Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 6 / 13
Total 606 questions

The results of a threat campaign show a high risk of potential intrusion. Which of the following parameters of the Common Vulnerability Scoring System (CVSS) will MOST likely provide information on threat conditions for the organization to consider?

A.

Modified base metrics

B.

Remediation level

C.

Integrity requirements

D.

Attack complexity

A manufacturer uses a low-cost strategy. It recently reviewed its components and realized it is using multiple versions of one screw. Reducing the variety of screws will contribute to its cost advantage by:

A.

Reducing the number of products offered

B.

Increasing economies of scale in purchasing

C.

Allowing outsourcing of value chain activities

D.

Allowing the production plant to operate at full capacity

A security specialist is responsible to improve the security awareness program of a medium-sized organization and tasked to track blocked targeted attacks. Which of the following BEST describes the outcome of the security specialist’s use of metrics for this task?

A.

A decrease in reported suspicious activity that aligns with an increase in detection of malware and Domain Name Server (DNS) queries to blocked sites.

B.

An increase in reported suspicious activity that aligns with a decrease in detection of malware and Domain Name Server (DNS) queries to blocked sites.

C.

An increase in reported changes in click percentage that aligns with a decrease in the number of phishes and incidents reported.

D.

A decrease in reported changes in click percentages that aligns with an increase in the number of phishes and incidents reported.

Information regarding a major new customer is received from sales. The company ' s most appropriate initial response would be to adjust the:

A.

production volume.

B.

master production schedule (MPS).

C.

sales and operations plan.

D.

forecast.

A low-cost provider strategy works best when which of the following conditions are met?

A.

Price competition among rivals is similar.

B.

Buyers are more price sensitive.

C.

There are many ways to achieve product differentiation.

D.

There are few industry newcomers.

A contractor hacked into an unencrypted session on an organization ' s wireless network. Which authentication configuration is MOST likely to have enabled this?

A.

Remote Authentication Dial-In User Service (RADIUS)

B.

Captive web portal

C.

Lightweight Directory Access Protocol (LDAP)

D.

Token authentication

Which of the following demand management approaches tends to be most subjective?

A.

Seasonal analysis

B.

Time series forecasting

C.

Collaborative planning, forecasting, and replenishment (CPFR)

D.

Delphi method

A cloud-based web application requires the use of cryptographic keys to encrypt user-uploaded files at rest. Where is the safest place to store these cryptographic keys?

A.

Keys are stored in a password protected zip file.

B.

Keys are stored with source code in a revision control system.

C.

Keys are stored in a cloud-based file storage system.

D.

Keys are stored in a central, internal key management system.

Which software development methodology is an iterative customer-value-centric approach which helps teams deliver value to their customers faster and with fewer problems?

A.

Agile model

B.

Cleanroom model

C.

Waterfall model

D.

Incremental model

An organization discovered that malicious software was installed on an employee’s work laptop and allowed a competing vendor to access confidential files. The employee was fully aware of the policy not to install unauthorized software on the organization laptop. What is the BEST automated security practice for an organization to implement to avoid this situation?

A.

Security awareness training

B.

Role-Based Access Control (RBAC)

C.

User behavior analytics solution

D.

File integrity monitoring

Increased use of third-party logistics (3PL) services is likely to have which of the following effects on a firm ' s balance sheet?

A.

Decreased fixed assets

B.

Decreased retained earnings

C.

Increased accounts receivable

D.

Increased intangible assets

An organization is aiming to be System and Organization Controls (SOC) 2 certified by an audit organization to demonstrate its security and availability maturity to its sub service organizations. Which type of audit does this engagement BEST describe?

A.

Forensic audit

B.

Third-party audit

C.

Location audit

D.

Internal audit

The cost accountant has discovered a consistent overage in actual run time for one operation. This information should be sent first to the:

A.

product manager to increase the selling price of the product.

B.

quality manager to add a new quality measurement to the operation.

C.

production supervisor to review and explain the overage.

D.

the engineering manager to evaluate the run time for the routing.

A security analyst modifies the organization’s baselines to align the controls more closely with specific security and privacy requirements. Which security concept is this an example of?

A.

Mitigating

B.

Tailoring

C.

Scoping

D.

Compensating

Material requirements planning (MRP) performance shows improvement when the total number of:

A.

Expedite messages increase.

B.

De-expedite messages increase.

C.

Due-for-release messages decrease.

D.

Action messages decrease.