New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

APICS CPIM-8.0 - Certified in Planning and Inventory Management (CPIM 8.0)

Page: 1 / 12
Total 585 questions

To ensure the quality of its newly developed software, an organization is aiming to deploy an automated testing tool that validates the source code. What type of testing BEST supports this capability?

A.

Network vulnerability scanning

B.

Dynamic Application Security Testing (DAST)

C.

Static Application Security Testing (SAST)

D.

Fuzz parsing

Which of the following BEST describes web service security conformance testing as it relates to web services security testing?

A.

Generally includes threat modeling, requirements risk analysis, and security modeling

B.

Focused on ensuring that the security functionally performed by a web service meets its stated requirements

C.

Ensure individual protocol implementations adhere to the relevant published standards

D.

Focused on the smallest unit of the web service application, apart from the rest of the application

An organization routes traffic between two of its sites using non-revenue network paths provided by peers on an Internet exchange point. What is the MOST appropriate recommendation the organization's security staff can make to prevent a compromise?

A.

Cease routing traffic over the Internet exchange point and use the transit provider exclusively.

B.

Ask the peers who route the traffic to sign a Non-Disclosure Agreement (NDA).

C.

Use Internet Protocol Security (IPsec) between the border gateways at either site.

D.

Nothing needs to be done because applications are already required to encrypt and authenticate network traffic.

Zombieload, Meltdown, Spectre, and Fallout are all names of bugs that utilized which of the following types of attack?

A.

Mai-In-The-Middle (MITM)

B.

Side-Channel

C.

Frequency analysis

D.

Fault injection

Which of the following methods is most often used to manage inventory planning variability across the supply chain?

A.

Buffer management

B.

Safety lead time

C.

Risk pooling

D.

Risk categorization

Which of the following stock location systems would you use in a repetitive manufacturing, lean environment?

A.

Fixed location

B.

Floating location

C.

Point-of-use storage

D.

Central storage

Which of the following states of data becomes MOST important to protect as organizations continue to transition toward Application Programming Interface (API)-based solutions?

A.

Data at rest

B.

Data in use

C.

Data in transit

D.

Data on the client machine

Which of the following is MOST important for an international retail company to consider when handling and retaining information about its customers?

A.

Internal security policies

B.

General Data Protection Regulation (GDPR)

C.

System And Organization Controls (SOC) audit criteria

D.

Cyber insurance premiums

Which software development methodology is an iterative customer-value-centric approach which helps teams deliver value to their customers faster and with fewer problems?

A.

Agile model

B.

Cleanroom model

C.

Waterfall model

D.

Incremental model

The Chief Information Security Officer (CISO) for an international organization with offices operating globally has been tasked with developing a new data encryption policy that can be applied to all areas of the business. What is the MOST important factor that must be considered?

A.

Organization's security policy and standards

B.

How data will be stored and accessed

C.

Regulatory and compliance requirements

D.

Where data will be stored and accessed

Which of the following techniques is BEST suited to preserve the confidentiality of a system’s data?

A.

Audit log review

B.

Database encryption

C.

Immutable backups

D.

Database record locking

An organization's penetration test engineer noticed that traffic is being modified between 2 nodes and suspects an eavesdropping attack. On which networking plane is this attack occurring?

A.

Data

B.

Control

C.

Management

D.

Configuration

In a large organization, the average time for a new user to receive access is seven days. Which of the following is the BEST enabler to shorten this time?

A.

Implement a self-service password management capability

B.

Increase system administration personnel

C.

Implement an automated provisioning tool

D.

Increase authorization workflow steps

In the sales and operations planning (S&OP) process, the demand management function provides:

A.

Information not included in the forecast

B.

A measurement of forecast accuracy

C.

A correction of forecast errors

D.

A more detailed forecast

In which of the following phases of the product life cycle is product price most effective in influencing demand?

A.

Introduction

B.

Growth

C.

Maturity

D.

Decline