D.

Social engineering


Expert Solution
Questions # 131:

Which of the following MUST exist for an activity to be considered an audit?

Options:

A.

An auditor that is in no way employed, connected or associated to the organization being audited


B.

Stored Personally Identifiable Information (PII) that an organization has a legal obligation to protect


C.

A predefined standard and systematic approach to test the application of that standard


D.

A certified member of a professional body qualified in the area of inspection


Expert Solution
Questions # 132:

An organizational policy requires that any data from organization-issued devices be securely destroyed before disposal. Which method provides the BEST assurance of data destruction?

Options:

A.

Incinerating


B.

Reformatting


C.

Degaussing


D.

Erasing


Expert Solution
Questions # 133:

An organization is transitioning from a traditional server-centric infrastructure to a cloud-based Infrastructure. Shortly after the transition, a major breach occurs to the organization's databases. In an Infrastructure As A Service (IaaS) model, who would be held responsible for the breach?

Options:

A.

The database vendor


B.

The third-party auditor


C.

The organization


D.

The Cloud Service Provider (CSP)


Expert Solution
Questions # 134:

What should an organization do to prepare for Disaster Recovery (DR) efforts?

Options:

A.

Create a list of key personnel


B.

Create a list of decommissioned hardware


C.

Review tabletop exercises


D.

Replicate access logs


Expert Solution
Questions # 135:

An organization is considering options to outsource their Information Technology (IT) operations. Although they do not sell anything on the Internet, they have a strong requirement in uptime of their application. After the offerings received by the Cloud Service Provider (CSP), the IT manager decided it was mandatory to develop processes to continue operations without access to community or public cloud-based applications. Which of the following arguments MOST likely led the IT manager to make this decision?

Options:

A.

Circumstances may force a cloud provider to discontinue operations.


B.

The need to develop alternative hosting strategies for applications deployed to the cloud.


C.

Most cloud services offerings are unique to each provider and may not be easily portable.


D.

Integrity and confidentiality are not ensured properly on the most cloud service offerings.


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions