Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified in Planning and Inventory Management (CPIM 8.0) Question and Answers

Certified in Planning and Inventory Management (CPIM 8.0)

Last Update Nov 30, 2025
Total Questions : 585

We are offering FREE CPIM-8.0 APICS exam questions. All you do is to just go and sign up. Give your details, prepare CPIM-8.0 free exam questions and then go for complete pool of Certified in Planning and Inventory Management (CPIM 8.0) test questions that will help you more.

CPIM-8.0 pdf

CPIM-8.0 PDF

$36.75  $104.99
CPIM-8.0 Engine

CPIM-8.0 Testing Engine

$43.75  $124.99
CPIM-8.0 PDF + Engine

CPIM-8.0 PDF + Testing Engine

$57.75  $164.99
Questions 1

An organization currently has a network with 55,000 unique Internet Protocol (IP) addresses in their private Internet Protocol version 4 (IPv4) network range and has acquired another organization and must integrate their 25,000 endpoints with the existing, flat network topology. If subnetting is not implemented, which network class is implied for the organization’s resulting private network segment?

Options:

A.  

A

B.  

B

C.  

C

D.  

E

Discussion 0
Questions 2

What FIRST step should a newly appointed Data Protection Officer (DPO) take to develop an organization's regulatory compliance policy?

Options:

A.  

Draft an organizational policy on retention for approval.

B.  

Ensure that periodic data governance compliance meetings occur.

C.  

Understand applicable laws, regulations, and policies with regard to the data.

D.  

Determine the classification of each data type.

Discussion 0
Questions 3

What is the BEST way to plan for power disruptions when implementing a Disaster Recovery Plan (DRP)?

Options:

A.  

Empty jugs which can easily be filled up with water.

B.  

Stock up on generator fuel and execute a generator test.

C.  

Request bids for inexpensive generators.

D.  

Purchase a contract with a secondary power provider.

Discussion 0
Questions 4

Small, independent demands for components and subassemblies typically arise from which of the following sources?

Options:

A.  

Warehouse orders

B.  

Repair and service requirements

C.  

Original equipment manufacturers

D.  

Scrap allowance

Discussion 0
Questions 5

Bad actors with little expense can easily make calls. Which social engineer strategy is a telecommunications ONLY risk concept?

Options:

A.  

Pretexting

B.  

Diversion theft

C.  

Phreaking

D.  

Baiting

Discussion 0
Questions 6

Which of the below represent the GREATEST cloud-specific policy and organizational risk?

Options:

A.  

Loss of governance between the client and cloud provider

B.  

Loss of business reputation due to co-tenant activities

C.  

Supply chain failure

D.  

Cloud service termination or failure

Discussion 0
Questions 7

Which of the following are steps involved in the identity and access provisioning lifecycle?

Options:

A.  

Dissemination, review, revocation

B.  

Dissemination, rotation, revocation

C.  

Provisioning, review, revocation

D.  

Provisioning, Dissemination, revocation

Discussion 0
Questions 8

The project manager has updated the project steering committee that a security vulnerability was found after applying the system security baseline, and remediation has been completed to close the vulnerability. What is the BEST next step for the project?

Options:

A.  

Update the security baseline and continue with the next project task.

B.  

Proceed with the next project task to meet the project deadlines.

C.  

Obtain approval from the project steering, committee to revise the system security baseline.

D.  

Create a change request for the system baseline revision.

Discussion 0
Questions 9

A company with stable demand that uses exponential smoothing to forecast demand would typically use a:

Options:

A.  

low alpha value.

B.  

low beta value.

C.  

high beta value.

D.  

high alpha value.

Discussion 0
Questions 10

A planner has chosen to increase the order point for a raw material. Which of the following costs is most likely to increase?

Options:

A.  

Carrying

B.  

Ordering

C.  

Landed

D.  

Product

Discussion 0
Questions 11

What is an important countermeasure to consider when hardening network devices and servers to reduce the effectiveness of unauthorized network scanning?

Options:

A.  

Filter inbound logging and auditing configuration of all network devices.

B.  

Filter inbound Internet Control Message Protocol (ICMP) messages at the network edge.

C.  

Filter outbound logging and auditing configuration of all network devices.

D.  

Filter outbound Internet Control Message Protocol (ICMP) messages at the network edge.

Discussion 0
Questions 12

Which of the following is MOST accurate when comparing patch management and vulnerability management?

Options:

A.  

Patch management manages the security lifecycle from discovery to remediation.

B.  

Patch management identifies, acquires, tests, and installs code changes on a specific computing device.

C.  

Vulnerability management is a process executed in specialized software to address security issues or add new features.

D.  

Vulnerability management plugs security holes and remediates risk by upgrading software to the most recent versions.

Discussion 0
Questions 13

An example of a flexibility metric for an organization Is:

Options:

A.  

average batch size.

B.  

scrap rate.

C.  

percentageof orders delivered late.

D.  

cycle time.

Discussion 0
Questions 14

Which of the following regarding authentication protocols is a PRIMARY consideration when designing an authentication and key management system?

Options:

A.  

Refresh

B.  

Visibility

C.  

Authorization

D.  

Integrity

Discussion 0
Questions 15

An organization has network services in a data center that are provisioned only for internal use, and staff at offices and staff working from home both use the services to store sensitive customer data. The organization does not want the Internet Protocol (IP) address of the service to receive traffic from users not related to the organization. Which technology is MOST useful to the organization in protecting this network?

Options:

A.  

Intrusion Detection System (IDS)

B.  

Domain Name System (DNS)

C.  

Network Address Translation (NAT)

D.  

Virtual Private Network (VPN)

Discussion 0
Questions 16

A semiconductor manufacturer is writing a physical asset handling policy. Which of the following is MOST likely to be the rationale for the policy?

Options:

A.  

Access of system logs to authorized staff

B.  

Accurate and prompt tagging of all business files

C.  

Assurance of safe and clean handling of company property

D.  

Adoption of environmental controls in the server room

Discussion 0
Questions 17

One of the benefits of Integrating a poka-yoke into the production process is that it can be used to:

Options:

A.  

facilitate mixed-model scheduling.

B.  

prevent defects.

C.  

Improve machine utilization.

D.  

enable one-piece flow.

Discussion 0
Questions 18

An organization has integrated its enterprise resource planning system into its centralized Identity and Access Management (IAM) system to automate provisioning of access. A security audit revealed that privileged access granted within the ERP system is not visible in the IAM system. Which of the following controls BEST mitigates this risk?

Options:

A.  

Implement step-up authentication for privileged functions within the ERP system.

B.  

Implement a periodic review of privileged access within the ERP system.

C.  

Implement an automated reconciliation process between ERP and IAM systems.

D.  

Implement a periodic review of all ERP access within the IAM system.

Discussion 0
Questions 19

In a Discretionary Access Control (DAC) model, how is access to resources managed?

Options:

A.  

By the subject’s ability to perform the function

B.  

By the discretion of a system administrator

C.  

By the subject’s rank and/or title within the security organization

D.  

By the identity of subjects and/or groups to which they belong

Discussion 0
Questions 20

An organization is aiming to be System and Organization Controls (SOC) 2 certified by an audit organization to demonstrate its security and availability maturity to its sub service organizations. Which type of audit does this engagement BEST describe?

Options:

A.  

Forensic audit

B.  

Third-party audit

C.  

Location audit

D.  

Internal audit

Discussion 0
Questions 21

A company assembles kits of hand tools after receipt of the order from distributors and uses two-level master scheduling. The appropriate levels of detail for the forecasts that are input to master scheduling would be total number of kits and:

Options:

A.  

each unique tool.

B.  

percentage of total for each tool.

C.  

raw material requirements.

D.  

specific kit configurations.

Discussion 0
Questions 22

A financial institution is implementing an Information Technology (IT) asset management system. Which of the following capabilities is the MOST important to include?

Options:

A.  

Logging the data leak protection status of the IT asset

B.  

Tracking the market value of the IT asset

C.  

Receiving or transferring an IT asset

D.  

Recording the bandwidth and data usage of the IT asset

Discussion 0
Questions 23

What is the BEST protection method to ensure that an unauthorized entry attempt would fail when securing highly sensitive areas?

Options:

A.  

Employee badge with a picture and video surveillance

B.  

Keyed locks and Closed-Circuit Television (CCTV) at entrances

C.  

Combination lock and a gate that prevents piggybacking

D.  

Proximity badge requiring a Personal Identification Number (PIN) entry at entrances

Discussion 0
Questions 24

Which of the following systems would be the most cost-efficient for inventory management of a low value item?

Options:

A.  

Order point

B.  

Material requirements planning (MRP)

C.  

Periodic review

D.  

Economic order quantity(EOQ)

Discussion 0
Questions 25

In which of the following environments is capable-to-promise (CTP) more appropriate than available-to-promise (ATP)?

Options:

A.  

Consumer electronics sold through local retailers

B.  

Industrial supplies shipped from regional distribution centers (DCs)

C.  

Packaged foods sold in grocery stores

D.  

Specialty chemicals packaged and shipped to order

Discussion 0
Questions 26

Which of the following security features is utilized to validate both user credentials and the health of the client device on a network?

Options:

A.  

Intrusion Detection System (IDS)

B.  

Internet Protocol Security (IPSec)

C.  

Virtual Private Network (VPN)

D.  

Network Access Control (NAC)

Discussion 0
Questions 27

Which of the following procedures should be defined when establishing information and asset handling requirements?

Options:

A.  

Asset retention procedures

B.  

Software patching procedures

C.  

Media disposal procedures

D.  

User access procedures

Discussion 0
Questions 28

A large volume of outbound Transmission Control Protocol (TCP) connections from the same source Internet Protocol (IP) address was observed at a satellite office firewall. Which of the following is the MOST likely explanation?

Options:

A.  

There is only one managed switch port device on the satellite network.

B.  

The command and control server has shut down all but one host.

C.  

The network hosts are behind a Network Address Translation (NAT) device.

D.  

The malware has shut down all but one host used for command and control.

Discussion 0
Questions 29

Which specification enables organizations to ensure penetration test results are documented using open, machine-readable standards?

Options:

A.  

Security Content Automation Protocol (SCAP)

B.  

Security Orchestration, Automation And Response (SOAR)

C.  

Common Weakness Enumeration (CWE)

D.  

Common Vulnerability Reporting Framework (CVRF)

Discussion 0
Questions 30

Which of the following is the MAIN element in achieving a successful security strategy?

Options:

A.  

Senior management commitment

B.  

Security standards adoption

C.  

Effective training and education

D.  

Effective cost/benefit analysis

Discussion 0
Questions 31

If fixed costs are §200,000 and 20,000 units are produced, a unit's fixed cost is §10. This is an example of:

Options:

A.  

variable costing.

B.  

activity-based costing (ABC).

C.  

absorption costing.

D.  

overhead costing.

Discussion 0
Questions 32

An organization needs a firewall that maps packets to connections and uses Transmission Control Protocol/Internet Protocol (TCP/IP) header fields to keep track of connections. Which type of firewall will be recommended?

Options:

A.  

Network

B.  

Stateless

C.  

Stateful

D.  

Packet

Discussion 0
Questions 33

Marketing has requested a significant change in the mix for a product family. The requested change falls between the demand and the planning time fences. The most appropriate action by the master scheduler is to:

Options:

A.  

reject the request.

B.  

accept the request.

C.  

forward the request to senior management.

D.  

check the availability of required material.

Discussion 0
Questions 34

Which of the following techniques is BEST suited to preserve the confidentiality of a system’s data?

Options:

A.  

Audit log review

B.  

Database encryption

C.  

Immutable backups

D.  

Database record locking

Discussion 0
Questions 35

What is the FIRST element that must be evaluated in a security governance program?

Options:

A.  

An organization’s business objectives and strategy

B.  

Review of Information Technology (IT) and technical controls

C.  

Review of organization’s Information Technology (IT) security policies

D.  

An organization’s utilization of resources

Discussion 0
Questions 36

Which of the following should Business Impact Analysis (BIA) reports always include?

Options:

A.  

Security assessment report

B.  

Recovery time objectives

C.  

Plan of action and milestones

D.  

Disaster Recovery Plans (DRP)

Discussion 0
Questions 37

Which of the following vulnerability types is also known as a serialization flaw and affects the integrity of two processes interacting with the same resource at the same time?

Options:

A.  

Boundary condition

B.  

Buffer overflow

C.  

Race condition

D.  

Integer overflow

Discussion 0
Questions 38

In restoring the entire corporate email system after a major outage and data loss, an email administrator reads a few email message exchanges between the human resources manager and a candidate for an open position. Which of the following BEST describes the behavior of the email administrator, and why?

Options:

A.  

The behavior is ethical, because the email administrator was not deliberately looking for the email and only accidentally read the emails.

B.  

The behavior is ethical, because the email administrator read the emails to confirm that the email system was properly restored.

C.  

The behavior is not ethical, because the email administrator exceeded his or her privilege and trust in reading the email messages.

