Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Certified in Planning and Inventory Management (CPIM 8.0) Question and Answers

Certified in Planning and Inventory Management (CPIM 8.0)

Last Update Oct 14, 2025
Total Questions : 552

We are offering FREE CPIM-8.0 APICS exam questions. All you do is to just go and sign up. Give your details, prepare CPIM-8.0 free exam questions and then go for complete pool of Certified in Planning and Inventory Management (CPIM 8.0) test questions that will help you more.

CPIM-8.0 pdf

CPIM-8.0 PDF

$42  $104.99
CPIM-8.0 Engine

CPIM-8.0 Testing Engine

$50  $124.99
CPIM-8.0 PDF + Engine

CPIM-8.0 PDF + Testing Engine

$66  $164.99
Questions 1

Global outsourcing and shared suppliers serving an industry are drivers of which category of risk?

Options:

A.  

Supply disruptions

B.  

Forecast inaccuracy

C.  

Procurement problems

D.  

Loss of intellectual property

Discussion 0
Questions 2

Check sheets can be used to:

Options:

A.  

determine the frequency of a defect and the time period between occurrences.

B.  

provide a quick method to identify if possible defects exist.

C.  

allow improvement teams to see if action items are being completed on time.

D.  

provide an indication of correlation between defects.

Discussion 0
Questions 3

The master schedule is an Important tool in the sales and operations planning (S&OP) process because it:

Options:

A.  

represents the forecast before changes are made in S&OP.

B.  

represents the forecast with less detail.

C.  

balances supply and demand at the product mix level.

D.  

balances supply and demand at the sales volume level.

Discussion 0
Questions 4

Which of the following statements is an assumption on which the economic order quantity (EOQ) model is based?

Options:

A.  

Customer demand is known but seasonal.

B.  

Items are purchased and/or produced continuously and not in batches.

C.  

Order preparation costs and inventory-carrying costs are constant and known.

D.  

Holding costs, as a percentage of the unit cost, are variable.

Discussion 0
Questions 5

Which of the following is the BEST activity to mitigate risk from ransomware on mobile devices and removable media in a corporate environment?

Options:

A.  

Use compliant encryption algorithms and tools.

B.  

Use a secure password management tool to store sensitive information.

C.  

Implement Mobile Device Management (MDM).

D.  

Develop and test an appropriate data backup and recovery plan.

Discussion 0
Questions 6

Which of the following actions best supports a company's strategic focus on delivery speed to improve competitive advantage?

Options:

A.  

Maintaining high-capacity utilization

B.  

Developing flexible operations

C.  

Cross-training workers

D.  

Implementing rapid process improvements

Discussion 0
Questions 7

Which of the following methods places a replenishment order when the quantity on hand falls below a predetermined level?

Options:

A.  

Min-max system

B.  

Fixed order quantity

C.  

Periodic review

D.  

Available-to-promlse (ATP)

Discussion 0
Questions 8

A planner has chosen to increase the order point for a raw material. Which of the following costs is most likely to increase?

Options:

A.  

Carrying

B.  

Ordering

C.  

Landed

D.  

Product

Discussion 0
Questions 9

What is the MOST beneficial principle of threat modeling?

Options:

A.  

To focus on specific adversaries, assets, or techniques

B.  

To improve the security and privacy of a system through early and frequent analysis

C.  

To create meaningful outcomes when they are of value to external agencies

D.  

To create a single threat model representation as multiple models may be inconsistent

Discussion 0
Questions 10

The planned channels of Inventory disbursement from one or more sources to field warehouses are known as:

Options:

A.  

a supply chain community.

B.  

interplant demand.

C.  

a bill of distribution.

D.  

logistics data interchange (LDI).

Discussion 0
Questions 11

Objective security metrics tend to be easier to gather, easier to interpret, and easier to include in reports to management.

What is the BEST objective metric for the effectiveness of a security awareness training?

Options:

A.  

The management’s attitude toward the training

B.  

The number of times users comply with the training

C.  

A change of helpdesk calls after the training

D.  

The off-hand comments about the training

Discussion 0
Questions 12

A healthcare organization is preparing an exercise test plan of its Disaster Recovery Plan (DRP) for the Electronic Medical Record (EMR) application. The Business Continuity (BC) analyst is reviewing the requirements of the DRP. The EMR must provide basic charting services within 4 hours, must not lose more than 15 minutes of data, and must be fully functional within 12 hours. At the completion of the exercise, the analyst is preparing a lessons learned report and notes that the EMR was available after 3 hours and 25 minutes of data was lost. Which PRIMARY requirement needs to be addressed because of the exercise?

Options:

A.  

Maximum Tolerable Downtime (MTD)

B.  

Recovery Point Objective (RPO)

C.  

Recovery Time Objective (RTO)

D.  

Mean Time to Recovery (MTTR)

Discussion 0
Questions 13

Which of the following concepts MOST accurately refers to an organization's ability to fully understand the health of the data in its system at every stage of the lifecycle?

Options:

A.  

Data observability

B.  

Data portability

C.  

Data discovery

D.  

Data analytics

Discussion 0
Questions 14

Which of the following benefits typically will be realized when switching from a functional to a cellular layout?

Options:

A.  

Equipment utilization will be higher.

B.  

Quality inspections will be reduced.

C.  

Capital expenditures will be reduced.

D.  

Products will have faster throughput.

Discussion 0
Questions 15

An organization has deployed an Identity And Access Management (IAM) tool and is expanding their information governance program. Which of the following would BEST be included in the governance for IAM?

Options:

A.  

Employ password masking, obfuscation, and tokenization and automate account updates based on human resources reporting.

B.  

Implementing Multi-Factor Authentication (MFA) and account lookout controls.

C.  

Create and enforce a strong password policy and implementing security awareness training for all users.

D.  

Control physical access to the IAM system and implementing Data Loss Prevention (DPL) for credentials.

Discussion 0
Questions 16

Which of the following tools is used to evaluate the impact that a production plan has on capacity?

Options:

A.  

Demand time fence (DTF)

B.  

Bill of resources

C.  

Product routing

D.  

Safety capacity

Discussion 0
Questions 17

Given the information below, reducing which measure by 10% would contribute most to shortening the cash-to-cash cycle time?

Options:

A.  

Accounts receivable

B.  

Inventory value

C.  

Accounts payable

D.  

Cost of capital

Discussion 0
Questions 18

An infrastructure team is setting up a wireless network for employees at a new location of the organization that is located near a very busy city transport hub. Which should be the MOST important antenna consideration with regard to securing the wireless network for the infrastructure team?

Options:

A.  

Network's Service Set Identifier (SSID) visibility and vulnerabilities are not cast out too far.

B.  

Parabolic antenna is used for signal convergence.

C.  

Network efficiently allows maximum channel separation.

D.  

Implement Wired Equivalent Privacy (WEP) encryption.

Discussion 0
Questions 19

When implementing solutions for information security continuous monitoring, which method provides the MOST interoperability between security tools?

Options:

A.  

Continuous Integration and Continuous Delivery (CI/CD)

B.  

Common Vulnerabilities and Exposures (CVE)

C.  

Security Content Automation Protocol (SCAP)

D.  

Common Vulnerability Scoring System (CVSS)

Discussion 0
Questions 20

A financial organization is using an internally developed application.The internal software development team has to adhere to the coding standards of the Software Development Cycle (SDLC).For applications whose functionality is exposed through the public Internet, this requirement consists of testing the application for potential vulnerabilities before it is deployed into production. What is the BEST type of vulnerability test to perform?

Options:

A.  

Online application assurance test

B.  

Web application unit test

C.  

Online application development test

D.  

Web application penetration test

Discussion 0
Questions 21

What FIRST step should a newly appointed Data Protection Officer (DPO) take to develop an organization's regulatory compliance policy?

Options:

A.  

Draft an organizational policy on retention for approval.

B.  

Ensure that periodic data governance compliance meetings occur.

C.  

Understand applicable laws, regulations, and policies with regard to the data.

D.  

Determine the classification of each data type.

Discussion 0
Questions 22

Which of the following is an information security management framework?

Options:

A.  

Control Objectives For Information And Related Technologies (COBIT)

B.  

Information Technology Infrastructure Library (ITIL)

C.  

International Organization For Standardization (ISO) 27001

D.  

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

Discussion 0
Questions 23

Which of the following ensures privileges are current and appropriately reflect an individual’s authorized roles and responsibilities?

Options:

A.  

Access authorization

B.  

Identity management

C.  

Access approval

D.  

Access review

Discussion 0
Questions 24

An organization is implementing Zero Trust Network Access (ZTNA) and needs a strategy to measure device trust for employee laptops. Which measurement strategy is BEST suited and why?

Options:

A.  

Remote using a Trusted Platform Module (TPM) due to better protection of the keys

B.  

Local using Trusted Platform Module (TPM) because low-level access software can be accessed

C.  

Local using Trusted Platform Module (TPM) because of benefits from Segregation Of Duties (SoD)

D.  

Remote using a scanning device because of benefits from Segregation Of Duties (SoD)

E.  

Local using Mobile Device Management (MDM) because of device policy enforcement

Discussion 0
Questions 25

A United States (US)-based online gaming provider, which operates in Germany, collects and uses a large amount of user behavioral data. A customer from Germany requests a copy of all their personal data.

What is the MOST appropriate course of action for the organization to take?

Options:

A.  

Provide all the requested data in an organization’s proprietary encrypted format and deliver a viewing application.

B.  

Gather all the data about all the users and provide it to the customer in Extensible Markup Language (XML) format.

C.  

Gather and provide all the requested data in Extensible Markup Language (XML) format.

D.  

Provide a time convenient to the customer to visit the organization’s premises and provide an overview of all the processed data by an organization’s privacy officer.

Discussion 0
Questions 26

An executive is approved to travel to a high-risk country. What is the BEST action the organization can take to ensure the executive’s safety and security?

Options:

A.  

Provide travel security training.

B.  

Provide specific pre-travel intelligence briefing.

C.  

Complete a travel risk assessment.

D.  

Refresh the corporate travel policy.

Discussion 0
Questions 27

Which of the following is the BEST solution to implement to mitigate the risk of data breach in the event of a lost or stolen mobile device?

Options:

A.  

Mobile application management

B.  

Bring Your Own Device (BYOD) policy

C.  

Network Access Control (NAC)

D.  

Mobile Device Management (MDM)

Discussion 0
Questions 28

A life cycle assessment (LCA) would be used to determine:

Options:

A.  

the length of a long-term agreement.

B.  

how an Item should be scheduled.

C.  

environmental aspects and impacts.

D.  

If risk pooling would reduce inventory investment.

Discussion 0
Questions 29

An organization’s security assessment recommended expanding its secure software development framework to include testing Commercial Off-The-Shelf (COTS) products before deploying those products in production. What is the MOST likely reason for this recommendation?

Options:

A.  

To identify any residual vulnerabilities prior to release in the production environment

B.  

To identify and remediate any residual vulnerabilities prior to the end of the user acceptance testing

C.  

To identify any residual vulnerabilities prior to the end of the trial run of the software

D.  

To identify and remediate any residual vulnerabilities prior to release in the production environment

Discussion 0
Questions 30

Which of the following is the MOST important consideration in a full-scale disaster recovery test?

Options:

A.  

Sign off by the Chief Information Officer (CIO)

B.  

Financial cost of the organization

C.  

Business interruption

D.  

Available Information Technology (IT) hardware

Discussion 0
Questions 31

Which activity follows the discovery phase of vulnerability management?

Options:

A.  

Vulnerability detection

B.  

Vulnerability evaluation

C.  

Vulnerability identification

D.  

Vulnerability governance

Discussion 0
Questions 32

One of the findings in the recent security assessment of a web application reads: "It appears that security is an afterthought in the web application development process. It is recommended that security be addressed earlier in the development process." Which of these choices would BEST remediate this security finding?

Options:

A.  

The installation and use of Dynamic Application Security Testing (DAST) software to test written code.

B.  

The installation and use of Static Application Security Testing (SAST) software to test written code.

C.  

The introduction of a continuous integration/continuous development pipeline to automate security into the software development change process.

D.  

The introduction of a security training program for the developers.

Discussion 0
Questions 33

A manufacturer has a primary assembly line supported by output from several subassembly lines. Which of the following scenarios would be the best argument for a multilevel master scheduling process?

Options:

A.  

Low variation in aggregate subassembly demand

B.  

High variation in aggregate subassembly demand

C.  

Low variation in subassembly demand mix

D.  

High variation in subassembly demand mix

Discussion 0
Questions 34

The trade-off of increasing safety stock to improve customer fill rate would be a decrease in:

Options:

A.  

pipeline inventory.

B.  

transportation costs.

C.  

inventory turns.

D.  

sales revenue.

Discussion 0
Questions 35

To mitigate risk related to natural disasters, an organization has a separate location with systems and communications in place. Data must be restored on the remote systems before they are ready for use. What type of remote site is this?

Options:

A.  

Cold Site

B.  

Mobile Site

C.  

Hot Site

D.  

Warm Sit

Discussion 0
Questions 36

Which of the following should be done FIRST when implementing an Identity And Management (IAM) solution?

Options:

A.  

List and evaluate IAM available products.

B.  

Evaluate business needs.

C.  

Engage the sponsor and identify Key stakeholders.

D.  

Engage the existing Information Technology (IT) environment.

Discussion 0
Questions 37

In pyramid forecasting, the "roll up" process begins with:

Options:

A.  

combining individual product item forecasts into forecasts for product families.

B.  

combining forecasts for product families into a total business forecast.

C.  

allocating total business forecast changes to product families.

D.  

allocating product family forecast changes to individual products.

Discussion 0
Questions 38

An organization identified a Distributed Denial-of-Service (DDoS) attack in which a large number of packets were broadcast with the intent of exploiting vulnerabilities of the Internet Protocol (IP) and the Internet Control Message Protocol (ICMP). Which Transmission Control Protocol/Internet Protocol (TCP/IP) layer would be affected by the attack?

Options:

A.  

Transport layer

B.  

Application layer

C.  

Internet layer

D.  

Network layer

Discussion 0
Questions 39

If all other factors remain the same, when finished goods inventory investment is increased, service levels typically will:

Options:

A.  

remain the same.

