Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 8 / 13
Total 606 questions

How much data an organization can afford to lose is determined by the:

A.

Service-Level Agreement (SLA)

B.

Business Continuity Plan (BCP)

C.

Recovery Time Objective (RTO)

D.

Recovery Point Objective (RPO)

What is the total load requirement for this work center based on the following data?

A.

1.326

B.

1.525

C.

1,533

D.

2,880

What should an organization do to prepare for Disaster Recovery (DR) efforts?

A.

Create a list of key personnel

B.

Create a list of decommissioned hardware

C.

Review tabletop exercises

D.

Replicate access logs

Which of the following incorporates design techniques promoted by Crime Prevention Through Environmental Design (CPTED)?

A.

Capacity of residents to act individually should be increased.

B.

Landscape design features should be used to create the impression of a fortress.

C.

Multiple entrances and exits should be used to keep traffic flowing smoothly through the facility.

D.

Communal areas with amenities should be created to encourage activity and use.

Which of the following statements is true about the meantime between failures (MTBF) measure?

A.

It is used for non-repairable products.

B.

An increase in MTBF is proportional to anincrease inquality.

C.

It is a useful measure of reliability.

D.

It is the same as operating life or service life.

An order winner during the growth stage of a product ' s life cycle is:

A.

variety.

B.

availability.

C.

dependability.

D.

price.

Which of the following benefits typically will be realized when switching from a functional to a cellular layout?

A.

Equipment utilization will be higher.

B.

Quality inspections will be reduced.

C.

Capital expenditures will be reduced.

D.

Products will have faster throughput.

Which of the following security techniques can be used to ensure the integrity of software as well as determine who developed the software?

A.

Independent verification and validation

B.

Code signing

C.

Digital Rights Management (DRM)

D.

Software assessment

Which of the following procedures should be defined when establishing information and asset handling requirements?

A.

Asset retention procedures

B.

Software patching procedures

C.

Media disposal procedures

D.

User access procedures

An organization is considering options to outsource their Information Technology (IT) operations. Although they do not sell anything on the Internet, they have a strong requirement in uptime of their application. After the offerings received by the Cloud Service Provider (CSP), the IT manager decided it was mandatory to develop processes to continue operations without access to community or public cloud-based applications. Which of the following arguments MOST likely led the IT manager to make this decision?

A.

Circumstances may force a cloud provider to discontinue operations.

B.

The need to develop alternative hosting strategies for applications deployed to the cloud.

C.

Most cloud services offerings are unique to each provider and may not be easily portable.

D.

Integrity and confidentiality are not ensured properly on the most cloud service offerings.

Fishbone diagrams would help a service organization determine:

A.

the proper level of service for a customer segment.

B.

the source of a quality-of-service issue.

C.

differences in the performance of employees.

D.

the decomposition of customer return rates with seasonality.

A house of quality (HOQ) chart aligns which pair of functions?

A.

Customer requirements with costing

B.

Engineering with operations

C.

Customer purchasing with supplier shipping

D.

Competitive analysis with product design

The Business Continuity Plan (BCP) has multiple components. The information security plan portion must prioritize its efforts. Which 3 aspects of information security MUST be prioritized?

A.

Confidentiality, integrity, availability

B.

Physical security, access control, asset protection

C.

Intent, capability, opportunity

D.

Threat level, network security, information disposal

Which of the following design considerations would offer the BEST protection against unauthorized access to the facility?

A.

Allowing only one person to enter at a time

B.

Auditing access logs annually

C.

Limiting access to regular business hours only

D.

Establishing entry points from public areas only

Moving average forecasting methods are best when demand shows:

A.

a clear trend.

B.

high random variation.

C.

consistent seasonality.

D.

a cyclical pattern.