APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)
Which of the following is the MOST significant flaw when using Federated Identity Management (FIM)?
Organization A provides scalable Information Technology (IT) infrastructure while Organization B provides security services to customers via Software as a Service (SaaS) model. Which document is used to express a set of intended actions between the organizations with respect to meeting the customers’ needs?
An organization’s security assessment recommended expanding its secure software development framework to include testing Commercial Off-The-Shelf (COTS) products before deploying those products in production. What is the MOST likely reason for this recommendation?
A customer of a financial Institution denies that a transaction occurred. Which of the following is used to provide evidence evidence that the customer performed the transaction?
Which of the following categories of web services testing describes correctness testing of web service security functionality?
A security analyst has been asked to build a data retention policy for a hospital. What is the FIRST action that needs to be performed in building this policy?
What function prevents unauthorized devices from gaining access to a network?
The project manager for a new application development is building a test framework. It has been agreed that the framework will Include penetration testing; however, the project manager is keen to identify any flaws prior to the code being ready for execution. Which of the following techniques BEST supports this requirement?
Which of the below represents the GREATEST cloud-specific policy and organizational risk?
A life cycle assessment (LCA) would be used to determine:
What is the MAIN purpose of risk and impact analysis?
An organization is migrating its access controls to a certificate-based authentication system.
What will need to be established to verify the identity of all users connecting to the network before rolling out the system?
Which of the following should recommendations from a Plan Of Action And Milestones (POA&M) be based on?
A champion is assigned to lead a threat modeling exercise. Which of the following will be the FIRST thing to consider?
Which of the following statements best characterizes enterprise resources planning (ERP) systems?