B.  

increase in direct (linear) proportion.

C.  

increase at a decreasing rate.

D.  

increase at an increasing rate.

Discussion 0
Questions 40

Which of the following Internet Protocol Security (IPSec) components provides the MOST confidentiality for the information that is being transmitted?

Options:

A.  

Authentication Header (AH)

B.  

Generic Routing Encapsulation (GRE)

C.  

Encapsulation Security Payload

D.  

Internet Key Exchange (IKE)

Discussion 0
Questions 41

What should an organization do to prepare for Disaster Recovery (DR) efforts?

Options:

A.  

Create a list of key personnel

B.  

Create a list of decommissioned hardware

C.  

Review tabletop exercises

D.  

Replicate access logs

Discussion 0
Questions 42

Which of the following is a component of the Clark-Wilson model?

Options:

A.  

Enforcement rules

B.  

Transformation procedures

C.  

Data classifications

D.  

Integrity labels

Discussion 0
Questions 43

Remote sensors have been deployed at a utility site to reduce overall response times for maintenance staff supporting critical infrastructure. Wireless communications are used to communicate with the remote sensors, as it is the most cost-effective method and minimizes risk to public health and safety. The utility organization has deployed a Host-Based Intrusion Prevention System (HIPS) to monitor and protect the sensors. Which statement BEST describes the risk that is mitigated by utilizing this security tool?

Options:

A.  

Malware on the sensor

B.  

Denial-Of-Service (DoS)

C.  

Wardriving attack

D.  

Radio Frequency (RF) interference

Discussion 0
Questions 44

Which of the following describes the 3 MAIN roles of the identity-delegation model?

Options:

A.  

Application server, web server, and delegate

B.  

Application server, proxy server, and delegate

C.  

Delegator, delegate, and service provider

D.  

Delegator, application server, and service provider

Discussion 0
Questions 45

Which of the following is the BEST option for a security director to use in order to mitigate the risk of inappropriate use of credentials by individuals with administrative rights?

Options:

A.  

Have administrators sign appropriate access agreements.

B.  

Define the Acceptable Use Policy (AUP) for administrators.

C.  

Have administrators accept a Non-Disclosure Agreement.

D.  

Perform extensive background checks on administrators.

Discussion 0
Questions 46

Which of the following is the benefit of using Security Content Automation Protocol (SCAP) version 2 on endpoint devices?

Options:

A.  

Apply patches to endpoints across the enterprise.

B.  

Use software configuration management for endpoints.

C.  

Monitor endpoints by collecting software inventory and configuration settings.

D.  

Enforce Two-Factor Authentication (2FA) on endpoints across the enterprise.

Discussion 0
Questions 47

Which of the following MUST be checked during the validation of software verification capabilities?

Options:

A.  

Completeness

B.  

Vulnerabilities

C.  

Security

D.  

Logic

Discussion 0
Questions 48

Endpoint security needs to be established after an organization procured 1,000 industrial Internet Of Things (IoT) sensors. Which of the following challenges are the security engineers MOST likely to face?

Options:

A.  

Identity And Access Management (IAM)

B.  

Power and physical security

C.  

Configuration Management (CM) and deployment

D.  

Installation and connection

Discussion 0
Questions 49

Which of the following methods most likely Introduces a temporary variance between the inventory balance and the inventory record?

Options:

A.  

Inventory write-off

B.  

Backflushing

C.  

Cycle count

D.  

Kanban

Discussion 0
Questions 50

In a Zero Trust (ZT) model, where should the enforcement component be placed and why?

Options:

A.  

Between the policy engine and the trust engine, because it enforces security policies

B.  

As close to the workload as possible, because it impacts authorization decisions

C.  

As close to the workload as possible, because it impacts authentication decisions

D.  

Between the data stores and the trust engine, because it improves security policies

Discussion 0
Questions 51

We have observed the inventory system does not handle plastic parts well." What should be added to the problem statement to make it more useful?

Options:

A.  

Measurements that help describe the problem

B.  

Guidance to which problem-solving tools should be used

C.  

Criteria for selecting the improvement team

D.  

Description of who is responsible for the problem

Discussion 0
Questions 52

The Business Continuity Plan (BCP) has multiple components. The information security plan portion must prioritize its efforts. Which 3 aspects of information security MUST be prioritized?

Options:

A.  

Confidentiality, integrity, availability

B.  

Physical security, access control, asset protection

C.  

Intent, capability, opportunity

D.  

Threat level, network security, information disposal

Discussion 0
Questions 53

An organization's security policy requires sensitive information to be protected when being transmitted to external sources via would be the BEST security solution to choose?

Options:

A.  

Use spam filters and anti-virus software to send emails externally.

B.  

Configure digital signatures to send emails externally.

C.  

Configure the system to utilize to send encrypted emails externally.

D.  

Use e-mail security gateway to send emails externally.

Discussion 0
Questions 54

An organization has network services in a data center that are provisioned only for internal use, and staff at offices and staff working from home both use the services to store sensitive customer data. The organization does not want the Internet Protocol (IP) address of the service to receive traffic from users not related to the organization. Which technology is MOST useful to the organization in protecting this network?

Options:

A.  

Intrusion Detection System (IDS)

B.  

Domain Name System (DNS)

C.  

Network Address Translation (NAT)

D.  

Virtual Private Network (VPN)

Discussion 0
Questions 55

What is the total load requirement for this work center based on the following data?

Options:

A.  

1.326

B.  

1.525

C.  

1,533

D.  

2,880

Discussion 0
Questions 56

Which of the following inventory management techniques is most responsive to changes in demand levels?

Options:

A.  

Two-bin system

B.  

Periodic review system

C.  

Cycle counting

D.  

ABC classification

Discussion 0
Questions 57

Which is the MOST valid statement around the relationship of security and privacy?

Options:

A.  

A system designed with security provides individuals with data privacy by default.

B.  

Nonrepudiation protects against unauthorized disclosure of private data.

C.  

Privacy in the realm of physical security often entails trade-offs with security.

D.  

Privacy and security are mutually exclusive.

Discussion 0
Questions 58

In order for an organization to mature their data governance processes to ensure compliance, they have created a data classification matrix.

What are the next BEST activities to build on this completed work?

Options:

A.  

Ensure the data owners agree with the classification of their data and then socialize the matrix with employees handling data.

B.  

Ensure the internal legal team approves the data classification matrix then perform a Business Impact Analysis (BIA) to understand the impact of applying the classifications.

C.  

Complete a Privacy Impact Assessment (PIA) and use the results to identify improvements to the data classification matrix.

D.  

Document the handling procedures for each classification of data in the matrix and schedule data handling educational sessions with employees.

Discussion 0
Questions 59

Which of the following planning modules considers the shortest-range planning goals?

Options:

A.  

Capacity requirementsplanning(CRP)

B.  

Input/output analysis

C.  

Resource planning

D.  

Rough-cut capacity planning (RCCP)

Discussion 0
Questions 60

Which of the following planes directs the flow of data within a Software-Defined Networking (SDN) architecture?

Options:

A.  

Security

B.  

Data

C.  

Application

D.  

Control

Discussion 0
Questions 61

A cybersecurity analyst is reviewing a recent incident in which the adversaries were able to move vertically within the network. Which attack phase MOST clearly represents this scenario?

