Big 11.11 Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 6

Questions 76

Which of the common vulnerabilities below can be mitigated by using indexes rather than actual portions of file names?

Options:
A.

Open redirect

B.

Cross-Site Request Forgery (CSRF)

C.

Path traversal

D.

Classic buffer overflow

APICS CPIM-8.0 Premium Access
Questions 77

Which of the following describes the 3 MAIN roles of the identity-delegation model?

Options:
A.

Application server, web server, and delegate

B.

Application server, proxy server, and delegate

C.

Delegator, delegate, and service provider

D.

Delegator, application server, and service provider

Questions 78

An organizational policy requires that any data from organization-issued devices be securely destroyed before disposal. Which method provides the BEST assurance of data destruction?

Options:
A.

Incinerating

B.

Reformatting

C.

Degaussing

D.

Erasing

Questions 79

An organization has a legacy application used in production. Security updates are no longer provided, which makes the legacy application vulnerable. The legacy application stores Social Security numbers and credit card numbers. Which actions will BEST reduce the risk?

Options:
A.

Submit a security exception for the application and remove it from vulnerability scanning

B.

Report to the privacy officer and increase logging and monitoring of the application

C.

Continue to operate and monitor the application until it is no longer needed

D.

Implement compensating controls and prioritize upgrading the application

Questions 80

Which of the following conditions is most likely to result in planned production that is greater than the total demand over the sales and operations planning (S&OP) horizon for a product family that is

made to stock?

Options:
A.

An increase in the customer service level is planned for the product family.

B.

New models are being added to the product family.

C.

Planned ending inventory for the product family is less than the beginning inventory.

D.

There is a long-term upward trend in demand for the product family.

Questions 81

Which of the following methods places a replenishment order when the quantity on hand falls below a predetermined level?

Options:
A.

Min-max system

B.

Fixed order quantity

C.

Periodic review

D.

Available-to-promlse (ATP)

Questions 82

What is the BEST item to consider when designing security for information systems?

Options:
A.

The comprehensive level of assurance required

B.

The jurisdiction of the information system

C.

The security requirements of the board

D.

The Disaster Recovery Plan (DRP)

Questions 83

Which of the following incorporates design techniques promoted by Crime Prevention Through Environmental Design (CPTED)?

Options:
A.

Capacity of residents to act individually should be increased.

B.

Landscape design features should be used to create the impression of a fortress.

C.

Multiple entrances and exits should be used to keep traffic flowing smoothly through the facility.

D.

Communal areas with amenities should be created to encourage activity and use.

Questions 84

Improvements in an Input/output control (I/O control) system will most likely lead to:

Options:
A.

flattened bills of material (BOMs).

B.

a change in operation sequencing.

C.

reduction in queue size and queue time.

D.

fewer engineering change notifications.

Questions 85

Which of the following states of data becomes MOST important to protect as organizations continue to transition toward Application Programming Interface (API)-based solutions?

Options:
A.

Data at rest

B.

Data in use

C.

Data in transit

D.

Data on the client machine

Questions 86

A customer of a financial Institution denies that a transaction occurred. Which of the following is used to provide evidence evidence that the customer performed the transaction?

Options:
A.

Authorization controls

B.

Two-Factor Authentication (2FA)

C.

Non-repudiation controls

D.

Access audit

Questions 87

Components of an organization's Immediate industry and competitive environment Include:

Options:
A.

political factors.

B.

interest rates.

C.

substitute products.

D.

sociocultural forces.

Questions 88

The Chief Information Security Officer (CISO) is meeting with the external network security evaluation team's blue team leader to confirm the internal system administrator's work schedules, hardware lists, and logistical support for their debriefing. Which of the following would be the MOST likely topic of discussion for the briefing?

Options:
A.

Remediation

B.

Administration

C.

Authorization

D.

Enumeration

Questions 89

A Managed Service Provider (MSP) provides hardware and software support for system maintenance and upgrades to a client organization. Who is MOST responsible for auditing security controls related to the hardware and software?

Options:
A.

Chief Information Security Officer (CISO) of the MSP

B.

Information Technology (IT) director of the client

C.

Chief Information Security Officer (CISO) of the client organization

D.

Information Technology (IT) director of the MSP

Questions 90

A life cycle assessment (LCA) would be used to determine:

Options:
A.

the length of a long-term agreement.

B.

how an Item should be scheduled.

C.

environmental aspects and impacts.

D.

If risk pooling would reduce inventory investment.

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.