Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 2

Questions 16

Which of the following can allow an attacker to bypass authentication?

Options:
A.

Response tampering

B.

Machine enumeration

C.

User agent manipulation

D.

Social engineering

APICS CPIM-8.0 Premium Access
Questions 17

While doing a penetration test, auditors found an old credential hash for a privileged user. To prevent a privileged user's hash from being cached, what is the MOST appropriate policy to mandate?

Options:
A.

Add privileged user to the domain admin group.

B.

Add privileged users to the protected users group.

C.

Enable security options for each privileged user.

D.

Place each privileged user in a separate Kerberos policy.

Questions 18

An organization wishes to utilize a managed Domain Name System (DNS) provider to reduce the risk of users accessing known malicious sites when web browsing. The organization operates DNS forwarders that forward queries for all external domains to the DNS provider. Which of the following techniques could enable the organization to identify client systems that have attempted to access known malicious domains?

Options:
A.

DNS over Transmission Control Protocol (TCP)

B.

DNS sinkholing

C.

Deep packet inspection

D.

Domain Name System Security Extensions (DNSSEC)

Questions 19

Which of the following planes directs the flow of data within a Software-Defined Networking (SDN) architecture?

Options:
A.

Security

B.

Data

C.

Application

D.

Control

Questions 20

Which of the following tools is used to evaluate the impact that a production plan has on capacity?

Options:
A.

Demand time fence (DTF)

B.

Bill of resources

C.

Product routing

D.

Safety capacity

Questions 21

An attacker wants to decrypt a message and has no knowledge of what may have been in the original message. The attacker chooses to use an attack that will exhaust the keyspace in order to decrypt the message. What type of cryptanalytic attack is the attacker using?

Options:
A.

Ciphertext only

B.

Chosen ciphertext

C.

Brute force

D.

Known plaintext

Questions 22

In the context of mobile device security, which of the following BEST describes why a walled garden should be implemented?

Options:
A.

To track user actions and activity

B.

To prevent the installation of untrusted software

C.

To restrict a user's ability to change device settings

D.

To limit web access to only approved sites

Questions 23

What document MOST likely states an organization’s values?

Options:
A.

Union labor agreement

B.

Information protection policy

C.

Code of conduct

D.

Management standards

Questions 24

Which technology is BEST suited to establish a secure communications link between an individual’s home office and the organization’s Local Area Network (LAN)?

Options:
A.

Switched Port Analyzer (SPAN)

B.

Representational State Transfer (REST)

C.

Remote Desktop Protocol (RDP)

D.

Virtual Private Network (VPN)

Questions 25

When conducting a vulnerability test using a scanner tool, which unintended consequence can occur?

Options:
A.

Opening of previously closed ports

B.

Adding administrator rights on servers

C.

Performing a Cross-Site Scripting (XSS) attack

D.

Creating a Denial-Of-Service (DoS) condition

Questions 26

An organization has identified that an individual has failed to adhere to a given standard set by the organization. Based on the needs of the organization, it was decided that an exception process will be created. What is the PRIMARY benefit of establishing an exception process?

Options:
A.

Prevent future material audit findings.

B.

Provide administrators with more autonomy.

C.

Enable management of organizational risk.

D.

Ensure better Business Continuity (BC).

Questions 27

Bad actors with little expense can easily make calls. Which social engineer strategy is a telecommunications ONLY risk concept?

Options:
A.

Pretexting

B.

Diversion theft

C.

Phreaking

D.

Baiting

Questions 28

What is an important countermeasure to consider when hardening network devices and servers to reduce the effectiveness of unauthorized network scanning?

Options:
A.

Filter inbound logging and auditing configuration of all network devices.

B.

Filter inbound Internet Control Message Protocol (ICMP) messages at the network edge.

C.

Filter outbound logging and auditing configuration of all network devices.

D.

Filter outbound Internet Control Message Protocol (ICMP) messages at the network edge.

Questions 29

What is the MOST likely cause for a penetration tester having difficulties finding the stack to inject code?

Options:
A.

Advanced Threat Protection (ATP)

B.

Address Space Layout Randomization (ASLR)

C.

Structured exception handling overwrite protection

D.

Export address table filtering

Questions 30

What is the PRIMARY secure protocol used by a Content Delivery Network (CDN)?

Options:
A.

Internet Protocol Security (IPsec)

B.

Secure shell (SSH)

C.

Transport Layer Security (TLS)

D.

Secure File Transfer Protocol (SFTP)

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.