New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the APICS CPIM CPIM-8.0 Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
Questions # 121:

Check sheets can be used to:

Options:

A.

determine the frequency of a defect and the time period between occurrences.


B.

provide a quick method to identify if possible defects exist.


C.

allow improvement teams to see if action items are being completed on time.


D.

provide an indication of correlation between defects.


Expert Solution
Questions # 122:

An organization provides customer call center operations for major financial services organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?

Options:

A.

Control Objectives For Information And Related Technology (COBIT) and Health Insurance Portability And Accountability Act (HIPAA) frameworks


B.

National Institute Of Standards And Technology (NIST) and International Organization For Standardization (ISO) frameworks


C.

Frameworks specific to the industries and locations clients do business in


D.

Frameworks that fit the organization’s risk appetite, as cybersecurity does not vary industry to industry


Expert Solution
Questions # 123:

In an organization that develops aircrafts for military usage, where will the security team focus its efforts to ensure the organization’s data remains confidential?

Options:

A.

Technology to monitor the use and transfer of sensitive data


B.

User awareness training


C.

De-identification and sanitization of sensitive data


D.

Data breach insurance


Expert Solution
Questions # 124:

A hot Disaster Recovery (DR) data center is the victim of a data breach. The hackers are able to access and copy 10GB of clear text confidential information. Which of the following could have decreased the amount of exposure from this data breach?

Options:

A.

Encryption in transit


B.

Layer 7 filtering


C.

Encryption at rest


D.

Password hashing


Expert Solution
Questions # 125:

Which of the following MUST exist for an activity to be considered an audit?

Options:

A.

An auditor that is in no way employed, connected or associated to the organization being audited


B.

Stored Personally Identifiable Information (PII) that an organization has a legal obligation to protect


C.

A predefined standard and systematic approach to test the application of that standard


D.

A certified member of a professional body qualified in the area of inspection


Expert Solution
Questions # 126:

An organization is aiming to be System and Organization Controls (SOC) 2 certified by an audit organization to demonstrate its security and availability maturity to its sub service organizations. Which type of audit does this engagement BEST describe?

Options:

A.

Forensic audit


B.

Third-party audit


C.

Location audit


D.

Internal audit


Expert Solution
Questions # 127:

To ensure the quality of its newly developed software, an organization is aiming to deploy an automated testing tool that validates the source code. What type of testing BEST supports this capability?

Options:

A.

Network vulnerability scanning


B.

Dynamic Application Security Testing (DAST)


C.

Static Application Security Testing (SAST)


D.

Fuzz parsing


Expert Solution
Questions # 128:

Remote sensors have been deployed at a utility site to reduce overall response times for maintenance staff supporting critical infrastructure. Wireless communications are used to communicate with the remote sensors, as it is the most cost-effective method and minimizes risk to public health and safety. The utility organization has deployed a Host-Based Intrusion Prevention System (HIPS) to monitor and protect the sensors. Which statement BEST describes the risk that is mitigated by utilizing this security tool?

Options:

A.

Malware on the sensor


B.

Denial-Of-Service (DoS)


C.

Wardriving attack


D.

Radio Frequency (RF) interference


Expert Solution
Questions # 129:

What is the MAIN reason security is considered as part of the system design phase instead of deferring to later phases?

Options:

A.

To prevent the users from performing unauthorized actions during the testing or operational phases


B.

To ensure complexity introduced by security design is addressed in the beginning stages


C.

To reduce the overall cost of incorporating security in a system


D.

To prevent the system from being tampered with in the future


Expert Solution
Questions # 130:

The question below is based on the following alternative schedules for a lot of 1,200.

A company works 8-hour, single-shift days. Setups are 4 hours for Operation 20 and 4 hours for Operation 40. Each operation has multiple machines available.

Which of the following statements is correct?

Options:

A.

Operation overlapping results in reduced total setup costs.


B.

Operation overlapping results in reduced total span time.


C.

Lot splitting results in the shortest overall lead time.


D.

Lot splitting results in reduced total setup costs.


Expert Solution
Questions # 131:

An organization decides to conduct penetration testing. Senior management is concerned about the potential loss of information through data exfiltration. The organization is currently preparing a major product launch that is time-sensitive. Which of the following methods of testing is MOST appropriate?

Options:

A.

Gray box


B.

Green box


C.

Black box


D.

White box


Expert Solution
Questions # 132:

Small, independent demands for components and subassemblies typically arise from which of the following sources?

Options:

A.

Warehouse orders


B.

Repair and service requirements


C.

Original equipment manufacturers


D.

Scrap allowance


Expert Solution
Questions # 133:

What BEST describes the end goal of a Disaster Recovery (DR) program?

Options:

A.

Review the status of mission-critical applications.


B.

Prevent business interruption.


C.

Continue business operations during a contingency.


D.

Restore normal business operations.


Expert Solution
Questions # 134:

A security administrator of a large organization is using Mobile Device Management (MDM) technology for protecting mobile devices. Which of the following is the BEST way to ensure that only company-approved mobile software can be deployed?

Options:

A.

Application blacklisting


B.

Application inventory


C.

Application digital signature


D.

Controlled app store


Expert Solution
Questions # 135:

A newer automotive supplier has not fully developed its information technology (IT) systems. The supplier has Just received a contract from a large automotive manufacturer which requires the supplier to use electronic data interchange (EDI) transactions for receiving orders, sending advance ship notices (ASNs), and receiving invoice payments. What strategy can the supplier adopt to immediately meet the EDI requirements?

Options:

A.

Select, install, and implement EDI software.


B.

Use current third-party logistics provider (3PL) to handle the EDI transactions.


C.

Claim hardship and ask the automotive manufacturer for a waiver.


D.

Negotiate using email as an alternative with the customer.


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions