APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)
Which of the following trade-offs should be evaluated when determining where to place inventory in a multi-echelon supply chain network?
A lengthy power outage led to unavailability of time critical services resulting in considerable losses. It was determined that a backup electrical generator did not work as intended at the time of the incident due to lack of fuel. What should the security consultant FIRST Investigate?
A company can easily change Its workforce, but inventory carrying costs are high. Which of the following strategies would be most appropriate during times of highly fluctuating demand?
A software organization is getting ready to launch a new application. A security engineer notices the application allows unrestricted access to files on the web server. Which of the following recommendations will BEST resolve this security issue?
In which of the following phases of the product life cycle is product price most effective in influencing demand?
In the sales and operations planning (S & OP) process, the demand management function provides:
What activity is a useful element in the change process?
An organization is opening a new data center and is looking for a facilities security officer to provide best practices for the site and facility design. The two major requirements for this organization are not to attract undue attention and avoid proximity to potentially hazardous sites.
What site selection considerations do these requirements BEST fall under when deciding on the location for a facility?
In which of the following situations would you use an X-bar chart?
If a work center is already loaded to full capacity, which of the following actions would be best to take before releasing a new order?
A bank recently informed a customer that their account has been overdrawn after their latest transaction. This transaction was not authorized by the customer. Upon further investigation, it was determined by the security team that a hacker was able to manipulate the customer ' s pre-authenticated session and force a wire transfer of funds to a foreign bank account. Which type of attack MOST likely occurred?
Additional requirements that are outside the original design are being added to a project, increasing the timeline and cost of the project.
What BEST describes the requirement changes that are happening?
What is the PRIMARY benefit an organization obtains by adapting a cybersecurity framework to their cybersecurity program?
An organization suffered a loss to an asset at a frequency that was different than the initially estimated Annualized Rate of Occurrence (ARO). What is the appropriate course of action?
Which threat modeling methodology is focused on assessing risks from organizational assets?
