Pre-Winter Sale 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 9

Questions 121

Given the following data, calculate the appropriate takt time:

CPIM-8.0 Question 121

Options:
A.

0.25 minutes

B.

1 minute

C.

2 minutes

D.

4 minutes

APICS CPIM-8.0 Premium Access
Questions 122

An organization is updating an Application Programming Interface (API) to support requests coming from mobile applications distributed on public application stores. The API’s primary function is to supply confidential documents when users request them within the mobile application. Which approach would BEST respond to this use case?

Options:
A.

Require that the user supplies their credential to access confidential documents.

B.

Require a Virtual Private Network (VPN) connection to the organization's network to access confidential documents.

C.

Implement Security Assertion Markup Language (SAML) to validate the identity of the user requesting access to confidential documents.

D.

Implement Open Authorization (OAuth) 2.0 to require the users to request permission to access confidential documents.

Questions 123

An organization wants to ensure a risk does not occur. The action taken is to eliminate the attack surface by uninstalling vulnerable software. Which risk response strategy did the organization take?

Options:
A.

Accepting risk

B.

Avoiding risk

C.

Mitigating risk

D.

Transferring risk

Questions 124

An advantage of applying ABC classification to a firm's replenishment items is that:

Options:
A.

it distinguishes independent demand from dependent demand.

B.

it allows planners to focus on critical products.

C.

it provides better order quantities than the economic order quantity (EOQ).

D.

it allows the firm to utilize time-phased order point (TPOP).

Questions 125

An information security auditor is creating an audit program to assess endpoint security controls for portable storage media movement. Which type of control will MOST likely be part of the program?

Options:
A.

Detective control

B.

Device control

C.

Recovery control

D.

Network control

Questions 126

An organization processes healthcare data, stores credit card data, and must provide audited financial statements, each of which is controlled by a separate compliance standard. To support compliance against multiple standards and the testing of the greatest number of controls with a limited budget, how would the internal audit team BEST audit the organization?

Options:
A.

Conduct an integrated audit against the most stringent security controls.

B.

Combine the systems into a single audit and implement security controls per applicable standard.

C.

Combine the systems into a single audit against all of the associated security controls.

D.

Audit each system individually and implement the applicable standard specific security controls.

Questions 127

An support technician is contacted by an imposter claiming to be a supervisor and is asked specifically to perform a task that violates the organization’s security policies. What type of attack is this?

Options:
A.

Spoofing

B.

Spear phishing

C.

Piggybacking

D.

Insider threat

Questions 128

Which of the following is an access control method that organizations can use to prevent unauthorized access?

Options:
A.

Bring Your Own Device (BYOD)

B.

Man-in-the-Middle (MITM)

C.

Token-based authentication

D.

Digital verification

Questions 129

An organization is working to secure its Supervisory Control And Data Acquisition (SCADA) system, Which monitors water supply to the city. What type of security should the organization ensure FIRST?

Options:
A.

Endpoint security

B.

Network security

C.

Cyber physical security

D.

Cloud security

Questions 130

Which of the following is a document that will be obtained at the end of an asset’s lifecycle?

Options:
A.

Asset registry

B.

Bill of lading

C.

Certificate of disposal

D.

Master data record

Questions 131

A regular remote user executed an application that allowed the execution of commands with elevated permissions. It was allowed to create new users, start and stop services, and view critical log files. Which exploit type did the application use in this scenario?

Options:
A.

Side-channel

B.

Fault injection

C.

Privilege escalation

D.

Buffer overflow

Questions 132

An organization’s external auditors have issued a management letter identifying significant deficiencies related to the effectiveness of the previous year’s global access certification. The organization wants to move from a department-based access control system to a Role-Based Access Control (RBAC) system. In addition to quickly and securely provisioning users by granting membership into predefined and approved roles, which of these presents the BEST reason to do so?

Options:
A.

The organization can implement both mandatory and dynamic access controls, except where they would be in conflict.

B.

The organization can clone roles, saving time and granting broad access to persons within the same department.

C.

The organization can give a person holding multiple roles the appropriate levels of access to specific data for each role.

D.

The organization can implement both static and dynamic access controls, adjusting them to fit any individual’s access needs.

Questions 133

A planner has chosen to increase the order point for a raw material. Which of the following costs is most likely to increase?

Options:
A.

Carrying

B.

Ordering

C.

Landed

D.

Product

Questions 134

Which of the following situations is most likely to occur when using a push system?

Options:
A.

Work centers receive work even if capacity is not available.

B.

Work centers are scheduled using finite capacity planning.

C.

Work centers operate using decentralized control.

D.

Work centers signal previous work centers when they are ready for more work.

Questions 135

Up-to-date Information about production order status is required to do which of the following tasks?

Options:
A.

Calculate current takt time.

B.

Determine planned orders.

C.

Replenish kanban quantities.

D.

Calculate the cost of work in process (WIP).

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.