Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

APICS Certified in Planning and Inventory Management (CPIM 8.0) CPIM-8.0 Question # 105 Topic 11 Discussion

APICS Certified in Planning and Inventory Management (CPIM 8.0) CPIM-8.0 Question # 105 Topic 11 Discussion

CPIM-8.0 Exam Topic 11 Question 105 Discussion:
Question #: 105
Topic #: 11

During a security incident investigation, a security analyst discovered an unauthorized module was compiled into an application package as part of the application assembly phase. This incident occurred immediately prior to being digitally signed and deployed using a deployment pipeline.

Which of the following security controls would BEST prevent this type of incident in the future?


A.

Invoke code repository vulnerability scanning on a regularly scheduled basis.


B.

Implement Role-Based Access Controls (RBAC) in each component of the deployment pipeline.


C.

Encrypt the application package after being digitally signed.


D.

Implement a software Bill of Materials (BOM) for each application package.


Get Premium CPIM-8.0 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.