Options:

A.  

System browsing

B.  

Escalating privileges

C.  

Gaining access

D.  

Installing additional tools

Discussion 0
Questions 62

During the initiation phase of a project to acquire a customer relation management system, what is the FIRST step a project team will take for early integration of security?

Options:

A.  

Develop a list of security requirements for the system.

B.  

Conduct project planning and a feasibility assessment.

C.  

Define system security classifications.

D.  

Review relevant regulatory practices and standards.

Discussion 0
Questions 63

The Chief Information Security Officer (CISO) defined a requirement to install a network security solution that will have the ability to inspect and block data flowing over network in real time. What network deployment scenario will be MOST suitable?

Options:

A.  

Deploy the solution to a network terminal access point port.

B.  

Deploy the solution and connect it to a Switched Port Analyzer (SPAN) port.

C.  

Deploy the solution in line with the traffic flows.

D.  

Deploy the solution on a separate Virtual Local Area Network (VLAN).

Discussion 0
Questions 64

A multinational organization acquires a subsidiary. The acquisition results in the need to integrate a large population of new users into the organization's corporate cloud. What is the MAIN benefit of the organization's Federated Identity Management (FIM) system to address the need?

Options:

A.  

Efficient access provisioning

B.  

Increased robustness of authentication

C.  

Greater flexibility of access control

D.  

Reduced complexity of maintenance and changes

Discussion 0
Questions 65

A product manager wishes to store sensitive development data using a cloud storage vendor while maintaining exclusive control over passwords and encryption credentials. What is the BEST method for meeting these requirements?

Options:

A.  

Local self-encryption with passwords managed by a local password manager

B.  

Client-side encryption keys and passwords generated dynamically during cloud access sessions

C.  

Zero-knowledge encryption keys provided by the cloud storage vendor

D.  

Passwords generated by a local password manager during cloud access sessions and encrypted in transit

Discussion 0
Questions 66

An organization identified a Distributed Denial-Of-Service (DDoS) attack in which a large number of packets were broadcast with the intent of exploiting vulnerabilities of the Internet Protocol (IP) and the Internet Control Message Protocol (ICMP). Which Transmission Control Protocol/Internet Protocol (TCP/IP) layer would be affected by the attack?

Options:

A.  

Internet layer

B.  

Transport layer

C.  

Application layer

D.  

Network layer

Discussion 0
Questions 67

Which of the following is a PRIMARY benefit of sharing assessment results among key organizational officials across information boundaries?

Options:

A.  

Facilitates development of organization-wide security metrics

B.  

Allows management to assess which organizational elements have the best security practices

C.  

Provides the organization a wider view of systemic weaknesses and deficiencies in their information systems

D.  

Identifies areas that require additional training emphasis in each organizational element

Discussion 0
Questions 68

Which of the following is a system architecture in a data protection strategy?

Options:

A.  

Logical isolation

B.  

Network segmentation

C.  

Distributed network

D.  

Access enforcement

Discussion 0
Questions 69

Which compensating control is the MOST effective to prevent fraud within an organization?

Options:

A.  

Separation of privilege

B.  

Pre-employment background checks

C.  

Principle of least privilege

D.  

Log monitoring

Discussion 0
Questions 70

An organization is looking to integrate security concepts into the code development process early in development to detect issues before the software is launched. Which advantage does the organization gain from using Static Application Security Testing (SAST) techniques versus dynamic application security testing techniques?

Options:

A.  

Allows tailored techniques

B.  

Executes code to detect issues

C.  

Allows for earlier vulnerability detection

D.  

Simulates attacker patterns

Discussion 0
Questions 71

An example of an assignable cause of variation in process performance is:

Options:

A.  

power fluctuation during machine operation.

B.  

machine vibration during operation.

C.  

incorrect setup of a machine by the operator.

D.  

changes in temperature in the machine shop.

Discussion 0
Questions 72

An organization provides customer call center operations for major financial services organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?

Options:

A.  

Control Objectives For Information And Related Technology (COBIT) and Health Insurance Portability And Accountability Act (HIPAA) frameworks

B.  

National Institute Of Standards And Technology (NIST) and International Organization For Standardization (ISO) frameworks

C.  

Frameworks specific to the industries and locations clients do business in

D.  

Frameworks that fit the organization’s risk appetite, as cybersecurity does not vary industry to industry

Discussion 0
Questions 73

An organization has been the subject of increasingly sophisticated phishing campaigns in recent months and has detected unauthorized access attempts against its Virtual Private Network (VPN) concentrators. Which of the following implementations would have the GREATEST impact on reducing the risk of credential compromise?

Options:

A.  

Increasing the network password complexity requirements

B.  

Implementing tougher encryption on the VPN

C.  

Implementing Multi-Factor Authentication (MFA)

D.  

Implementing advanced endpoint protection on user endpoints

Discussion 0
Questions 74

A security engineer is implementing an authentication system for a new web application. The authentication requirements include the ability for a server to authenticate the client and for the client to authenticate the server. Which of the following choices BEST supports this requirement?

Options:

A.  

Secure Shell (SSH)

B.  

Trusted Platform Module (TPM)

C.  

Virtual Private Network (VPN)

D.  

Transport Layer Security (TLS)

Discussion 0
Questions 75

An organization starts to develop a drone inspection and defect detection system includes different subsystems running at different clouds from different service providers. During the architectural design phase, which security architecture principle should be the MOST important for the security engineer to apply?

Options:

A.  

Security by design

B.  

Default deny

C.  

Security by default

D.  

Security before design

Discussion 0
Questions 76

Price negotiation is most appropriate when purchasing which of the following product categories?

Options:

A.  

Commodities

B.  

Standard products

C.  

Items of small value

D.  

Made-to-order (MTO) items

Discussion 0
Questions 77

Labor3 people

Work hours10 hours per day

Days4 days per week

Meetings with work area employees1/2 hour per day

Work area efficiency85%

Given the information above, what is the weekly theoretical capacity of this work area in hours?

Options:

A.  

97

B.  

102

C.  

114

D.  

120

Discussion 0
Questions 78

The primary consideration In maintenance, repair, and operating (MRO) supply systems typically is:

Options:

A.  

order quantity.

B.  

stockout costs.

C.  

carrying costs.

D.  

shelf life.

Discussion 0
Questions 79

Which compensating control is the MOST effective to prevent fraud within an organization?

Options:

A.  

Principle of least privilege

B.  

Log monitoring

C.  

Separation of privilege

D.  

Pre-employment background checks

Discussion 0
Questions 80

What is the BEST protection method to ensure that an unauthorized entry attempt would fail when securing highly sensitive areas?

Options:

A.  

Employee badge with a picture and video surveillance

B.  

Keyed locks and Closed-Circuit Television (CCTV) at entrances

C.  

Combination lock and a gate that prevents piggybacking

D.  

Proximity badge requiring a Personal Identification Number (PIN) entry at entrances

Discussion 0
Questions 81

When the discrete available-to-promise (ATP) method is used, the master production receipt quantity is committed to:

Options:

A.  

any request for shipment prior to the planning time fence.

B.  

any request for shipment prior to the demand time fence (DTF).

