Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 7 / 13
Total 606 questions

Which of the following criteria is used to determine safety stock in a distribution center (DC)?

A.

Economic order quantity(EOQ)

B.

Seasonal index value

C.

Alpha factor level

D.

Probability of stocking out

An OpenID Connect (OIDC) authorization server received two requests from a client. The server identifies the request as replay attack and rejects the request. Which of the following BEST describes these requests?

A.

One of the requests does not have a valid token issuer ' s identifier.

B.

The requests have the same ' auth_time ' parameter.

C.

The requests have the same ' nonce ' parameter.

D.

One of the requests does not have a valid audience token.

An information system containing Protected Health Information (PHI) will be accessed by doctors, nurses, and others working in a hospital. The same application will be used by staff in the pharmacy department only for dispensing prescribed medication. Additionally, patients can log in to view medical history. The system owner needs to propose an access control model that considers environment, situation, compliance, and security policies while dynamically granting the required level of access. Which access control model is the MOST suitable?

A.

Role-Based Access Control (RBAC)

B.

Attribute-Based Access Control (ABAC)

C.

Task-based access control

D.

Risk-adaptive access control

Which of the following factors is the MOST important consideration for a security team when determining when determining whether cryptographic erasure can be used for disposal of a device?

A.

If the methods meet the International organization For Standardization/International Electrotechnical Commission (ISO/IEC) 27001.

B.

If the data on the device exceeds what cryptographic erasure can safely process.

C.

If the device was encrypted prior using cipher block chaining.

D.

If the security policies allow for cryptographic erasure based on the data stored on the device.

What is the MAIN benefit of network segmentation?

A.

Limiting data transfer

B.

Limiting cyberattack damage

C.

Limiting privilege access

D.

Limiting network addresses

A work center has 3 machines that are all run at the same time with a single worker. The work center has an efficiency of 75% and a utilization of 100%. What is the work center ' s capacity in standard hours for an 8-hour shift?

A.

6 hours

B.

8 hours

C.

18 hours

D.

24 hours

A financial institution is implementing an Information Technology (IT) asset management system. Which of the following capabilities is the MOST important to include?

A.

Logging the data leak protection status of the IT asset

B.

Tracking the market value of the IT asset

C.

Receiving or transferring an IT asset

D.

Recording the bandwidth and data usage of the IT asset

A statistical safety stock calculation would be appropriate for:

A.

components used in multiple end items.

B.

new products at time of introduction.

C.

end items with stable demand.

D.

supply-constrained raw materials.

Which of the common vulnerabilities below can be mitigated by using indexes rather than actual portions of file names?

A.

Open redirect

B.

Cross-Site Request Forgery (CSRF)

C.

Path traversal

D.

Classic buffer overflow

A Software As A Service (SaaS) solution was compromised due to multiple missing security controls. The SaaS deployment was rushed and the Software Development Life Cycle (SDLC) was not followed. Which SDLC phase would have been MOST effective in preventing this failure?

A.

Maintenance

B.

Design

C.

Testing

D.

Requirements

When assessing a new vendor as a possible business partner, what would BEST demonstrate that the vendor has a proactive approach to data security compliance?

A.

The vendor provides documented safeguards in handling confidential data.

B.

The vendor provides a copy of their externally performed risk assessment.

C.

The vendor has a Business Associate Agreement (BAA) in place before work begins.

D.

The vendor has a signed contract in place before work with data begins.

Access Control Lists (ACL), protection bits, and file passwords are typical examples of which of the following access control methods?

A.

Discretionary.

B.

Attribute-based.

C.

Mandatory.

D.

Role-based.

An organization wants to ensure a risk does not occur. The action taken is to eliminate the attack surface by uninstalling vulnerable software. Which risk response strategy did the organization take?

A.

Accepting risk

B.

Avoiding risk

C.

Mitigating risk

D.

Transferring risk

In preparing for a facility location decision, proximity to suppliers would be classified as which kind of criteria?

A.

Service level requirements

B.

Future flexibility factors

C.

Access to transportation

D.

Cost factors

What is the BEST item to consider when designing security for information systems?

A.

The comprehensive level of assurance required

B.

The jurisdiction of the information system

C.

The security requirements of the board

D.

The Disaster Recovery Plan (DRP)