Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 4

Questions 46

Which approach will BEST mitigate risks associated with root user access while maintaining system functionality?

Options:
A.

Creating a system where administrative tasks are performed under monitored sessions using the root account, with audits conducted regularly

B.

Implementing a policy where users log in as root for complex tasks but use personal accounts for everyday activities, with strict logging of root access

C.

Configuring individual user accounts with necessary privileges for specific tasks and employing “sudo” for occasional administrative needs

D.

Allowing key authorized personnel to access the root account for critical system changes, while other staff use limited accounts with “sudo” for routine tasks

APICS CPIM-8.0 Premium Access
Questions 47

Forecast error typically triggers forecast revision when it is:

Options:
A.

used in computing the tracking signal.

B.

associated with the Introduction stage of the product life cycle.

C.

continually increasing.

D.

caused by random variation.

Questions 48

An information security professional is considering what type of classification label to place on an organization’s software code in order to implement proper access controls. The code is considered intellectual property data and would have a catastrophic impact to the organization if compromised or destroyed. Which of the following would be the MOST appropriate classification label to apply?

Options:
A.

Sensitive

B.

Confidential

C.

Internal Use Only

D.

Public

Questions 49

At which Open Systems Interconnection (OSI) layer does User Datagram Protocol (UDP) function?

Options:
A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 3

Questions 50

Which of the following tools shows process changes and random variation over time?

Options:
A.

Check sheet

B.

Control chart

C.

Histogram

D.

Pareto analysis

Questions 51

A consultant has been engaged to support the team in analyzing why the development of a new software product has slipped schedule by a year. The consultant discovered an increase of the functionality requirements due to the failure of the asset tracking program. Which of the following BEST describes which system lifecycle element is impacted?

Options:
A.

Stakeholder identification

B.

Vision statement

C.

Operational efficiency

D.

Solution boundary

Questions 52

A Software As A Service (SaaS) solution was compromised due to multiple missing security controls. The SaaS deployment was rushed and the Software Development Life Cycle (SDLC) was not followed. Which SDLC phase would have been MOST effective in preventing this failure?

Options:
A.

Maintenance

B.

Design

C.

Testing

D.

Requirements

Questions 53

Which of the following MUST be in place for security to be effective in an organization?

Options:
A.

Security objectives are documented and in line with the organization’s mission and goals.

B.

Security policies are in line with international standards.

C.

Technology strategy decisions have the involvement and approval of the security organization.

D.

Risk assessments on business plans include security issues as part of the analysis.

Questions 54

A security team member is assessing an organization’s backup strategy that follows the 3-2-1 rule. How many different types of media should they inspect to validate?

Options:
A.

6

B.

3

C.

2

D.

1

Questions 55

Access Control Lists (ACL), protection bits, and file passwords are typical examples of which of the following access control methods?

Options:
A.

Discretionary.

B.

Attribute-based.

C.

Mandatory.

D.

Role-based.

Questions 56

Which security concept applies if an architecture diagram illustrates a particular user/role combination with access to an asset or applicaton?

Options:
A.

Non-repudiation

B.

Identification

C.

Authorization

D.

Authentication

Questions 57

An organization is implementing Zero Trust Network Access (ZTNA) and needs a strategy to measure device trust for employee laptops. Which measurement strategy is BEST suited and why?

Options:
A.

Remote using a Trusted Platform Module (TPM) due to better protection of the keys

B.

Local using Trusted Platform Module (TPM) because low-level access software can be accessed

C.

Local using Trusted Platform Module (TPM) because of benefits from Segregation Of Duties (SoD)

D.

Remote using a scanning device because of benefits from Segregation Of Duties (SoD)

E.

Local using Mobile Device Management (MDM) because of device policy enforcement

Questions 58

Which of the following techniques would a group use to prioritize problems?

Options:
A.

Critical path analysis

B.

Pareto analysis

C.

Scatter charts

D.

Cause-and-effect diagrams

Questions 59

Which of the following items does the master scheduler have the authority to change in the master scheduling process?

Options:
A.

Product mix

B.

Aggregate volume

C.

Engineering change effectivity date

D.

Customer order quantities

Questions 60

Based on the above table, calculate the mean absolute deviation (MAD).

CPIM-8.0 Question 60

Options:
A.

-25

B.

6.25

C.

18.75

D.

20

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.