Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the APICS CPIM CPIM-8.0 Questions and answers with ValidTests

Exam CPIM-8.0 All Questions
Exam CPIM-8.0 Premium Access

View all detail and faqs for the CPIM-8.0 exam

Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following combines multiple software programming tools into one package?

Options:

A.

Program language compilers

B.

Integrated development environments

C.

Dynamic Link Libraries (DLL)

D.

Software development kit

Expert Solution
Questions # 47:

Which of the following describes the 3 MAIN roles of the identity-delegation model?

Options:

A.

Application server, web server, and delegate

B.

Application server, proxy server, and delegate

C.

Delegator, delegate, and service provider

D.

Delegator, application server, and service provider

Expert Solution
Questions # 48:

Asymmetric cryptography uses which type of key to encrypt data?

Options:

A.

Private key

B.

Permanent key

C.

Parent key

D.

Public key

Expert Solution
Questions # 49:

Which of the following MUST be checked during the validation of software verification capabilities?

Options:

A.

Security

B.

Completeness

C.

Vulnerabilities

D.

Logic

Expert Solution
Questions # 50:

In a Discretionary Access Control (DAC) model, how is access to resources managed?

Options:

A.

By the subject’s ability to perform the function

B.

By the discretion of a system administrator

C.

By the subject’s rank and/or title within the security organization

D.

By the identity of subjects and/or groups to which they belong

Expert Solution
Questions # 51:

An organization wants to establish an information security program and has assigned a security analyst to put it in place. What is the NEXT step?

Options:

A.

Develop and implement an information security standards manual.

B.

security control review.

C.

Perform a risk assessment to establish baseline security.

D.

Implement security access control software.

Expert Solution
Questions # 52:

Moving average forecasting methods are best when demand shows:

Options:

A.

a clear trend.

B.

high random variation.

C.

consistent seasonality.

D.

a cyclical pattern.

Expert Solution
Questions # 53:

Which of the following statements is true about total productive maintenance (TPM)?

Options:

A.

It uses statistical tools.

B.

It is part of the business strategy.

C.

It influences the product design process.

D.

It minimizes unscheduled breakdowns.

Expert Solution
Questions # 54:

A security engineer is responsible for verifying software reliability prior to commercial deployment. Which of the following factor would BEST be verified to ensure that the software stays reliable?

Options:

A.

Monitoring

B.

Web Application Firewall (WAF)

C.

Content Delivery Network (CDN)

D.

Logging

Expert Solution
Questions # 55:

A Software As A Service (SaaS) solution was compromised due to multiple missing security controls. The SaaS deployment was rushed and the Software Development Life Cycle (SDLC) was not followed. Which SDLC phase would have been MOST effective in preventing this failure?

Options:

A.

Maintenance

B.

Design

C.

Testing

D.

Requirements

Expert Solution
Questions # 56:

An organization has decided to give decommissioned computers to a school in a developing country. The company data handling policy prohibits the storage of confidential and sensitive data. What would be the BEST technique to use to avoid data remanence, and to minimize the operational burden for the inheriting school?

Options:

A.

Overwriting the hard disk drive of the computers

B.

Encrypting the hard disk drive of the computers

C.

Removing and physically destroying the hard disk drive of the computers

D.

Degaussing the hard disk drive of the computers

Expert Solution
Questions # 57:

Which activity follows the discovery phase of vulnerability management?

Options:

A.

Vulnerability detection

B.

Vulnerability evaluation

C.

Vulnerability identification

D.

Vulnerability governance

Expert Solution
Questions # 58:

Plans are being made to move an organization’s software systems to the cloud in order to utilize the flexibility and scalability of the cloud. Some of these software systems process highly sensitive data. The organization must follow strict legal requirements regarding the location of the highly sensitive data processed by the software systems. Which cloud model will BEST fit the organization’s requirements?

Options:

A.

Private cloud

B.

Multicloud

C.

Public cloud

D.

Hybrid cloud

Expert Solution
Questions # 59:

Which of the following actions best supports a company's strategic focus on delivery speed to improve competitive advantage?

Options:

A.

Maintaining high-capacity utilization

B.

Developing flexible operations

C.

Cross-training workers

D.

Implementing rapid process improvements

Expert Solution
Questions # 60:

Bad actors with little expense can easily make calls. Which social engineer strategy is a telecommunications ONLY risk concept?

Options:

A.

Pretexting

B.

Diversion theft

C.

Phreaking

D.

Baiting

Expert Solution
Viewing page 4 out of 13 pages
Viewing questions 46-60 out of questions