We at Crack4sure are committed to giving students who are preparing for the APICS CPIM-8.0 Exam the most current and reliable questions . To help people study, we've made some of our Certified in Planning and Inventory Management (CPIM 8.0) exam materials available for free to everyone. You can take the Free CPIM-8.0 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
A lengthy power outage led to unavailability of time critical services resulting in considerable losses. It was determined that a backup electrical generator did not work as intended at the time of the incident due to lack of fuel. What should the security consultant FIRST Investigate?
A Structured Query Language (SQL) database is hosted on a hardened, secure server. All unused ports are locked down, but external connections from untrusted networks are still required to be allowed through. What is the BEST way to ensure transactions to/from this server remain secure?
An organization routes traffic between two of its sites using non-revenue network paths provided by peers on an Internet exchange point. What is the MOST appropriate recommendation the organization's security staff can make to prevent a compromise?
Which of the following techniques would a group use to prioritize problems?
When resolving conflicts, which canon within the ISC2 Code of Ethics requires members to consider duties to principals and Individuals?
An organization has hired a new auditor to review its critical systems infrastructure for vulnerabilities. Which of the following BEST describes the methodology the auditor will use?
An organization's security policy requires remote hosts to be authenticated before they can access network resources. Which of the following is the BEST option for the organization to enforce its policy?
Which of the following sampling techniques is BEST suited for comprehensive risk assessments?
What is the total load requirement for this work center based on the following data?
An effective approach to projecting requirements for materials with long lead times Includes which of the following options?
Which of the following actions best supports a company's strategic focus on delivery speed to improve competitive advantage?
An organization is running a cloud-based application to process the information obtained at point-of-sale devices. Which guideline should be applied to the application?
Global outsourcing and shared suppliers serving an industry are drivers of which category of risk?
What function prevents unauthorized devices from gaining access to a network?
Which of the following methods places a replenishment order when the quantity on hand falls below a predetermined level?
An organization has a requirement that all documents must be auditable and that the original is never modified once created. When designing the system, what security model MUST be implemented in order to meet this requirement?
If an organization wanted to protect is data against loss of confidentiality in transit, which type of encryption is BEST?
Which of the following is PRIMARILY responsible for deciding the classification of data in an organization?
An organization is planning to streamline its Identity and Access Management (IAM) processes and platform. The executive team mandated a compact platform to efficiently manage identities for internal and third-party services access. What is the BEST platform choice?
An organization has a legacy application used in production. Security updates are no longer provided, which makes the legacy application vulnerable. The legacy application stores Social Security numbers and credit card numbers. Which actions will BEST reduce the risk?
Open Authorized (OAuth) has been chosen as technology to use across applications in the enterprise. Which of the following statements is TRUE about an OAuth token?
A security team leader needs to communicate the value of the security program. As the security team leader determines the return on security investments, what is the MOST important aspect to incorporate?
Which of the following may authorize an organization to monitor an employee’s company computer and phone usage?
Which of the following is the fundamental difference between finite loading and other capacity planning approaches?
Under which of the following conditions is excess capacity most likely a good substitute for safety stock?
The horizon for forecasts that are input to the sales and operations planning (S&OP) process should be long enough that:
A security engineer is responsible for verifying software reliability prior to commercial deployment. Which of the following factor would BEST be verified to ensure that the software stays reliable?
Which of the following MUST exist for an activity to be considered an audit?
Which of the following is the MOST effective approach to reduce the threat of rogue devices being introduced to the internal network?
An information security professional has been tasked with remediating vulnerabilities identified during a recent penetration test. Which of the following sections of the penetration results report would be MOST preferable to remediate hosts one at a time?
Access Control Lists (ACL), protection bits, and file passwords are typical examples of which of the following access control methods?
Which of the following can allow an attacker to bypass authentication?
A new organization building is being designed and the security manager has been asked for input on needed security requirements. Which of the following controls are MOST applicable to this scenario?
A security engineer is reviewing Incident Response (IR) roles and responsibilities. Several roles have static elevated privileges in case an incident occurs. Instead of static access, what is the BEST access method to manage elevated privileges?
A contractor hacked into an unencrypted session on an organization's wireless network. Which authentication configuration is MOST likely to have enabled this?
Which of the following is the MOST important consideration in a full-scale disaster recovery test?
