Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 2

Questions 16

What is the MAIN reason security is considered as part of the system design phase instead of deferring to later phases?

Options:
A.

To ensure complexity introduced by security design is addressed in the beginning stages.

B.

To reduce the overall cost of incorporating security in a system.

C.

To prevent the system from being tampered with in the future.

D.

To prevent the users from performing unauthorized actions during the testing or operational phases.

APICS CPIM-8.0 Premium Access
Questions 17

Which of the below represents the GREATEST cloud-specific policy and organizational risk?

Options:
A.

Supply chain failure

B.

Loss of business reputation due to co-tenant activities

C.

Loss of governance between the client and cloud provider

D.

Cloud service termination or failure

Questions 18

A company uses planning bills of material (BOMs) in its planning process extensively. Which of the following scenarios would present the biggest challenge to this planning process?

Options:
A.

High variation in supplier delivery

B.

Low variation in the demand mix

C.

High new product introductions

D.

High manufacturing scrap rates

Questions 19

Which Open Systems Interconnection (OSI) layer is concerned with Denial-Of-Service (DoS) SYN flood attacks?

Options:
A.

Data

B.

Physical

C.

Network

D.

Transport

Questions 20

Which of the following benefits typically will be realized when switching from a functional to a cellular layout?

Options:
A.

Equipment utilization will be higher.

B.

Quality inspections will be reduced.

C.

Capital expenditures will be reduced.

D.

Products will have faster throughput.

Questions 21

What order BEST reflects the steps when adding threat modeling practices to a Software Development Life Cycle (SDLC)?

Options:
A.

Inventory use cases, categorize threats, evaluate business impact

B.

Understand attack front, identify trust levels, decompose application

C.

Inventory countermeasures, identify threats, implement mitigations

D.

Establish monitoring, identify risks, implement countermeasures

Questions 22

What General Data Protection Regulation (GDPR) principle says that data should be collected lawfully and with the person’s consent?

Options:
A.

Legitimate data collection

B.

Limitation of use

C.

Collection Categorization

D.

Collection limitation

Questions 23

What is the PRIMARY benefit an organization obtains by adapting a cybersecurity framework to their cybersecurity program?

Options:
A.

A structured risk management process

B.

A common set of security capabilities

C.

A structured cybersecurity program

D.

A common language and methodology

Questions 24

A company that uses concurrent engineering is likely to experience which of the following outcomes in the first period of a product's life cycle?

Options:
A.

Fewer product design changes

B.

An increase in obsolete inventory

C.

More accurate forecasting

D.

Conflicts between purchasing and engineering

Questions 25

An organization wishes to utilize a managed Domain Name System (DNS) provider to reduce the risk of users accessing known malicious sites when web browsing. The organization operates DNS forwarders that forward queries for all external domains to the DNS provider. Which of the following techniques could enable the organization to identify client systems that have attempted to access known malicious domains?

Options:
A.

DNS over Transmission Control Protocol (TCP)

B.

DNS sinkholing

C.

Deep packet inspection

D.

Domain Name System Security Extensions (DNSSEC)

Questions 26

Which of the following tactics can be employed effectively to reduce appraisal quality costs?

Options:
A.

Investing in prevention

B.

Conducting quality audits

C.

Loosening product specifications

D.

Implementing house of quality (HOQ)

Questions 27

An organization currently has a network with 55,000 unique Internet Protocol (IP) addresses in their private Internet Protocol version 4 (IPv4) network range and has acquired another organization and must integrate their 25,000 endpoints with the existing, flat network topology. If subnetting is not implemented, which network class is implied for the organization’s resulting private network segment?

Options:
A.

A

B.

B

C.

C

D.

E

Questions 28

Asymmetric cryptography uses which type of key to encrypt data?

Options:
A.

Private key

B.

Permanent key

C.

Parent key

D.

Public key

Questions 29

An organization has identified that an individual has failed to adhere to a given standard set by the organization. Based on the needs of the organization, it was decided that an exception process will be created. What is the PRIMARY benefit of establishing an exception process?

Options:
A.

Prevent future material audit findings.

B.

Provide administrators with more autonomy.

C.

Enable management of organizational risk.

D.

Ensure better Business Continuity (BC).

Questions 30

In pyramid forecasting, the "roll up" process begins with:

Options:
A.

combining individual product item forecasts into forecasts for product families.

B.

combining forecasts for product families into a total business forecast.

C.

allocating total business forecast changes to product families.

D.

allocating product family forecast changes to individual products.

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.