Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 1 / 13
Total 606 questions

Which of the following BEST describes how an Application Programming Interface (API) gateway fits into an application architecture?

A.

An API gateway is a specialized reverse proxy that can make different APIs appear as if they are a single API.

B.

An API gateway inspects traffic and blocks many common attacks against Hypertext Transfer Protocol (HTTP) web services.

C.

An API gateway ensures that a Denial-Of-Service (DoS) attack cannot occur within the application.

D.

An API gateway monitors traffic within internal networks and ensures suspicious patterns are detected on any API.

Which Virtual Private Network (VPN) protocol provides a built-in encryption?

A.

Layer 2 Tunneling Protocol

B.

Point-to-Point Tunneling Protocol

C.

Layer 2 Forwarding Protocol

D.

Internet Protocol Security (IPsec)

A security engineer is reviewing Incident Response (IR) roles and responsibilities. Several roles have static elevated privileges in case an incident occurs. Instead of static access, what is the BEST access method to manage elevated privileges?

A.

Just-in-time

B.

Delegated

C.

Break-glass

D.

Automated

The production plan relates to a firm ' s financial planning because it is used to:

A.

calculate standard product costs.

B.

determine variable costs.

C.

project payroll costs.

D.

identify future cash needs.

An organization provides customer call center operations for major financial service organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?

A.

Frameworks that fit the organization’s risk appetite, as cybersecurity does not vary industry to industry

B.

Control Objectives For Information And Related Technology (COBIT) and Health Insurance Portability And Accountability Act (HIPAA) frameworks

C.

Frameworks specific to the industries and locations clients do business in

D.

National Institute Of Standards And Technology and International Organization For Standardization (ISO) frameworks

When starting an external benchmarking study, a firm must first:

A.

determine the metrics which will be measured and compared.

B.

identify the target firms with which to benchmark against.

C.

understand its own processes and document performance.

D.

determine its areas of weakness versus the competition ' s.

Plans are being made to move an organization’s software systems to the cloud in order to utilize the flexibility and scalability of the cloud. Some of these software systems process highly sensitive data. The organization must follow strict legal requirements regarding the location of the highly sensitive data processed by the software systems. Which cloud model will BEST fit the organization’s requirements?

A.

Private cloud

B.

Multicloud

C.

Public cloud

D.

Hybrid cloud

A failure mode and effects analysis (FMEA) could be used for which of the following activities?

A.

Forecasting the estimated warranty costs for the annual budget cycle

B.

Calculating the lost productivity from unplanned equipment downtime

C.

Determining the critical-to-quality (CTQ) characteristics for a new product design

D.

Assessing the supply chain risk for a single-sourced raw material

A security engineer developing software for a professional services organization has a requirement that users cannot have concurrent access to data of clients that are competitors. Which security model should the security engineer implement to meet this requirement?

A.

Brewer-Nash

B.

Bell-LaPadula

C.

Biba Integrity

D.

Clark Wilson

An organization is transitioning from a traditional server-centric infrastructure to a cloud-based Infrastructure. Shortly after the transition, a major breach occurs to the organization ' s databases. In an Infrastructure As A Service (IaaS) model, who would be held responsible for the breach?

A.

The database vendor

B.

The third-party auditor

C.

The organization

D.

The Cloud Service Provider (CSP)

To mitigate risk related to natural disasters, an organization has a separate location with systems and communications in place. Data must be restored on the remote systems before they are ready for use. What type of remote site is this?

A.

Cold Site

B.

Mobile Site

C.

Hot Site

D.

Warm Sit

Which assessing whether real-world threats to the security of an application have been mitigated, what is MOST effective source to confirm that sufficient security controls are in place for both end users and customers?

A.

Software security team

B.

Product management

C.

Third-party reviews

D.

Senior management

A manufacturer has a forecasted annual demand of 1,000,000 units for a new product. They have to choose 1 of 4 new pieces of equipment to produce this product. Assume that revenue will be $10 per unit for all 4 options.

Which machine will maximize their profit if the manufacturer anticipates market demand will be steady for 3 years and there is no residual value for any of the equipment choices?

MachineFixed CostVariable Cost per UnitAnnual Capacity

AS100.000$6 00800,000 units

B$200,000$5 501.000,000 units

C$250,000$5 001,200,000 units

D$1 000.000$4 501 400.000 units

A.

Machine A

B.

Machine B

C.

Machine C

D.

Machine D

An organization has determined that it needs to retain customer records for at least thirty years to discover generational trends in customer behavior. However, relevant local regulation requires that all Personally Identifiable Information (PII) is deleted after expiration of the customer ' s engagement with the organization, which is usually no longer than one year. How should the data be handled at the expiration of customer engagement at one year?

A.

Because the data contains PII, it should be backed up in an encrypted form, with the encryption key securely kept in a Hardware Security Module (HSM), and all access logged and monitored.

B.

The data should be deleted from the customer website, and archived to a write-once, read-many drive to securely meet the business requirement for analytics.

C.

PII portion of the data should be tokenized or deleted, and the rest of the data stored securely to meet the business requirement for analytics.

D.

Since legal and regulatory compliance takes priority over business requirements, the data should be deleted.

A firm ' s cash conversion cycle is most likely to improve when the firm:

A.

Increases the cash-to-cash cycle time.

B.

Reduces the days sales outstanding (DSO).

C.

Increases the equipment utilization rate.

D.

Extends payment terms to customers.