Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 9 / 13
Total 606 questions

A security assessor has been engaged to perform a penetration test on control system components located on a shipping vessel. The individuals on the ship do not have any knowledge of how the component is configured or its internal workings. Which of the following test types does this scenario call for?

A.

Tandem testing

B.

Blind testing

C.

Double-gray testing

D.

Double-blind testing

Zombieload, Meltdown, Spectre, and Fallout are all names of bugs that utilized which of the following types of attack?

A.

Mai-In-The-Middle (MITM)

B.

Side-Channel

C.

Frequency analysis

D.

Fault injection

An organization needs a firewall that maps packets to connections and uses Transmission Control Protocol/Internet Protocol (TCP/IP) header fields to keep track of connections. Which type of firewall will be recommended?

A.

Network

B.

Stateless

C.

Stateful

D.

Packet

Which of the following sampling techniques is BEST suited for comprehensive risk assessments?

A.

Convenience sampling

B.

Snowball sampling

C.

Judgement sampling

D.

Systematic sampling

What is the following is the MAIN reason why hot-spot usually adopt open security mode in wireless networks?

A.

Ease of use

B.

Limitation of Infrastructure

C.

Adapter compatibility concerns

D.

Cost concerns

A forecasting method that responds slowly to changes in demand would be most appropriate when the historical demand pattern shows a:

A.

Minor seasonal component

B.

Major seasonal component

C.

Minor random component

D.

Major random component

A Structured Query Language (SQL) database is hosted on a hardened, secure server. All unused ports are locked down, but external connections from untrusted networks are still required to be allowed through. What is the BEST way to ensure transactions to/from this server remain secure?

A.

Secure SQL service port with a Transport Layer Security (TLS) certificate.

B.

Use Multi-Factor Authentication (MFA) for all logins to the server.

C.

Secure SQL service port with a Secure Sockets Layer (SSL) certificate.

D.

Scan all connections to the server for malicious packets.

A vendor has been awarded a contract to supply key business software. The vendor has declined all requests to have its security controls audited by customers. The organization insists the product must go live within 30 days. However, the security team is reluctant to allow the project to go live. What is the organization ' s BEST next step?

A.

Shift the negative impact of the risk to a cyber insurance provider, i.e., risk transference.

B.

Document a risk acceptance, in accordance with internal risk management procedures, that will allow the product to go-live.

C.

Gain assurance on the vendor ' s security controls by examining independent audit reports and any relevant certifications the vendor can provide.

D.

Evaluate available open source threat intelligence pertaining to the vendor and their product.

An organization wants to implement Zero Trust (ZT). The Information Technology (IT) department is already using Multi-Factor Authentication (MFA) and Identity and Access Management (IAM). Which of the following would be the BEST solution for the organization to implement in order to have a ZT network?

A.

Next-generation firewall

B.

Host-Based Intrusion Detection System (HIDS)

C.

Micro-segmentation

D.

Network Intrusion Detection System (NIDS)

Which of the below represents the GREATEST cloud-specific policy and organizational risk?

A.

Supply chain failure

B.

Loss of business reputation due to co-tenant activities

C.

Loss of governance between the client and cloud provider

D.

Cloud service termination or failure

A company with stable demand that uses exponential smoothing to forecast demand would typically use a:

A.

low alpha value.

B.

low beta value.

C.

high beta value.

D.

high alpha value.

Which of the following is MOST accurate when comparing patch management and vulnerability management?

A.

Patch management manages the security lifecycle from discovery to remediation.

B.

Patch management identifies, acquires, tests, and installs code changes on a specific computing device.

C.

Vulnerability management is a process executed in specialized software to address security issues or add new features.

D.

Vulnerability management plugs security holes and remediates risk by upgrading software to the most recent versions.

Which of the below represent the GREATEST cloud-specific policy and organizational risk?

A.

Loss of governance between the client and cloud provider

B.

Loss of business reputation due to co-tenant activities

C.

Supply chain failure

D.

Cloud service termination or failure

Disaster Recovery (DR) training plan outcomes should have which KEY quality?

A.

Comprehensible

B.

Identifiable

C.

Measurable

D.

Editable

A manufacturer has a primary assembly line supported by output from several subassembly lines. Which of the following scenarios would be the best argument for a multilevel master scheduling process?

A.

Low variation in aggregate subassembly demand

B.

High variation in aggregate subassembly demand

C.

Low variation in subassembly demand mix

D.

High variation in subassembly demand mix