During an emergency management and planning session, an organization is discussing how to identify, prevent, prepare for, or respond to emergencies. Which of the following will provide the BEST possible outcome?
APerform drills on a recurring basis.
B.Harden all critical facilities.
C.Outsource to an external organization.
D.Allocate 100% of required funds.
A healthcare organization is preparing an exercise test plan of its Disaster Recovery Plan (DRP) for the Electronic Medical Record (EMR) application. The Business Continuity (BC) analyst is reviewing the requirements of the DRP. The EMR must provide basic charting services within 4 hours, must not lose more than 15 minutes of data, and must be fully functional within 12 hours. At the completion of the exercise, the analyst is preparing a lessons learned report and notes that the EMR was available after 3 hours and 25 minutes of data was lost. Which PRIMARY requirement needs to be addressed because of the exercise?
An information system containing Protected Health Information (PHI) will be accessed by doctors, nurses, and others working in a hospital. The same application will be used by staff in the pharmacy department only for dispensing prescribed medication. Additionally, patients can log in to view medical history. The system owner needs to propose an access control model that considers environment, situation, compliance, and security policies while dynamically granting the required level of access. Which access control model is the MOST suitable?
When starting an external benchmarking study, a firm must first:
In a make-to-stock (MTS) environment, the master production schedule (MPS) Is usually a schedule of which of the following types of items?
An organization is transitioning from a traditional server-centric infrastructure to a cloud-based Infrastructure. Shortly after the transition, a major breach occurs to the organization's databases. In an Infrastructure As A Service (IaaS) model, who would be held responsible for the breach?
As a result of a fault at a cloud service provider’s data center, the customer accounts of a utility organization were corrupted. Under the European Union’s (EU) General Data Protection Regulation (GDPR), which entity bears responsibility for resolving this?
Which of the following describes the 3 MAIN roles of the identity-delegation model?
What is the MAIN benefit of network segmentation?
What is the BEST protection method to ensure that an unauthorized entry attempt would fail when securing highly sensitive areas?
Which of the following capabilities BEST distinguishes a Next-Generation Firewall (NGFW) from a traditional firewall?
Which of the following statements is true about total productive maintenance (TPM)?
The question below is based on the following alternative schedules for a lot of 1,200.
A company works 8-hour, single-shift days. Setups are 4 hours for Operation 20 and 4 hours for Operation 40. Each operation has multiple machines available.
Which of the following statements is correct?
In pyramid forecasting, the "roll up" process begins with:
Which of the following factors typically would distort a sales forecast that is based solely on shipment history?
An organization donates used computer equipment to a non-profit group. A system administrator used a degausser on both the magnetic and Solid State Drives (SSD) before delivery. A volunteer at the non-profit group discovered some of the drives still contained readable data and alerted the system administrator. What is the BEST solution to ensure that computer equipment does not contain data before release?
A security analyst modifies the organization’s baselines to align the controls more closely with specific security and privacy requirements. Which security concept is this an example of?
Following the go-live of a new financial software, an organization allowed the Information Technology (IT) officer to maintain all rights and access permissions to help the organization staff should they have challenges in their day-to-day work. What is the BEST way to categorize the situation?
An organization currently has a network with 55,000 unique Internet Protocol (IP) addresses in their private Internet Protocol version 4 (IPv4) network range and has acquired another organization and must integrate their 25,000 endpoints with the existing, flat network topology. If subnetting is not implemented, which network class is implied for the organization's resulting private network segment?
One way to mitigate liability risk in the supply chain is to:
An organization’s computer incident response team PRIMARILY responds to which type of control?
While conducting an information asset audit, it was determined that several devices were running unpatched Operating Systems (0S). Further review Indicated the OS was no longer supported by the vendor. Which of the following BEST indicates the appropriate asset lifecycle stage of the devices?
Forecast error typically triggers forecast revision when it is:
Which of the following does a federated Identity Provider (IDP) need in order to grant access to identity information?
Which of the following MUST be checked during the validation of software verification capabilities?
An organization provides customer call center operations for major financial service organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?
After a data loss event, an organization is reviewing its Identity and Access Management (IAM) governance process. The organization determines that the process is not operating effectively. What should be the FIRST step to effectively manage the IAM governance process?
An organization currently has a network with 55,000 unique Internet Protocol (IP) addresses in their private Internet Protocol version 4 (IPv4) network range and has acquired another organization and must integrate their 25,000 endpoints with the existing, flat network topology. If subnetting is not implemented, which network class is implied for the organization’s resulting private network segment?
An organization has been struggling to improve their security posture after a recent breach.
Where should the organization focus their efforts?
Which of the following is a methodology for threat modeling in application?
Which of the following are steps involved in the identity and access provisioning lifecycle?
Broadcast traffic is causing network performance degradation of sensitive equipment.
Which of the following methods is used to prevent the broadcast traffic from impacting availability?
An OpenID Connect (OIDC) authorization server received two requests from a client. The server identifies the request as replay attack and rejects the request. Which of the following BEST describes these requests?
A security officer has been tasked with performing security assessments on the organization’s in the current calendar year. While collecting data, the officer realizes that more than one business until will be engaged in the assessment. What activity MUST be included in the data collection phase?
What is the BEST reason to include a Hardware Security Module (HSM) in the key management system when securing cloud storage?
When considering Defense in Depth (DiD) as part of a network’s architectural design, what is the FIRST layer in a multi-layered defensive strategy?
A firm that currently produces all items to stock is implementing the concept of postponement in all new product designs. Which of the following outcomes is most likely to result?
Which threat modeling methodology is focused on assessing risks from organizational assets?
Increased use of third-party logistics (3PL) services is likely to have which of the following effects on a firm's balance sheet?
According to best practice, at which step in the system lifecycle shall a security professional begin involvement?
During the initiation phase of a project to acquire a customer relation management system, what is the FIRST step a project team will take for early integration of security?
While doing a penetration test, auditors found an old credential hash for a privileged user. To prevent a privileged user's hash from being cached, what is the MOST appropriate policy to mandate?
An organization recently created a new accounting department, and that department is critical in the event of a disaster for the operations to continue. Which steps should the organization take to create a Business Continuity Plan (BCP)?
In which of the following circumstances is an organization MOST likely to report the accidental release of personal data to the European Union (EU) General Data Protection Regulation (GDPR) supervisory authority and affected users?
Which of the following product design approaches are likely to reduce time to market for a global supply chain?
A newer automotive supplier has not fully developed its information technology (IT) systems. The supplier has Just received a contract from a large automotive manufacturer which requires the supplier to use electronic data interchange (EDI) transactions for receiving orders, sending advance ship notices (ASNs), and receiving invoice payments. What strategy can the supplier adopt to immediately meet the EDI requirements?
An organization is updating an Application Programming Interface (API) to support requests coming from mobile applications distributed on public application stores. The API’s primary function is to supply confidential documents when users request them within the mobile application. Which approach would BEST respond to this use case?
What is the BEST item to consider when designing security for information systems?
An organization experienced multiple compromises of endpoints, leading to breaches of systems and data. In updating its strategy to defend against these threats, which of the following BEST considers the organization’s needs?
A work center has 3 machines that are all run at the same time with a single worker. The work center has an efficiency of 75% and a utilization of 100%. What is the work center's capacity in standard hours for an 8-hour shift?
Which specification enables organizations to ensure penetration test results are documented using open, machine-readable standards?
A security team is analyzing the management of data within the human resources systems, as well as, the intended use of the data, and with whom and how the data will be shared. Which type of assessment is the team MOST likely performing?
After reviewing the output of a threat modelling workshop, the development manager decides not to implement the application features where issues were identified. What is the BEST description of how the threats from the workshop are being addressed?
An organization intends to host an application on a multi-tenant Infrastructure as a Service (IaaS) platform. Which of the following measures are MOST important to ensure proper protection of sensitive information?
Which of the following is a PRIMARY benefit of sharing assessment results among key organizational officials across information boundaries?
An external audit is conducted on an organization's cloud Information Technology (IT) infrastructure. This organization has been using cloud IT services for several years, but its use is not regulated in any way by the organization and security audits have never been conducted in the past. Which task will be the MOST challenging to conduct an effective security audit?
An organization uses an external Identity Provider (IdP) to secure internal, external, or third-party applications. Which of the following is the GREATEST risk to the organization?
When developing information security policies, What is the PRIMARY concern?
Which of the following is an information security management framework?