C.  

requests only for shipment before the next master production schedule (MPS) receipt.

D.  

requests only for shipment in the period of the receipt.

Discussion 0
Questions 82

During an onsite audit, an assessor inspected an organization’s asset decommission practice. Which of the following would MOST likely be a finding from a security point of view?

Options:

A.  

Solid State Drives (SSD) were degaussed along with hard drives.

B.  

The Non-Disclosure Agreement (NDA) between the organization and its data disposal service was more than 3 years old.

C.  

Hard drives from older assets replaced defective hard drives from current assets of similar classification levels.

D.  

Data classifications were not clearly identified.

Discussion 0
Questions 83

What is the BEST item to consider when designing security for information systems?

Options:

A.  

The comprehensive level of assurance required

B.  

The jurisdiction of the information system

C.  

The security requirements of the board

D.  

The Disaster Recovery Plan (DRP)

Discussion 0
Questions 84

What is the PRIMARY secure protocol used by a Content Delivery Network (CDN)?

Options:

A.  

Internet Protocol Security (IPsec)

B.  

Secure shell (SSH)

C.  

Transport Layer Security (TLS)

D.  

Secure File Transfer Protocol (SFTP)

Discussion 0
Questions 85

After a recent threat modeling workshop, the organization has requested that the Chief Information Security Officer (CISO) implement zero trust (ZT) policies. What was the MOST likely threat identified in the workshop?

Options:

A.  

Natural threats

B.  

Elevation of privilege

C.  

Repudiation

D.  

Information disclosure

Discussion 0
Questions 86

In a hospital, during a routine inspection performed by the computerized tomography device technical service, it is discovered that the values of radiation used in scans are one order of magnitude higher than the default setting. If the system has had an unauthorized access, which one of the following concepts BEST describes which core principle has been compromised?

Options:

A.  

Confidentiality

B.  

Availability

C.  

Cybersecurity

D.  

Integrity

Discussion 0
Questions 87

In the Session layer of the Open Systems Interconnection (OSI) model, which of the following modes allows only one host to send information to its peer?

Options:

A.  

Half-duplex

B.  

Simplex

C.  

Unicast

D.  

Full-duplex

Discussion 0
Questions 88

A startup organization has been growing rapidly and is planning to open a new office on another continent. Until infrastructure for the new office can be built, the organization is setting up remote access to the existing network. Which of the following is the MOST important secure implementation to complete during the expansion?

Options:

A.  

Multi-Factor Authentication (MFA)

B.  

Cybersecurity training

C.  

Password management software

D.  

Role-Based Access Control (RBAC)

Discussion 0
Questions 89

An organization wants to establish an information security program and has assigned a security analyst to put it in place. What is the NEXT step?

Options:

A.  

Develop and implement an information security standards manual.

B.  

security control review.

C.  

Perform a risk assessment to establish baseline security.

D.  

Implement security access control software.

Discussion 0
Questions 90

Which of the following threats MUST be included while conducting threat modeling for a Cloud Service Provider (CSP)?

Options:

A.  

Risks of data breaches that can result from inadequate encryption of tenant data in transit and at rest

B.  

Potential legal actions from third parties due to tenants’ activities on the CSP’s platform

C.  

Vulnerabilities in shared resources that can be exploited by attackers to affect multiple tenants

D.  

Threats originating from the CSP’s tenants that can impact the infrastructure and other tenants

Discussion 0
Questions 91

The production plan defines which of the following targets?

Options:

A.  

Sales forecast

B.  

Quantities of each product to be produced

C.  

Level of output to be produced

D.  

Business plans for the company

Discussion 0
Questions 92

Network Access Control (NAC) is used to perform what function for computers joining the network?

Options:

A.  

Ensure all networking components communicate with each other.

B.  

Ensure that all approved devices can join the network.

C.  

Restrict access to the network based on Media Access Control (MAC) address or Internet Protocol (IP) address.

D.  

Restrict the time and date that computers are allowed to connect to the organization’s network.

Discussion 0
Questions 93

The question below is based on the following information:

Beginning inventory = 43Week 1Week 2Week 3

Forecast202020

Customer orders221710

Projected on-hand

Master production schedule (MPS)80

Available-to-promise (ATP)

What is the largest customer order that could be accepted for delivery at the end of week 3 without making changes to the master production schedule (MPS)?

Options:

A.  

74

B.  

63

C.  

61

D.  

31

Discussion 0
Questions 94

Management should support investments in new process technologies that:

Options:

A.  

require minimal changes in existing systems, procedures, and skills.

B.  

have been recommended by technical experts and equipment suppliers.

C.  

provide significant cost-reduction opportunities for the company's current products.

D.  

provide long-term competitive advantage with acceptable financial risk.

Discussion 0
Questions 95

An organization is implementing improvements to secure the Software Development Life Cycle (SDLC). When should defensive three modeling occur?

Options:

A.  

Standards review

B.  

Static Application Security Testing (SAST)

C.  

Design and requirements gathering

D.  

Dynamic Application Security Testing (DAST)

Discussion 0
Questions 96

Broadcast traffic is causing network performance degradation of sensitive equipment.

Which of the following methods is used to prevent the broadcast traffic from impacting availability?

Options:

A.  

Place the sensitive equipment behind a firewall to prevent the broadcast traffic from impacting the equipment.

B.  

Implement Quality of Service (QoS) on network switches to throttle the sensitive equipment traffic.

C.  

Move the sensitive equipment to a different switch port to prevent the broadcast traffic from impacting the equipment.

D.  

Use Network Access Control (NAC) to prevent the broadcast traffic from broadcasting.

Discussion 0
Questions 97

An organization has determined that it needs to retain customer records for at least thirty years to discover generational trends in customer behavior. However, relevant local regulation requires that all Personally Identifiable Information (PII) is deleted after expiration of the customer's engagement with the organization, which is usually no longer than one year. How should the data be handled at the expiration of customer engagement at one year?

Options:

A.  

Because the data contains PII, it should be backed up in an encrypted form, with the encryption key securely kept in a Hardware Security Module (HSM), and all access logged and monitored.

B.  

The data should be deleted from the customer website, and archived to a write-once, read-many drive to securely meet the business requirement for analytics.

C.  

PII portion of the data should be tokenized or deleted, and the rest of the data stored securely to meet the business requirement for analytics.

D.  

Since legal and regulatory compliance takes priority over business requirements, the data should be deleted.

Discussion 0
Questions 98

Which of the following systems would be the most cost-efficient for inventory management of a low value item?

Options:

A.  

Order point

B.  

Material requirements planning (MRP)

C.  

Periodic review

D.  

Economic order quantity(EOQ)

Discussion 0
Questions 99

Which of the following factors is the MOST important consideration for a security team when determining when determining whether cryptographic erasure can be used for disposal of a device?

Options:

A.  

If the methods meet the International organization For Standardization/International Electrotechnical Commission (ISO/IEC) 27001.

B.  

If the data on the device exceeds what cryptographic erasure can safely process.

C.  

If the device was encrypted prior using cipher block chaining.

D.  

If the security policies allow for cryptographic erasure based on the data stored on the device.

Discussion 0
Questions 100

If fixed costs are §200,000 and 20,000 units are produced, a unit's fixed cost is §10. This is an example of:

Options:

A.  

variable costing.

B.  

activity-based costing (ABC).

C.  

absorption costing.

D.  

overhead costing.

Discussion 0
Questions 101

Which protocol is the BEST option to provide authentication, confidentiality, and data integrity between two applications?

Options:

A.  

File Transfer Protocol (FTP)

B.  

Security Assertion Markup Language (SAML)

C.  

Peer-To-Peer (P2P) communication

D.  

Transport Layer Security (TLS)

Discussion 0
Questions 102

Components of an organization's Immediate industry and competitive environment Include:

Options:

A.  

political factors.

B.  

interest rates.

C.  

substitute products.

D.  

sociocultural forces.

Discussion 0
Questions 103

In a rapidly changing business environment, a primary advantage of an effective customer relationship management (CRM) program is:

Options:

A.  

reduced forecast variability.

B.  

fewer customer order changes.

C.  

fewer customer defections.

D.  

earlier Identification of shifts Incustomer preferences.

Discussion 0
Questions 104

In which of the following circumstances is an organization MOST likely to report the accidental release of personal data to the European Union (EU) General Data Protection Regulation (GDPR) supervisory authority and affected users?

Options:

A.  

The release of personal data was made to a highly trusted third-party vendor and there was confirmation that the data was not accessed before it was returned.

B.  

The personal data was stored in a highly encrypted format and there is confirmation that the encryption keys were not accessed or released.

C.  

All the personal data from the accidental release was from individuals who are not living in the EU.

D.  

The personal data released only contained the ages and names of children who may or may not be living in the EU.

Discussion 0
Questions 105

Which assessing whether real-world threats to the security of an application have been mitigated, what is MOST effective source to confirm that sufficient security controls are in place for both end users and customers?

Options:

A.  

Software security team

B.  

Product management

C.  

Third-party reviews

D.  

Senior management

Discussion 0
Questions 106

Which security concept applies if an architecture diagram illustrates a particular user/role combination with access to an asset or applicaton?

Options:

A.  

Non-repudiation

B.  

Identification

C.  

Authorization

D.  

Authentication

Discussion 0
Questions 107

What is the main negative effect of changing the due dates of open orders?

Options:

A.  

The schedule information becomes inaccurate.

B.  

The customer service level decreases.

C.  

It leads to "nervousness" in the schedule.

D.  

The schedule does not support demand.

Discussion 0
Questions 108

A cybersecurity analyst is responsible for identifying potential security threats and vulnerabilities in the organization's software systems. Which action BEST demonstrates the understanding and application of threat modeling concepts and methodologies?

Options:

A.  

Implementing a Business Continuity Plan (BCP)

B.  

Conducting access control assessments for the data center

C.  

Analyzing potential attack vectors for a new software application

D.  

Developing a Disaster Recovery Plan (DRP) for critical systems

Discussion 0
Questions 109

A computer forensic analyst is examining suspected malware from a computer system post-attack. Upon reverse engineering the code, the analyst sees several concerning instructions. One of those concerning instructions is that it installs a Unified Extensible Firmware Interface Basic Input/Output System (BIOS) rootkit, and when the system is then rebooted, the BIOS checks for a certain unknown program to be installed. Which security feature MOST likely would have detected and prevented this type of attack if already on the system?

Options:

A.  

Operating System (OS) virtualization

B.  

Memory protection

C.  

Cryptographic module

D.  

Trusted Platform Module (TPM)

Discussion 0
Questions 110

An organization wants to implement Zero Trust (ZT). The Information Technology (IT) department is already using Multi-Factor Authentication (MFA) and Identity and Access Management (IAM). Which of the following would be the BEST solution for the organization to implement in order to have a ZT network?

Options:

A.  

Next-generation firewall

B.  

Host-Based Intrusion Detection System (HIDS)

C.  

Micro-segmentation

D.  

Network Intrusion Detection System (NIDS)

Discussion 0
Questions 111

Up-to-date Information about production order status is required to do which of the following tasks?

Options:

A.  

Calculate current takt time.

B.  

Determine planned orders.

C.  

Replenish kanban quantities.

D.  

Calculate the cost of work in process (WIP).

Discussion 0
Questions 112

An organization is designing a new Disaster Recovery (DR) site. What is the BEST option to harden security of the site?

Options:

A.  

Physical access control

B.  

Natural disaster insurance

C.  

Natural surveillance

D.  

Territorial reinforcement

Discussion 0
Questions 113

What is the MAIN purpose of risk and impact analysis?

Options:

A.  

Calculate the cost of implementing effective countermeasures.

B.  

Calculate the effort of implementing effective countermeasures.

C.  

Identify countermeasures.

D.  

Eliminate the risk of most threats.

Discussion 0
Questions 114

In a make-to-stock (MTS) environment, the master production schedule (MPS) Is usually a schedule of which of the following types of items?

Options:

A.  

Phantom items

B.  

Finished goods items

C.  

Component/subassembly items

D.  

Raw material items

Discussion 0
Questions 115

Who is ultimately responsible for ensuring that specific data is protected?

Options:

A.  

Custodian

B.  

Data owner

C.  

Data controller

D.  

System owner

Discussion 0
Questions 116

If the total part failure rate of a machine is 0.00055 failures per hour, what would be the mean time between failures (MTBF) in hours?

Options:

A.  

1,818.2

B.  

59.99945

C.  

1.98

D.  

0.99945

Discussion 0
Questions 117

Which of the following BEST describes an individual modifying something the individual is not supposed to?

Options:

A.  

Exfiltration

B.  

Tampering

C.  

Spoofing

D.  

Repudiation

Discussion 0
Questions 118

Which of the following should be done FIRST when implementing an Identity and Access Management (IAM) solution?

Options:

A.  

List and evaluate IAM available products.

B.  

Evaluate the existing Information Technology (IT) environment.

C.  

Evaluate business needs.

D.  

Engage the sponsor and identify key stakeholders.

Discussion 0
Questions 119

An organization is retiring an old server out of the data center. This server was used to store and process sensitive information. The server is being sent off-site to a recycling center. Which declassification method should be performed prior to it being sent off-site?

Options:

A.  

Tokenization

B.  

Anonymization

C.  

Obfuscation

D.  

Destruction

Discussion 0
Questions 120

A security engineer needs to perform threat modeling on a microprocessor design for an Internet of Things (IoT) application. Using the MITRE Common Weakness Enumeration (CWE) catalog for hardware, a risk analysis is performed. What kind of threat modeling approach would be BEST to identify entry points into the system based on motivation?

Options:

A.  

System centric

B.  

Attacker centric

C.  

Threat centric

D.  

Asset centric

Discussion 0
Questions 121

Zombieload, Meltdown, Spectre, and Fallout are all names of bugs that utilized which of the following types of attack?

Options:

A.  

Side-channel

B.  

Fault injection

C.  

Man-In-The-Middle (MITM)

D.  

Frequency analysis

Discussion 0
Questions 122

A security practitioner has been asked to investigate the presence of customer Personally Identifiable Information (PII) on a social media website. Where does the practitioner begin?

Options:

A.  

Initiate the organization’s Incident Response Plan (IRP).

B.  

Review the organizational social media policy.

C.  

