Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 12

Questions 166

When implementing a data classification program, Which is MOST important for measuring businesss impact?

Options:
A.

Data classification program being rolled out in accordance with policies and procedures

B.

Measuring the size of the data set to understand scoping for compliance requirements

C.

The adverse effect of data leakage

D.

The early appointment of data custodians

APICS CPIM-8.0 Premium Access
Questions 167

Which if the following is the FIRST control step in provisioning user rights and privileges?

Options:
A.

Identification

B.

Authorization

C.

Authentication

D.

Confidentiality

Questions 168

Who is ultimately responsible for ensuring that specific data is protected?

Options:
A.

Custodian

B.

Data owner

C.

Data controller

D.

System owner

Questions 169

Which of the following is the GREATEST threat for a Border Gateway Protocol (BGP) deployment on the internet?

Options:
A.

Ability to use weak hashing algorithms for peer authentication

B.

Ability to perform unauthenticated peering across autonomous systems

C.

Failure to validate legitimacy of received route advertisements

D.

Failure to encrypt route announcement across autonomous systems

Questions 170

Which of the following is a threat modeling methodology used for accessing threats against applications and Operating Systems (OS)?

Options:
A.

Basically Available, Soft-State, Eventual-Consistency (BASE)

B.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation Of Privilege (STRIDE)

C.

Control Objectives For Information And Related Technology (COBIT)

D.

Security, Trust, Assurance And Risk (STAR)

Questions 171

During a manual source code review, an organization discovered a dependency with an open-source library that has a history of being exploited. Which action should the organization take FIRST to assess the risk of depending on the open-source library?

Options:
A.

Identify the specific version of the open-source library that is implemented

B.

Request a penetration test that will attempt to exploit the open-source library

C.

Deploy the latest compatible version of the open-source library

D.

Submit a change request to remove software dependencies with the open-source library

Questions 172

Which of the following design considerations would offer the BEST protection against unauthorized access to the facility?

Options:
A.

Allowing only one person to enter at a time

B.

Auditing access logs annually

C.

Limiting access to regular business hours only

D.

Establishing entry points from public areas only

Questions 173

In a rapidly changing business environment, a primary advantage of an effective customer relationship management (CRM) program is:

Options:
A.

reduced forecast variability.

B.

fewer customer order changes.

C.

fewer customer defections.

D.

earlier Identification of shifts Incustomer preferences.

Questions 174

Which of the following is PRIMARILY responsible for deciding the classification of data in an organization?

Options:
A.

Data owner/steward

B.

Authorizing Official (AO)

C.

Chief Information Security Officer (CISO)

D.

Data custodian

Questions 175

Substituting capital equipment in place of direct labor can be economically Justified for which of the following scenarios?

Options:
A.

Volumes are forecasted to increase

B.

Material prices are forecasted to increase

C.

Implementing a pull system in production

D.

Functional layouts are being utilized

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.