New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 5 / 12
Total 585 questions

Management should support investments in new process technologies that:

A.

require minimal changes in existing systems, procedures, and skills.

B.

have been recommended by technical experts and equipment suppliers.

C.

provide significant cost-reduction opportunities for the company's current products.

D.

provide long-term competitive advantage with acceptable financial risk.

After reviewing the output of a threat modelling workshop, the development manager decides not to implement the application features where issues were identified. What is the BEST description of how the threats from the workshop are being addressed?

A.

Eliminated

B.

Mitigated

C.

Transferred

D.

Accepted

If all other factors remain the same, when finished goods inventory investment is increased, service levels typically will:

A.

remain the same.

B.

increase in direct (linear) proportion.

C.

increase at a decreasing rate.

D.

increase at an increasing rate.

Which of the following factors is the MOST important consideration for a security team when determining whether cryptographic erasure can be used for disposal of a device?

A.

If the data on the device exceeds what cryptographic erasure can safely process

B.

If the methods meet the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001

C.

If security policies allow for cryptographic erasure based on the data stored on the device

D.

If the device was encrypted prior using cipher block chaining

We have observed the inventory system does not handle plastic parts well." What should be added to the problem statement to make it more useful?

A.

Measurements that help describe the problem

B.

Guidance to which problem-solving tools should be used

C.

Criteria for selecting the improvement team

D.

Description of who is responsible for the problem

Substituting capital equipment in place of direct labor can be economically Justified for which of the following scenarios?

A.

Volumes are forecasted to increase

B.

Material prices are forecasted to increase

C.

Implementing a pull system in production

D.

Functional layouts are being utilized

An organization has been struggling to improve their security posture after a recent breach.

Where should the organization focus their efforts?

A.

Common configuration enumerations

B.

Business Continuity Plan (BCP)

C.

Service-Level Agreements (SLA)

D.

National vulnerability database

Which of the following prioritization rules will have the greatest impact In reducing the number of orders In queue?

A.

Critical ratio

B.

Shortest processing time

C.

Fewest operations remaining

D.

First come, first served

Which of the following methods most likely Introduces a temporary variance between the inventory balance and the inventory record?

A.

Inventory write-off

B.

Backflushing

C.

Cycle count

D.

Kanban

Small, independent demands for components and subassemblies typically arise from which of the following sources?

A.

Warehouse orders

B.

Repair and service requirements

C.

Original equipment manufacturers

D.

Scrap allowance

An organization is looking to integrate security concepts into the code development process early in development to detect issues before the software is launched. Which advantage does the organization gain from using Static Application Security Testing (SAST) techniques versus dynamic application security testing techniques?

A.

Allows tailored techniques

B.

Executes code to detect issues

C.

Allows for earlier vulnerability detection

D.

Simulates attacker patterns

A cybersecurity analyst has recently been assigned to work with a product development team. The team has usually needed to perform a lot of rework late in the development cycle on past projects due to application security concerns. They would like to minimize the amount of rework necessary. Which would be the BEST option to enable secure code review early in the product development?

A.

Implement dynamic code analysis

B.

Perform manual code reviews

C.

Implement static code analysis

D.

Perform fuzz testing

Which of the following is the BEST way to identify the various types of software installed on an endpoint?

A.

Active network scanning

B.

Passive network scanning

C.

Authenticated scanning

D.

Port scanning

Which of the following criteria is used to determine safety stock in a distribution center (DC)?

A.

Economic order quantity(EOQ)

B.

Seasonal index value

C.

Alpha factor level

D.

Probability of stocking out

Forecast error typically triggers forecast revision when it is:

A.

used in computing the tracking signal.

B.

associated with the Introduction stage of the product life cycle.

C.

continually increasing.

D.

caused by random variation.