Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 7

Questions 91

The Information Technology (IT) manager of a large organization has been tasked with implementing a distributed third-party Identity As A Service (IDaaS). The local security team is concerned that the Identity Provider (IdP) and resource provider have direct connectivity outside of enterprise control. Which of the following authentication methods BEST address this concern?

Options:
A.

Federation authorities access list

B.

Manual registration

C.

Proxied federation

D.

Signed assertion

APICS CPIM-8.0 Premium Access
Questions 92

The Business Continuity Plan (BCP) has multiple components. The information security plan portion must prioritize its efforts. Which 3 aspects of information security MUST be prioritized?

Options:
A.

Confidentiality, integrity, availability

B.

Physical security, access control, asset protection

C.

Intent, capability, opportunity

D.

Threat level, network security, information disposal

Questions 93

Which of the following is a component of the Clark-Wilson model?

Options:
A.

Transformation procedures

B.

Enforcement rules

C.

Data classifications

D.

Integrity labels

Questions 94

A financial services organization wants to deploy a wireless network. Which of the following is the WEAKEST option for ensuring a secure network?

Options:
A.

Separating internal wireless users from guests

B.

Media Access control (MAC) address filtering

C.

Multi-Factor Authentication (MFA)

D.

Deploy mutual authentication between the client and the network

Questions 95

Which of the following techniques would a group use to prioritize problems?

Options:
A.

Critical path analysis

B.

Pareto analysis

C.

Scatter charts

D.

Cause-and-effect diagrams

Questions 96

A security consultant is working with an organization to help evaluate a proposal received from a new managed security service provider. There are questions about the confidentiality and effectiveness of the provider's system over a period of time. Which of the following System And Organization Controls (SOC) report types should the consultant request from the provider?

Options:
A.

SOC 2 Type 1

B.

SOC 2 Type 2

C.

SOC 1 Type 1

D.

SOC 1 Type 2

Questions 97

Health information stored in paper form may be destroyed using which of the following methods?

Options:
A.

Shredding

B.

Degaussing

C.

De-identification

D.

Archiving

Questions 98

Which of the following presents the GREATEST benefit to an organization's security posture when a change management process is implemented?

Options:
A.

Accuracy of Key Risk Indicators (KRI) reported to senior management

B.

Ensure the integrity of the organization's assets

C.

Backups being completed in a timely manner

D.

Accuracy of Key Performance Indicators (KPI) reported to senior management

Questions 99

Once an organization has identified and properly classified their information and data assets, policies and procedures are created to establish requirements for the handling, protection, retention, and disposal of those assets. Which solution is the BEST method to enforce data usage policies, discover sensitive data, monitor the use of sensitive data, and ensure regulatory compliance and intellectual property protection?

Options:
A.

Application whitelisting

B.

Data governance

C.

Data loss prevention (DLP)

D.

Intrusion detection and prevention system (IDPS)

Questions 100

Which burden of proof has been applied when a workplace investigation has a 51 percent or greater certainty that allegations are true?

Options:
A.

Preponderance of evidence

B.

Beyond a reasonable doubt

C.

Some credible evidence

D.

Clear and convincing

Questions 101

An organization is attempting to address the security risk introduced by employees writing down door entry passcodes. Which of the following security measures BEST mitigates this risk?

Options:
A.

Privileged Access Management (PAM) policy

B.

Multi-Factor Authentication (MFA)

C.

Video log monitoring

D.

Notification alerts

Questions 102

A financial services organization wants to deploy a wireless network. Which of the following is the WEAKEST option for ensuring a secure network?

Options:
A.

Separating internal wireless users from guests

B.

Media Access control (MAC) address filtering

C.

Multi-Factor Authentication (MFA)

D.

Deploy mutual authentication between the client and the network

Questions 103

The project manager has updated the project steering committee that a security vulnerability was found after applying the system security baseline, and remediation has been completed to close the vulnerability. What is the BEST next step for the project?

Options:
A.

Update the security baseline and continue with the next project task.

B.

Proceed with the next project task to meet the project deadlines.

C.

Obtain approval from the project steering, committee to revise the system security baseline.

D.

Create a change request for the system baseline revision.

Questions 104

The costs provided in the table below are associated with buying a quantity larger than immediately needed. What Is the total landed cost based on this table?

Cost CategoryCost

Custom fees$125

Freight$700

Warehouse rent$200

Matenal cost$500

Options:
A.

$825

B.

$1,325

C.

$1,400

D.

$1,525

Questions 105

An organization has been struggling to improve their security posture after a recent breach. Where should the organization focus their efforts?

Options:
A.

Business Continuity Plan (BCP)

B.

Service-Level Agreements (SLA)

C.

Common configuration enumerations

D.

National vulnerabilities database

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.