Disaster Recovery Plan (DRP) training can be considered complete when the participants
During the sales and operations planning (S&OP) process, which of the following tasks is the primary responsibility of the functional representatives on the supply planning team?
Which approach will BEST mitigate risks associated with root user access while maintaining system functionality?
The planned channels of Inventory disbursement from one or more sources to field warehouses are known as:
The question below is based on the following standard and actual data of a production order
Which of the following statements about variances is true?
Which of the following Secure Shell (SSH) remote access practices is MOST suited for scripted functions?
An organization discovered that malicious software was installed on an employee’s work laptop and allowed a competing vendor to access confidential files. The employee was fully aware of the policy not to install unauthorized software on the organization laptop. What is the BEST automated security practice for an organization to implement to avoid this situation?
A company assembles kits of hand tools after receipt of the order from distributors and uses two-level master scheduling. The appropriate levels of detail for the forecasts that are input to master scheduling would be total number of kits and:
Which of the following incorporates design techniques promoted by Crime Prevention Through Environmental Design (CPTED)?
Which of the following BEST effective when protecting against insider threats?
An organization needs a firewall that maps packets to connections and uses Transmission Control Protocol/Internet Protocol (TCP/IP) header fields to keep track of connections. Which type of firewall will be recommended?
What is an important countermeasure to consider when hardening network devices and servers to reduce the effectiveness of unauthorized network scanning?
A large organization is planning to lay off half of its staff. From an information security point of view, what is the BEST way of approaching affected staff?
An organization wants to establish an information security program and has assigned a security analyst to put it in place. What is the NEXT step?
Which of the following factors is the MOST important consideration for a security team when determining whether cryptographic erasure can be used for disposal of a device?
An organization is restructuring its network architecture in which system administrators from the corporate office need to be able to connect to the branch office to perform various system maintenance activities. What network architecture would be MOST secure?
A newly hired Chief Information Security Officer (CISO) is now responsible to build a third-party assurance for their organization. When assessing a third-party, which of the following questions needs to be answered?
An organizational policy requires that any data from organization-issued devices be securely destroyed before disposal. Which method provides the BEST assurance of data destruction?
Objective security metrics tend to be easier to gather, easier to interpret, and easier to include in reports to management.
What is the BEST objective metric for the effectiveness of a security awareness training?
A security engineer needs to perform threat modeling on a microprocessor design for an Internet of Things (IoT) application. Using the MITRE Common Weakness Enumeration (CWE) catalog for hardware, a risk analysis is performed. What kind of threat modeling approach would be BEST to identify entry points into the system based on motivation?
A potentially life-threatening vulnerability is found in vendor software that is used to manage critical systems. Which of the following is generally considered the BEST method to disclose the vulnerability from an ethical hacking perspective?
In which of the following phases of the product life cycle is product price most effective in influencing demand?
Which if the following is the FIRST control step in provisioning user rights and privileges?
A security consultant is recommending the implementation of a security-focused Configuration Management (CM) process in an organization. What would be the BEST benefit the security consultant would include in the recommendation?
What is the following is the MAIN reason why hot-spot usually adopt open security mode in wireless networks?
To mitigate risk related to natural disasters, an organization has a separate location with systems and communications in place. Data must be restored on the remote systems before they are ready for use. What type of remote site is this?
An information system security manager is tasked with properly applying risk management principle to their cloud information system as outlined by the National Institute of Standards and Technology (NIST).
Which of the following is the INITIAL step?
A company has a demand for 30 units of A, 40 units of B, and 50 units of C. These products are scheduled to run daily in batches of 10 as follows: ABC, ABC, ABC, CBC. What is this scheduling
technique called?
Which of the below represent the GREATEST cloud-specific policy and organizational risk?
During an onsite audit, an assessor inspected an organization’s asset decommission practice. Which of the following would MOST likely be a finding from a security point of view?
Exhibit:
A company has prioritized customers A, B, and C, filling orders in that sequence. What are the impacts to customer service levels for customers B and C?
What priority control technique is most appropriate for a firm using a cellular production system?
The cost accountant has discovered a consistent overage in actual run time for one operation. This information should be sent first to the:
Which of the following measurements indicates there may be bias In the forecast model?
How would a master production schedule (MPS) be used In an assemble-to-order (ATO) manufacturing environment?
