APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)
A security assessor has been engaged to perform a penetration test on control system components located on a shipping vessel. The individuals on the ship do not have any knowledge of how the component is configured or its internal workings. Which of the following test types does this scenario call for?
Zombieload, Meltdown, Spectre, and Fallout are all names of bugs that utilized which of the following types of attack?
An organization needs a firewall that maps packets to connections and uses Transmission Control Protocol/Internet Protocol (TCP/IP) header fields to keep track of connections. Which type of firewall will be recommended?
Which of the following sampling techniques is BEST suited for comprehensive risk assessments?
What is the following is the MAIN reason why hot-spot usually adopt open security mode in wireless networks?
A forecasting method that responds slowly to changes in demand would be most appropriate when the historical demand pattern shows a:
A Structured Query Language (SQL) database is hosted on a hardened, secure server. All unused ports are locked down, but external connections from untrusted networks are still required to be allowed through. What is the BEST way to ensure transactions to/from this server remain secure?
A vendor has been awarded a contract to supply key business software. The vendor has declined all requests to have its security controls audited by customers. The organization insists the product must go live within 30 days. However, the security team is reluctant to allow the project to go live. What is the organization ' s BEST next step?
An organization wants to implement Zero Trust (ZT). The Information Technology (IT) department is already using Multi-Factor Authentication (MFA) and Identity and Access Management (IAM). Which of the following would be the BEST solution for the organization to implement in order to have a ZT network?
Which of the below represents the GREATEST cloud-specific policy and organizational risk?
A company with stable demand that uses exponential smoothing to forecast demand would typically use a:
Which of the following is MOST accurate when comparing patch management and vulnerability management?
Which of the below represent the GREATEST cloud-specific policy and organizational risk?
Disaster Recovery (DR) training plan outcomes should have which KEY quality?
A manufacturer has a primary assembly line supported by output from several subassembly lines. Which of the following scenarios would be the best argument for a multilevel master scheduling process?
