Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 4

Questions 46

The question below is based on the following information:

CPIM-8.0 Question 46

Work Center 1 has an available capacity of 1,200 hours per month. Which of the following amounts represents the cumulative difference between the required capacity and the available capacity of Months 1 through 3?

Options:
A.

50

B.

150

C.

1.250

D.

3.750

APICS CPIM-8.0 Premium Access
Questions 47

The production plan defines which of the following targets?

Options:
A.

Sales forecast

B.

Quantities of each product to be produced

C.

Level of output to be produced

D.

Business plans for the company

Questions 48

An organization uses an external Identity Provider (IdP) to secure internal, external, or third-party applications. Which of the following is the GREATEST risk to the organization?

Options:
A.

Unavailability of access logs

B.

Integrity of authentication mechanism

C.

Compromise of service

D.

Deletion of federated tokens

Questions 49

An order winner during the growth stage of a product's life cycle is:

Options:
A.

variety.

B.

availability.

C.

dependability.

D.

price.

Questions 50

Which of the following documents is the BEST reference to describe application functionality?

Options:
A.

Disaster Recovery Plan (DRP)

B.

System security plan

C.

Business Impact Analysis (BIA) report

D.

Vulnerability assessment report

Questions 51

An organization has hired a new auditor to review its critical systems infrastructure for vulnerabilities. Which of the following BEST describes the methodology the auditor will use?

Options:
A.

Select an appropriate sample size of changes to production servers related to critical systems within the audit period and ensure they adhere to documented policies and standards.

B.

Select an appropriate sample size of recently deployed servers and review their configuration files against the organization's policies and standards.

C.

Select all production servers related to critical systems and review their configuration files against the organization's policies and standards.

D.

Select an appropriate sample size of changes to recently deployed servers within the audit period and ensure they adhere to documented policies and standards.

Questions 52

Which of the following situations is most likely to occur when using a push system?

Options:
A.

Work centers receive work even if capacity is not available.

B.

Work centers are scheduled using finite capacity planning.

C.

Work centers operate using decentralized control.

D.

Work centers signal previous work centers when they are ready for more work.

Questions 53

Which of the following factors typically would distort a sales forecast that is based solely on shipment history?

Options:
A.

Material shortages

B.

Labor rate changes

C.

Currency exchange rates

D.

Customer demands

Questions 54

A low-cost provider strategy works best when which of the following conditions are met?

Options:
A.

Price competition among rivals is similar.

B.

Buyers are more price sensitive.

C.

There are many ways to achieve product differentiation.

D.

There are few industry newcomers.

Questions 55

Which of the following tools is used to evaluate the impact that a production plan has on capacity?

Options:
A.

Demand time fence (DTF)

B.

Bill of resources

C.

Product routing

D.

Safety capacity

Questions 56

Which of the following statements is true about total productive maintenance (TPM)?

Options:
A.

It uses statistical tools.

B.

It is part of the business strategy.

C.

It influences the product design process.

D.

It minimizes unscheduled breakdowns.

Questions 57

When performing threat modeling using Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation of Privilege (STRIDE), which of the following is an example of a repudiation threat?

Options:
A.

Using someone else's account

B.

Distributed Denial-Of-Service (DDoS)

C.

SQL Injection (SQLi)

D.

Modifying a file

Questions 58

An organization has integrated its enterprise resource planning system into its centralized Identity and Access Management (IAM) system to automate provisioning of access. A security audit revealed that privileged access granted within the ERP system is not visible in the IAM system. Which of the following controls BEST mitigates this risk?

Options:
A.

Implement step-up authentication for privileged functions within the ERP system.

B.

Implement a periodic review of privileged access within the ERP system.

C.

Implement an automated reconciliation process between ERP and IAM systems.

D.

Implement a periodic review of all ERP access within the IAM system.

Questions 59

Which of the following is a core subset of The Open Group Architecture Framework (TOGAF) enterprise architecture model?

Options:
A.

Security architecture

B.

Availability architecture

C.

Privacy architecture

D.

Data architecture

Questions 60

An organization has integrated its enterprise resource planning system into its centralized Identity and Access Management (IAM) system to automate provisioning of access. A security audit revealed that privileged access granted within the ERP system is not visible in the IAM system. Which of the following controls BEST mitigates this risk?

Options:
A.

Implement step-up authentication for privileged functions within the ERP system.

B.

Implement a periodic review of privileged access within the ERP system.

C.

Implement an automated reconciliation process between ERP and IAM systems.

D.

Implement a periodic review of all ERP access within the IAM system.

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.