Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which protocol is the BEST option to provide authentication, confidentiality, and data integrity between two applications?

Options:

A.

File Transfer Protocol (FTP)


B.

Security Assertion Markup Language (SAML)


C.

Peer-To-Peer (P2P) communication


D.

Transport Layer Security (TLS)


Expert Solution
Questions # 122:

When implementing a data classification program, Which is MOST important for measuring businesss impact?

Options:

A.

Data classification program being rolled out in accordance with policies and procedures


B.

Measuring the size of the data set to understand scoping for compliance requirements


C.

The adverse effect of data leakage


D.

The early appointment of data custodians


Expert Solution
Questions # 123:

When resolving conflicts, which canon within the ISC2 Code of Ethics requires members to consider duties to principals and Individuals?

Options:

A.

Maintain the privacy and confidentiality of information obtained.


B.

Advance and protect the profession.


C.

Act honorably, honestly, justly, responsibly, and legally.


D.

Maintain competency in their respective fields.


Expert Solution
Questions # 124:

Which of the following design considerations would offer the BEST protection against unauthorized access to the facility?

Options:

A.

Allowing only one person to enter at a time


B.

Auditing access logs annually


C.

Limiting access to regular business hours only


D.

Establishing entry points from public areas only


Expert Solution
Questions # 125:

An organization is preparing to deploy Multi-Factor Authentication (MFA) to its workforce. The primary concerns of the organization are cost and security. The organization realizes that their entire workforce has computers and smartphones. Which of the following is BEST suited to address the organization's concerns?

Options:

A.

Soft token


B.

Short Message Service (SMS)


C.

Personal Identification Number (PIN) code


D.

Hard token


Expert Solution
Questions # 126:

A recent email-based malware breakout caused a significant volume of traffic and password spam account lockouts for an organization. Which BEST identifies compromised devices?

Options:

A.

Security Information And Event Management (SIEM)


B.

Network Intrusion Detection System (NIDS)


C.

Vulnerability scan


D.

Penetration test


Expert Solution
Questions # 127:

In a hospital, during a routine inspection performed by the computerized tomography device technical service, it is discovered that the values of radiation used in scans are one order of magnitude higher than the default setting. If the system has had an unauthorized access, which one of the following concepts BEST describes which core principle has been compromised?

Options:

A.

Confidentiality


B.

Availability


C.

Cybersecurity


D.

Integrity


Expert Solution
Questions # 128:

A cloud-based web application requires the use of cryptographic keys to encrypt user-uploaded files at rest. Where is the safest place to store these cryptographic keys?

Options:

A.

Keys are stored in a password protected zip file.


B.

Keys are stored with source code in a revision control system.


C.

Keys are stored in a cloud-based file storage system.


D.

Keys are stored in a central, internal key management system.


Expert Solution
Questions # 129:

An effective approach to projecting requirements for materials with long lead times Includes which of the following options?

Options:

A.

Initiate a multilevel master schedule.


B.

Use phantom bills of materials (BOMs).


C.

Increase the level of safety stock.


D.

Decrease the planning horizon.


Expert Solution
Questions # 130:

An organization wants to establish an information security program and has assigned a security analyst to put it in place. What is the NEXT step?

Options:

A.

Develop and implement an information security standards manual.


B.

security control review.


C.

Perform a risk assessment to establish baseline security.


D.

Implement security access control software.


Expert Solution
Questions # 131:

A security specialist is responsible to improve the security awareness program of a medium-sized organization and is tasked to track blocked targeted attacks. Which of the following BEST describes the outcome of the security specialist’s use of metrics for this task?

Options:

A.

An increase in reported changes in click percentages that aligns with a decrease in the number of phishes and incidents reported.


B.

A decrease in reported suspicious activity that aligns with an increase in detection of malware and DNS queries to blocked sites.


C.

An increase in reported suspicious activity that aligns with a decrease in detection of malware and DNS queries to blocked sites.


D.

A decrease in reported changes in click percentages that aligns with an increase in the number of phishes and incidents reported.


Expert Solution
Questions # 132:

Which of the following BEST describes how an Application Programming Interface (API) gateway fits into an application architecture?

Options:

A.

An API gateway is a specialized reverse proxy that can make different APIs appear as if they are a single API.


B.

An API gateway inspects traffic and blocks many common attacks against Hypertext Transfer Protocol (HTTP) web services.


C.

An API gateway ensures that a Denial-Of-Service (DoS) attack cannot occur within the application.


D.

An API gateway monitors traffic within internal networks and ensures suspicious patterns are detected on any API.


Expert Solution
Questions # 133:

A life cycle assessment (LCA) would be used to determine:

Options:

A.

the length of a long-term agreement.


B.

how an Item should be scheduled.


C.

environmental aspects and impacts.


D.

If risk pooling would reduce inventory investment.


Expert Solution
Questions # 134:

A company selling seasonal products is preparing their sales and operations plan for the coming year. Their current labor staffing is at the maximum for their production facility and cannot meet the forecasted demand. The business plan shows they do not have the financial capability to add to the production facility. Which of the following actions would be most appropriate?

Options:

A.

Uselevel production planning and investigate subcontracting to meet the extra demand.


B.

Usechaseproduction planningand only take the orders that can be produced In the highdemand season.


C.

Usehybridproduction planningto save labor costs and inventory costs in the low demand season.


D.

Usehybridproduction planningand reduce the size of the customer base during the highdemand season.


Expert Solution
Questions # 135:

An organization starts to develop a drone inspection and defect detection system includes different subsystems running at different clouds from different service providers. During the architectural design phase, which security architecture principle should be the MOST important for the security engineer to apply?

Options:

A.

Security by design


B.

Default deny


C.

Security by default


D.

Security before design


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions