Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free APICS CPIM-8.0 Practice Exam with Questions & Answers | Set: 9

Questions 121

Which of the following BEST describes an individual modifying something the individual is not supposed to?

Options:
A.

Exfiltration

B.

Tampering

C.

Spoofing

D.

Repudiation

APICS CPIM-8.0 Premium Access
Questions 122

Which of the following design considerations would offer the BEST protection against unauthorized access to the facility?

Options:
A.

Allowing only one person to enter at a time

B.

Auditing access logs annually

C.

Limiting access to regular business hours only

D.

Establishing entry points from public areas only

Questions 123

During an onsite audit, an assessor inspected an organization’s asset decommission practice. Which of the following would MOST likely be a finding from a security point of view?

Options:
A.

Solid State Drives (SSD) were degaussed along with hard drives.

B.

The Non-Disclosure Agreement (NDA) between the organization and its data disposal service was more than 3 years old.

C.

Hard drives from older assets replaced defective hard drives from current assets of similar classification levels.

D.

Data classifications were not clearly identified.

Questions 124

Asymmetric cryptography uses which type of key to encrypt data?

Options:
A.

Private key

B.

Permanent key

C.

Parent key

D.

Public key

Questions 125

Which of the following is a disadvantage of using federated identity?

Options:
A.

The administrative burden is increased

B.

The application has access to the user’s credentials

C.

Applications may need complex modifications to implement

D.

A compromised credential provides access to all the user’s applications

Questions 126

Zombieload, Meltdown, Spectre, and Fallout are all names of bugs that utilized which of the following types of attack?

Options:
A.

Side-channel

B.

Fault injection

C.

Man-In-The-Middle (MITM)

D.

Frequency analysis

Questions 127

Which of the following incorporates design techniques promoted by Crime Prevention Through Environmental Design (CPTED)?

Options:
A.

Capacity of residents to act individually should be increased.

B.

Landscape design features should be used to create the impression of a fortress.

C.

Multiple entrances and exits should be used to keep traffic flowing smoothly through the facility.

D.

Communal areas with amenities should be created to encourage activity and use.

Questions 128

When a third-party needs to receive privileged information, which of the following would be the BEST to

transport the data?

Options:
A.

Layer 2 Tunneling Protocol

B.

Encrypted at rest

C.

Virtual Private Network (VPN)

D.

Encrypted in transit

Questions 129

The primary outcome of frequent replenishments in a distribution requirements planning (DRP) system is that:

Options:
A.

lead times to customers decrease.

B.

transportation costs decrease.

C.

the level of required safety stock is reduced.

D.

more efficient load consolidation occurs.

Questions 130

A health care organization's new cloud-based customer-facing application is constantly receiving security events from dubious sources. What BEST describes a security event that compromises the confidentiality, integrity or availability of the application and data?

Options:
A.

Failure

B.

Incident

C.

Attack

D.

Breach

Questions 131

An organization implemented a threat modeling program focusing on key assets. However, after a short time it became clear that the organization was having difficulty executing the threat modeling program.

Which approach will MOST likely have been easier to execute?

Options:
A.

System-centric approach

B.

Attacker-centric approach

C.

Asset-centric approach

D.

Developer-centric approach

Questions 132

A product manager wishes to store sensitive development data using a cloud storage vendor while maintaining exclusive control over passwords and encryption credentials. What is the BEST method for meeting these requirements?

Options:
A.

Local self-encryption with passwords managed by a local password manager

B.

Client-side encryption keys and passwords generated dynamically during cloud access sessions

C.

Zero-knowledge encryption keys provided by the cloud storage vendor

D.

Passwords generated by a local password manager during cloud access sessions and encrypted in transit

Questions 133

An organization has to conduct quarterly reviews of user authorization access to its primary financial application. Which position is responsible for performing these reviews?

Options:
A.

Internal audit manager

B.

Information Security Manager (ISM)

C.

Data custodian

D.

Data owner

Questions 134

An organization decides to conduct penetration testing. Senior management is concerned about the potential loss of information through data exfiltration. The organization is currently preparing a major product launch that is time-sensitive. Which of the following methods of testing is MOST appropriate?

Options:
A.

Gray box

B.

Green box

C.

Black box

D.

White box

Questions 135

It takes an average of 3 hours to set up a model and 1 hour to run, but depending on the complexity of the models, the setup time can be significantly different. Last week. 2 modelers were working on different projects. Each worked 40 hours. One modeler finished 5 models a day, and the other finished 1 model a day. What was the demonstrated capacity last week?

Options:
A.

25models

B.

15models

C.

10models

D.

30models

APICS Free Exams

APICS Free Exams
Get the best free APICS exam study materials and practice tests at Examstrack. Perfect your APICS preparation by visiting Examstrack.