Which of the following methods would be appropriate for forecasting the demand for a product family when there is a significant trend and seasonality in the demand history?
An organization undergoing acquisition merged IT departments and infrastructure. During server decommissioning, some servers still in use by customers were mistakenly removed, causing order processing failures. Which type of review would have BEST avoided this scenario?
Which of the following BEST defines whether an organization can consider an alternate location during a contingency?
What BEST describes the end goal of a Disaster Recovery (DR) program?
The most relevant measure of customer service performance Is:
Which of the following BEST describes an individual modifying something the individual is not supposed to?
A security professional is accessing an organization-issued laptop using biometrics to remotely log into a network resource. Which type of authentication method is described in this scenario?
Components of an organization's Immediate industry and competitive environment Include:
An organization is looking to integrate security concepts into the code development process early in development to detect issues before the software is launched. Which advantage does the organization gain from using Static Application Security Testing (SAST) techniques versus dynamic application security testing techniques?
An agency has the requirement to establish a direct data connection with another organization for the purpose of exchanging data between the agency and organization systems. There is a requirement for a formal agreement between the agency and organization. Which source of standards can the system owners use to define the roles and responsibilities along with details for the technical and security requirements?
A security team member is assessing an organization’s backup strategy that follows the 3-2-1 rule. How many different types of media should they inspect to validate?
Plans are being made to move an organization’s software systems to the cloud in order to utilize the flexibility and scalability of the cloud. Some of these software systems process highly sensitive data. The organization must follow strict legal requirements regarding the location of the highly sensitive data processed by the software systems. Which cloud model will BEST fit the organization’s requirements?
Which of the following procedures should be defined when establishing information and asset handling requirements?
The primary consideration In maintenance, repair, and operating (MRO) supply systems typically is:
Which of the following is the GREATEST threat for a Border Gateway Protocol (BGP) deployment on the internet?
The trade-off of increasing safety stock to improve customer fill rate would be a decrease in:
A financial services organization wants to deploy a wireless network. Which of the following is the WEAKEST option for ensuring a secure network?
An organization’s security assessment recommended expanding its secure software development framework to include testing Commercial Off-The-Shelf (COTS) products before deploying those products in production. What is the MOST likely reason for this recommendation?
Which software development methodology is an iterative customer-value-centric approach which helps teams deliver value to their customers faster and with fewer problems?
A company implementing a localized multi-country strategy to increase market share should engage in which of the following actions?
In a Discretionary Access Control (DAC) model, how is access to resources managed?
In order for an organization to mature their data governance processes to ensure compliance, they have created a data classification matrix.
What are the next BEST activities to build on this completed work?
Given the following data, calculate the appropriate takt time:
Which of the following situations is most likely to occur when using a push system?
Employees at an organization use web based services provided by an affiliate. Which of the following risks is unique to this situation?
Which is the MOST valid statement around the relationship of security and privacy?
An example of an assignable cause of variation in process performance is:
Which of the following is a disadvantage of using federated identity?
What activity is a useful element in the change process?
What is the FIRST element that must be evaluated in a security governance program?
An organization is aiming to be System and Organization Controls (SOC) 2 certified by an audit organization to demonstrate its security and availability maturity to its sub service organizations. Which type of audit does this engagement BEST describe?
In which of the following environments is capable-to-promise (CTP) more appropriate than available-to-promise (ATP)?
An organization is migrating its access controls to a certificate-based authentication system.
What will need to be established to verify the identity of all users connecting to the network before rolling out the system?
What should an organization do to prepare for Disaster Recovery (DR) efforts?
Capacity requirements planning (CRP) is applicable primarily In companies operating In an environment where:
Which Virtual Private Network (VPN) protocol provides a built-in encryption?
Endpoint security needs to be established after an organization procured 1,000 industrial Internet Of Things (IoT) sensors. Which of the following challenges are the security engineers MOST likely to face?
Which of the following is an access control method that organizations can use to prevent unauthorized access?
Which of the following presents the GREATEST benefit to an organization's security posture when a change management process is implemented?
The Business Continuity Plan (BCP) has multiple components. The information security plan portion must prioritize its efforts. Which 3 aspects of information security MUST be prioritized?
3 Months Free Update
3 Months Free Update
3 Months Free Update