Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 2 / 13
Total 606 questions

After a recent cybersecurity incident, a manufacturing organization is interested in further hardening its Identity and Access Management (IAM) solution. Knowing that the organization limits the use of personal devices in the facility, which could BEST be implemented to enhance the manufacturing organization ' s IAM solution?

A.

Enhanced background checks

B.

Mobile Multi-Factor Authentication (MFA) application

C.

Biometric system

D.

Personal Identification Number (PIN) code

The project manager for a new application development is building a test framework. It has been agreed that the framework will Include penetration testing; however, the project manager is keen to identify any flaws prior to the code being ready for execution. Which of the following techniques BEST supports this requirement?

A.

System vulnerability scans

B.

Database injection tests

C.

System reliability tests

D.

Static source code analysis

The planned channels of Inventory disbursement from one or more sources to field warehouses are known as:

A.

a supply chain community.

B.

interplant demand.

C.

a bill of distribution.

D.

logistics data interchange (LDI).

Employees at an organization use web based services provided by an affiliate. Which of the following risks is unique to this situation?

A.

Watering hole attack

B.

Man-In-Middle (MITM) attack

C.

Cross-Site Request Forgery (CSRF) attack

D.

PowerShell attack

According to best practice, at which step in the system lifecycle shall a security professional begin involvement?

A.

Project initiation and planning

B.

Functional requirements and definition

C.

System design specification

D.

Build and document

Which of the following is the MAIN element in achieving a successful security strategy?

A.

Senior management commitment

B.

Security standards adoption

C.

Effective training and education

D.

Effective cost/benefit analysis

The Chief Information Security Officer (CISO) for an international organization with offices operating globally has been tasked with developing a new data encryption policy that can be applied to all areas of the business. What is the MOST important factor that must be considered?

A.

Organization ' s security policy and standards

B.

How data will be stored and accessed

C.

Regulatory and compliance requirements

D.

Where data will be stored and accessed

In an ABC analysis, “A” items generally represent about 20% of the:

A.

Cost of goods sold (COGS).

B.

Inventory value.

C.

Inventory items.

D.

Gross annual sales.

Before securing a email system using OpenPGP in an organization, Which of the following actions MUST be performed?

A.

Definition of anti-spam policies

B.

Removal of previous email servers

C.

Definition of key management policies

D.

Backup of email messages and folders

An information security professional is enhancing the organization ' s existing information security awareness program through educational posters. Which of the following is the MOST effective location for poster placement?

A.

In a secure room inside the office

B.

Beside the copy machine

C.

Outside the office

D.

In the human resources area

When the discrete available-to-promise (ATP) method is used, the master production receipt quantity is committed to:

A.

any request for shipment prior to the planning time fence.

B.

any request for shipment prior to the demand time fence (DTF).

C.

requests only for shipment before the next master production schedule (MPS) receipt.

D.

requests only for shipment in the period of the receipt.

Which of the following can allow an attacker to bypass authentication?

A.

Response tampering

B.

Machine enumeration

C.

User agent manipulation

D.

Social engineering

Which of the following states of data becomes MOST important to protect as organizations continue to transition toward Application Programming Interface (API)-based solutions?

A.

Data at rest

B.

Data in use

C.

Data in transit

D.

Data on the client machine

What is the MAIN reason security is considered as part of the system design phase instead of deferring to later phases?

A.

To ensure complexity introduced by security design is addressed in the beginning stages.

B.

To reduce the overall cost of incorporating security in a system.

C.

To prevent the system from being tampered with in the future.

D.

To prevent the users from performing unauthorized actions during the testing or operational phases.

A distribution requirements planning (DRP) system has which of the following characteristics?

A.

It treats items in distribution centers (DCs) as dependent demand.

B.

It facilitates the use of pull systems.

C.

It uses standard material requirements planning (MRP) logic.

D.

It uses statistical order point techniques to plan inventory replenishment.