Review logs of all user’s social media activity.

D.  

Determine a list of information assets that contain PII.

Discussion 0
Questions 123

An organization routes traffic between two of its sites using non-revenue network paths provided by peers on an Internet exchange point. What is the MOST appropriate recommendation the organization's security staff can make to prevent a compromise?

Options:

A.  

Cease routing traffic over the Internet exchange point and use the transit provider exclusively.

B.  

Ask the peers who route the traffic to sign a Non-Disclosure Agreement (NDA).

C.  

Use Internet Protocol Security (IPsec) between the border gateways at either site.

D.  

Nothing needs to be done because applications are already required to encrypt and authenticate network traffic.

Discussion 0
Questions 124

What order BEST reflects the steps when adding threat modeling practices to a Software Development Life Cycle (SDLC)?

Options:

A.  

Inventory use cases, categorize threats, evaluate business impact

B.  

Understand attack front, identify trust levels, decompose application

C.  

Inventory countermeasures, identify threats, implement mitigations

D.  

Establish monitoring, identify risks, implement countermeasures

Discussion 0
Questions 125

An organization is preparing for a natural disaster, and management is creating a Disaster Recovery Plan (DRP). What is the BEST input for prioritizing the restoration of vital Information Technology (IT) services?

Options:

A.  

By priority as defined by the critical assets list

B.  

The latest Continuity Of Operations Plan (COOP)

C.  

Senior management assessment and approval

D.  

The latest Business Impact Analysis (BIA)

Discussion 0
Questions 126

An organization has hired a consultant to establish their Identity and Access Management (IAM) system. One of the consultant’s main priorities will be to understand the current state and establish visibility across the environment. How can the consultant start to establish an IAM governance process?

Options:

A.  

Implement Attribute-Based Access Control (ABAC) process for sensitive applications.

B.  

Determine authoritative identity sources.

C.  

Understand connectivity to target applications.

D.  

Implement Role-Based Access Control (RBAC) process for web-based applications.

Discussion 0
Questions 127

What is a malicious activity that overwhelms a Wireless Access Point (WAP)?

Options:

A.  

Identification spoofing

B.  

Signal jamming

C.  

Pin attack

D.  

War driving

Discussion 0
Questions 128

What General Data Protection Regulation (GDPR) principle says that data should be collected lawfully and with the person’s consent?

Options:

A.  

Legitimate data collection

B.  

Limitation of use

C.  

Collection Categorization

D.  

Collection limitation

Discussion 0
Questions 129

Which of the following attributes describes a company with a global strategy?

Options:

A.  

Ituses the same basic competitive style worldwide and focuses efforts on building global brands.

B.  

Itcustomizes the basic competitive style to fit markets but focuses efforts on building global brands.

C.  

Itcoordinates major strategic decisions worldwide but gives country managers wide strategy-making latitude.

D.  

Itoperates plants in many host countries and uses decentralized distribution.

Discussion 0
Questions 130

Increased use of third-party logistics (3PL) services is likely to have which of the following effects on a firm's balance sheet?

Options:

A.  

Decreased fixed assets

B.  

Decreased retained earnings

C.  

Increased accounts receivable

D.  

Increased intangible assets

Discussion 0
Questions 131

Database security includes which of the following requirements?

Options:

A.  

Physical database integrity, logical database integrity, and ownership integrity

B.  

Availability, auditability, and screening

C.  

Physical database integrity, logical database integrity, and element integrity

D.  

User authentication, availability, and accountability

Discussion 0
Questions 132

To ensure the quality of its newly developed software, an organization is aiming to deploy an automated testing tool that validates the source code. What type of testing BEST supports this capability?

Options:

A.  

Network vulnerability scanning

B.  

Dynamic Application Security Testing (DAST)

C.  

Static Application Security Testing (SAST)

D.  

Fuzz parsing

Discussion 0
Questions 133

Which of the following is typically used to control physical access to highly secure facilities?

Options:

A.  

Surveillance

B.  

Mantrap

C.  

Dual control

D.  

Door locks

Discussion 0
Questions 134

A house of quality (HOQ) chart aligns which pair of functions?

Options:

A.  

Customer requirements with costing

B.  

Engineering with operations

C.  

Customer purchasing with supplier shipping

D.  

Competitive analysis with product design

Discussion 0
Questions 135

An organization has hired a new auditor to review its critical systems infrastructure for vulnerabilities. Which of the following BEST describes the methodology the auditor will use to test whether servers are set up according to the organization's documented policies and standards?

Options:

A.  

Select an appropriate sample size of changes to production servers related to critical systems within the audit period and ensure they adhere to documented policies and standards.

B.  

Select an appropriate sample size of recently deployed servers and review their configuration files against the organization's policies and standards.

C.  

Select all production servers related to critical systems and review their configuration files against the organization's policies and standards.

D.  

Select an appropriate sample size of changes to recently deployed servers within the audit period and ensure they adhere to documented policies and standards.

Discussion 0
Questions 136

A company's primary performance objective Is flexibility. Which of the following measurements is most important?

Options:

A.  

Labor productivity

B.  

Schedule adherence

C.  

Machine changeover time

D.  

Cycle time

Discussion 0
Questions 137

One advantage of adopting a supply network perspective Is that it:

Options:

A.  

protects global markets.

B.  

enhances understanding of competitive and cooperative forces.

C.  

defines the market relationships and partnerships.

D.  

encourages rivals to collaborate.

Discussion 0
Questions 138

The project manager for a new application development is building a test framework. It has been agreed that the framework will Include penetration testing; however, the project manager is keen to identify any flaws prior to the code being ready for execution. Which of the following techniques BEST supports this requirement?

Options:

A.  

System vulnerability scans

B.  

Database injection tests

C.  

System reliability tests

D.  

Static source code analysis

Discussion 0
Questions 139

A webmaster has repeatedly used the same certificate sign request to renew an organization's website Secure Sockets Layer (SSL) certificate. What is the MOST significant increased risk for the organization?

Options:

A.  

Logical access control against symmetric key

B.  

Cryptanalysis against symmetric key

C.  

Cryptanalysis against private key

D.  

Logical access control against private key

Discussion 0
Questions 140

Open Authorized (OAuth) has been chosen as technology to use across applications in the enterprise. Which of the following statements is TRUE about an OAuth token?

Options:

A.  

Does not specify a time interval

B.  

Can be used for authentication

C.  

Can be used across multiple sites

D.  

Specifies what information can be accessed

Discussion 0
Questions 141

An organization’s system engineer arranged a meeting with the system owner and a few major stakeholders to finalize the feasibility analysis for a new application.

Which of the following topics will MOST likely be on the agenda?

Options:

A.  

Results of the preliminary cost-benefit studies

B.  

Design of the application system and database processes

C.  

Communication of procedures and reporting requirements

D.  

Identification of inter-application dependencies

Discussion 0
Questions 142

What document MOST likely states an organization’s values?

Options:

A.  

Union labor agreement

B.  

Information protection policy

C.  

Code of conduct

D.  

Management standards

Discussion 0
Questions 143

In the design and development of a manufacturing process, process engineers would most likely be responsible for decisions relating to:

Options:

A.  

lead times.

B.  

production capacity.

C.  

product reliability.

