Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 11

Questions 151

What are the FIRST two steps an organization should conduct to classify its assets?

Options:
A.

Define user requirements and collate existing inventories

B.

Categorize assets and set minimum security controls

C.

Conduct an inventory of assets and determine the owners

D.

Obtain senior management buy-in and conduct a risk assessment

APICS CPIM-8.0 Premium Access
Questions 152

For a process that is outside its upper control limit (UCL), which of the following techniques would best be used to return the process under control?

Options:
A.

Conduct a Pareto analysis

B.

Plan-do-check-action (PDCA)

C.

Plot histograms

D.

Monitor control charts

Questions 153

Which protocol is the BEST option to provide authentication, confidentiality, and data integrity between two applications?

Options:
A.

File Transfer Protocol (FTP)

B.

Security Assertion Markup Language (SAML)

C.

Peer-To-Peer (P2P) communication

D.

Transport Layer Security (TLS)

Questions 154

An organization wants to control access at a high-traffic entrance using magnetic-stripe cards for identification. Which of the following is the BEST for the organization to utilize?

Options:
A.

A turnstile

B.

A security guard

C.

A mantrap

D.

A locking door

Questions 155

A security engineer must address resource sharing between various applications without adding physical hardware to the environment. Which secure design principle is used to BEST segregate applications?

Options:
A.

Network firewalls

B.

Logical isolation

C.

Application firewalls

D.

Physical isolation

Questions 156

Which of the following factors is the MOST important consideration for a security team when determining whether cryptographic erasure can be used for disposal of a device?

Options:
A.

If the data on the device exceeds what cryptographic erasure can safely process

B.

If the methods meet the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001

C.

If security policies allow for cryptographic erasure based on the data stored on the device

D.

If the device was encrypted prior using cipher block chaining

Questions 157

Which of the following documents is the BEST reference to describe application functionality?

Options:
A.

Disaster Recovery Plan (DRP)

B.

System security plan

C.

Business Impact Analysis (BIA) report

D.

Vulnerability assessment report

Questions 158

Which of the following capabilities BEST distinguishes a Next-Generation Firewall (NGFW) from a traditional firewall?

Options:
A.

Ensures incoming and outgoing packets are inspected before they are allowed to pass through

B.

Offers features such as integrated intrusion prevention or application awareness and control

C.

Provides security when users traverse public networks such as the Internet

D.

Provides stateless and stateful inspection of incoming and outgoing network traffic

Questions 159

Which of the following is the workflow of the identity and access provisioning lifecycle?

Options:
A.

Creation, Assessment, Deletion

B.

Assessment, Creation, Deletion

C.

Provision, Review, Revocation

D.

Review, Provision, Revocation

Questions 160

Additional requirements that are outside the original design are being added to a project, increasing the timeline and cost of the project.

What BEST describes the requirement changes that are happening?

Options:
A.

Volatility

B.

Stove-piped requirements

C.

Non-verifiable requirements

D.

Scope creep

Questions 161

Which of the following capacity planning methods uses the master production schedule (MPS) as its primary input?

Options:
A.

Resource planning

B.

Rough-cut capacity planning (RCCP)

C.

Finite loading

D.

Input/output analysis

Questions 162

The results of a threat campaign show a high risk of potential intrusion. Which of the following parameters of the Common Vulnerability Scoring System (CVSS) will MOST likely provide information on threat conditions for the organization to consider?

Options:
A.

Modified base metrics

B.

Remediation level

C.

Integrity requirements

D.

Attack complexity

Questions 163

Which of the following should recommendations from a Plan Of Action And Milestones (POA&M) be based on?

Options:
A.

Continuous monitoring

B.

Change Control Board (CCB) coordination

C.

Risk acceptance

D.

Root cause analysis

Questions 164

Price negotiation is most appropriate when purchasing which of the following product categories?

Options:
A.

Commodities

B.

Standard products

C.

Items of small value

D.

Made-to-order (MTO) items

Questions 165

The project manager has updated the project steering committee that a security vulnerability was found after applying the system security baseline, and remediation has been completed to close the vulnerability. What is the BEST next step for the project?

Options:
A.

Update the security baseline and continue with the next project task.

B.

Proceed with the next project task to meet the project deadlines.

C.

Obtain approval from the project steering, committee to revise the system security baseline.

D.

Create a change request for the system baseline revision.

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.