Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 3 / 13
Total 606 questions

Bad actors with little expense can easily make calls. Which social engineer strategy is a telecommunications ONLY risk concept?

A.

Pretexting

B.

Diversion theft

C.

Phreaking

D.

Baiting

Which if the following is the FIRST control step in provisioning user rights and privileges?

A.

Identification

B.

Authorization

C.

Authentication

D.

Confidentiality

Which of the following should recommendations from a Plan Of Action And Milestones (POA & M) be based on?

A.

Continuous monitoring

B.

Change Control Board (CCB) coordination

C.

Risk acceptance

D.

Root cause analysis

Which of the following is the fundamental difference between finite loading and other capacity planning approaches?

A.

It is highly dependent on advanced computer software to function effectively.

B.

It is only managed by shop floor supervisors.

C.

It can use historical information to drive decision-making processes.

D.

It considers adjustments to plans based on planned capacity utilization.

Which of the following is the BEST option for a security director to use in order to mitigate the risk of inappropriate use of credentials by individuals with administrative rights?

A.

Have administrators sign appropriate access agreements.

B.

Define the Acceptable Use Policy (AUP) for administrators.

C.

Have administrators accept a Non-Disclosure Agreement.

D.

Perform extensive background checks on administrators.

Open Authorized (OAuth) has been chosen as technology to use across applications in the enterprise. Which of the following statements is TRUE about an OAuth token?

A.

Does not specify a time interval

B.

Can be used for authentication

C.

Can be used across multiple sites

D.

Specifies what information can be accessed

Capacity requirements planning (CRP) is applicable primarily In companies operating In an environment where:

A.

backlog is very low.

B.

the status of work orders is disregarded.

C.

lean principles are used.

D.

material requirements planning (MRP) is used.

An agency has the requirement to establish a direct data connection with another organization for the purpose of exchanging data between the agency and organization systems. There is a requirement for a formal agreement between the agency and organization. Which source of standards can the system owners use to define the roles and responsibilities along with details for the technical and security requirements?

A.

International Organization For Standardization (ISO)

B.

European Committee for Electrotechnical Standardization

C.

Caribbean Community Regional Organization for Standards and Quality

D.

Institute of Electrical and Electronics Engineers (IEEE)

Which of the following inventory management techniques is most responsive to changes in demand levels?

A.

Two-bin system

B.

Periodic review system

C.

Cycle counting

D.

ABC classification

For a process that is outside its upper control limit (UCL), which of the following techniques would best be used to return the process under control?

A.

Conduct a Pareto analysis

B.

Plan-do-check-action (PDCA)

C.

Plot histograms

D.

Monitor control charts

A company’s Marketing and Sales departments have identified an opportunity to develop a new market for a product family and requested an increase in the production plan. Which of the following actions would be most appropriate to account for the new market opportunity?

A.

Increase the production plan as requested.

B.

Regenerate the material requirements plan.

C.

Regenerate the master production schedule (MPS).

D.

Present the proposal at the executive sales and operations (S & OP) meeting.

Which of the following is the MOST effective approach to reduce the threat of rogue devices being introduced to the internal network?

A.

Authorize connecting devices

B.

Authenticate connecting devices

C.

Disable unauthorized devices

D.

Scan connecting devices

Which of the following provides that redundancy and failover capabilities are built into a system to maximize its uptime?

A.

Offsite backup

B.

High availability

C.

Diverse routing

D.

System mirroring

In order for an organization to mature their data governance processes to ensure compliance, they have created a data classification matrix.

What are the next BEST activities to build on this completed work?

A.

Ensure the data owners agree with the classification of their data and then socialize the matrix with employees handling data.

B.

Ensure the internal legal team approves the data classification matrix then perform a Business Impact Analysis (BIA) to understand the impact of applying the classifications.

C.

Complete a Privacy Impact Assessment (PIA) and use the results to identify improvements to the data classification matrix.

D.

Document the handling procedures for each classification of data in the matrix and schedule data handling educational sessions with employees.

Internet Small Computer Systems Interface (iSCSI) protocol relies on Transmission Control Protocol/Internet Protocol (TCP/IP). Which can be used maliciously to interrupt the flow of data. Which Information Technology (IT) component would be impacted by such a disruption?

A.

Firewall.

B.

Switch.

C.

Storage.

D.

Router.