D.  

routing sequences.

Discussion 0
Questions 144

Which of the following is a core subset of The Open Group Architecture Framework (TOGAF) enterprise architecture model?

Options:

A.  

Security architecture

B.  

Availability architecture

C.  

Privacy architecture

D.  

Data architecture

Discussion 0
Questions 145

Cloud computing introduces the concept of the shared responsibility model. This model can MOST accurately be described as defining shared responsibility between which of the following?

Options:

A.  

Hosts and guest environments

B.  

Operating Systems (OS) and applications

C.  

Networks and virtual environments

D.  

Customers and providers

Discussion 0
Questions 146

Which of the following provides for continuous improvement of the change control process?

Options:

A.  

Configuration Management Database (CMDB) update

B.  

Predefine change window

C.  

Post change review

D.  

Stakeholder notification

Discussion 0
Questions 147

During a threat modeling exercise using the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) framework, it was identified that a web server allocates a socket and forks each time it receives a request from a user without limiting the number of connections or requests.

Which of the following security objectives is MOST likely absent in the web server?

Options:

A.  

Integrity

B.  

Authenticity

C.  

Availability

D.  

Authorization

Discussion 0
Questions 148

Which of the following design considerations would offer the BEST protection against unauthorized access to the facility?

Options:

A.  

Allowing only one person to enter at a time

B.  

Auditing access logs annually

C.  

Limiting access to regular business hours only

D.  

Establishing entry points from public areas only

Discussion 0
Questions 149

Plans are being made to move an organization’s software systems to the cloud in order to utilize the flexibility and scalability of the cloud. Some of these software systems process highly sensitive data. The organization must follow strict legal requirements regarding the location of the highly sensitive data processed by the software systems. Which cloud model will BEST fit the organization’s requirements?

Options:

A.  

Private cloud

B.  

Multicloud

C.  

Public cloud

D.  

Hybrid cloud

Discussion 0
Questions 150

A company can easily change Its workforce, but inventory carrying costs are high. Which of the following strategies would be most appropriate during times of highly fluctuating demand?

Options:

A.  

Produceto backorders

B.  

Produceat a constant level

C.  

Produceto the sales forecast

D.  

Produceto demand

Discussion 0
Questions 151

A healthcare organization’s new cloud-based customer-facing application is constantly receiving security events from dubious sources. What BEST describes a security event that compromises the confidentiality, integrity, or availability of the application and data?

Options:

A.  

Attack

B.  

Breach

C.  

Failure

D.  

Incident

Discussion 0
Questions 152

A Software As A Service (SaaS) solution was compromised due to multiple missing security controls. The SaaS deployment was rushed and the Software Development Life Cycle (SDLC) was not followed. Which SDLC phase would have been MOST effective in preventing this failure?

Options:

A.  

Maintenance

B.  

Design

C.  

Testing

D.  

Requirements

Discussion 0
Questions 153

A vendor has been awarded a contract to supply key business software. The vendor has declined all requests to have its security controls audited by customers. The organization insists the product must go live within 30 days. However, the security team is reluctant to allow the project to go live.

What is the organization's BEST next step?

Options:

A.  

Evaluate available open source threat intelligence pertaining to the vendor and their product.

B.  

Shift the negative impact of the risk to a cyber insurance provider, i.e., risk transference.

C.  

Gain assurance on the vendor’s security controls by examining independent audit reports and any relevant certifications the vendor can provide.

D.  

Document a risk acceptance, in accordance with internal risk management procedures, that will allow the product to go-live.

Discussion 0
Questions 154

Which of the following BEST describes the responsibility of an information System Security Officer?

Options:

A.  

Establish the baseline, architecture, and management direction and ensure compliance

B.  

Ensure adherence to physical security policies and procedures

C.  

Direct, coordinate, plan, and organize information security activities

D.  

Ensure the availability of the systems and their contents

Discussion 0
Questions 155

An organizations is developing a new software package for a financial institution. What is the FIRST step when modeling threats to this new software package?

Options:

A.  

Diagram the data flows of the software package.

B.  

Document the configuration of the software package.

C.  

Prioritize risks to determine the mitigation strategy.

D.  

Evaluate appropriate countermeasure to be implemented.

Discussion 0
Questions 156

In a Discretionary Access Control (DAC) model, how is access to resources managed?

Options:

A.  

By the subject’s ability to perform the function

B.  

By the discretion of a system administrator

C.  

By the subject’s rank and/or title within the security organization

D.  

By the identity of subjects and/or groups to which they belong

Discussion 0
Questions 157

When performing threat modeling using Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation of Privilege (STRIDE), which of the following is an example of a repudiation threat?

Options:

A.  

Using someone else's account

B.  

Distributed Denial-Of-Service (DDoS)

C.  

SQL Injection (SQLi)

D.  

Modifying a file

Discussion 0
Questions 158

An organization is working to secure its Supervisory Control And Data Acquisition (SCADA) system, Which monitors water supply to the city. What type of security should the organization ensure FIRST?

Options:

A.  

Endpoint security

B.  

Network security

C.  

Cyber physical security

D.  

Cloud security

Discussion 0
Questions 159

A security team member is assessing an organization’s backup strategy that follows the 3-2-1 rule. How many different types of media should they inspect to validate?

Options:

A.  

6

B.  

3

C.  

2

D.  

1

Discussion 0
Questions 160

When conducting a thorough risk assessment that involves identifying system threats and vulnerabilities and determining the potential for adverse effects on individuals, what additional factors MUST the organization consider?

Options:

A.  

Developing a contingency roadmap that will provide processes for each identified and documented risk element

B.  

Assessing the possible impact from unauthorized access on the organization's cyber insurance policies

C.  

Defining which systems are maintained by third parties and whether their control processes have been included as part of the risk assessment

D.  

Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system

Discussion 0
Questions 161

Which of the following statements correctly describes the relationship between the strategic plan and the business plan?

Options:

A.  

These are two names for the same plan.

B.  

The strategic plan constrains the business plan.

C.  

The two plans are developed independently.

D.  

The two plans are the output of a single process.

Discussion 0
Questions 162

When starting an external benchmarking study, a firm must first:

Options:

A.  

determine the metrics which will be measured and compared.

B.  

identify the target firms with which to benchmark against.

C.  

understand its own processes and document performance.

D.  

determine its areas of weakness versus the competition's.

Discussion 0
Questions 163

Which of the following documents is the BEST reference to describe application functionality?

Options:

A.  

Disaster Recovery Plan (DRP)

B.  

System security plan

C.  

Business Impact Analysis (BIA) report

D.  

Vulnerability assessment report

Discussion 0
Questions 164

In a lean environment, the batch-size decision for planning "A" items would be done by:

Options:

A.  

least total cost.

B.  

min-max system.

C.  

lot-for-lot (L4L).

D.  

periodic order quantity.

Discussion 0
Questions 165

During the sales and operations planning (S&OP) process, which of the following tasks is the primary responsibility of the functional representatives on the supply planning team?

Options:

A.  

Identifying reasons why the demand plan is not realistic

B.  

Communicating when an event will prevent meeting the supply plan

C.  

Ensuring that the functional objectives are considered when developing the plans

D.  

Understanding how to use the plan to improve functional performance

Discussion 0