D.  

The behavior is not ethical, because the email administrator should have informed the manager about the restoration in advance.

Discussion 0
Questions 39

Access Control Lists (ACL), protection bits, and file passwords are typical examples of which of the following access control methods?

Options:

A.  

Discretionary.

B.  

Attribute-based.

C.  

Mandatory.

D.  

Role-based.

Discussion 0
Questions 40

An attacker was able to identify an organization’s wireless network, collect proprietary network resource information, and capture several user credentials. The attacker then used that information to conduct a more sophisticated and impactful attack against the organization. Which method did the attacker MOST likely use to gather the initial information?

Options:

A.  

Proxy manipulation and Man-in-the-Middle (MITM) attack

B.  

Media Access Control (MAC) spoofing and proxy manipulation

C.  

Rogue access point and Man-in-the-Middle (MITM) attack

D.  

Media Access Control (MAC) spoofing and rogue access point

Discussion 0
Questions 41

An organization is implementing an enterprise resource planning system using the traditional waterfall Software development Life Cycle (SDLC) model. When is the BEST time to perform a code review to identity security gaps?

Options:

A.  

When the software is being released for testing

B.  

When full system code is being merged

C.  

When business analysis is being performed and systems requirements are being identified

D.  

When system architecture is being defined and user interface is being designed

Discussion 0
Questions 42

The development team wants new commercial software to Integrate into the current systems. What steps can the security office take to ensure the software has no vulnerabilities?

Options:

A.  

Request a copy of the most recent System and Organization Controls (SOC) report and/or most recent security audit reports and any vulnerability scans of the software code from the vendor.

B.  

Purchase the software, deploy it in a test environment, and perform Dynamic Application Security Testing (DAST) on the software.

C.  

Request a software demo with permission to have a third-party penetration test completed on it.

D.  

Ask the development team to reevaluate the current program and have a toolset developed securely within the organization.

Discussion 0
Questions 43

An organization wishes to utilize a managed Domain Name System (DNS) provider to reduce the risk of users accessing known malicious sites when web browsing. The organization operates DNS forwarders that forward queries for all external domains to the DNS provider. Which of the following techniques could enable the organization to identify client systems that have attempted to access known malicious domains?

Options:

A.  

DNS over Transmission Control Protocol (TCP)

B.  

DNS sinkholing

C.  

Deep packet inspection

D.  

Domain Name System Security Extensions (DNSSEC)

Discussion 0
Questions 44

A security professional is accessing an organization-issued laptop using biometrics to remotely log into a network resource. Which type of authentication method is described in this scenario?

Options:

A.  

Something one does

B.  

Something one is

C.  

Something one has

D.  

Something one knows

Discussion 0
Questions 45

An organization requires all passwords to include two uppercase characters, two numbers, and two special characters. After a security professional has successfully retrieved the hashed password file from a server, what would be the fastest attack to conduct on the file?

Options:

A.  

Dictionary

B.  

Hybrid

C.  

Inference

D.  

Rainbow table

Discussion 0
Questions 46

A bank recently informed a customer that their account has been overdrawn after their latest transaction. This transaction was not authorized by the customer. Upon further investigation, it was determined by the security team that a hacker was able to manipulate the customer's pre-authenticated session and force a wire transfer of funds to a foreign bank account. Which type of attack MOST likely occurred?

Options:

A.  

Cross-Site Request Forgery (CSRF)

B.  

On-path attack

C.  

Cross-Site Scripting (XSS)

D.  

Session hijacking

Discussion 0
Questions 47

Which of the following describes the 3 MAIN roles of the identity-delegation model?

Options:

A.  

Application server, web server, and delegate

B.  

Application server, proxy server, and delegate

C.  

Delegator, delegate, and service provider

D.  

Delegator, application server, and service provider

Discussion 0
Questions 48

Which of the following provides for continuous improvement of the change control process?

Options:

A.  

Configuration Management Database (CMDB) update

B.  

Predefine change window

C.  

Post change review

D.  

Stakeholder notification

Discussion 0
Questions 49

Based on the above table, calculate the mean absolute deviation (MAD).

Options:

A.  

-25

B.  

6.25

C.  

18.75

D.  

20

Discussion 0
Questions 50

An organization wants to control access at a high-traffic entrance using magnetic-stripe cards for identification. Which of the following is the BEST for the organization to utilize?

Options:

A.  

A turnstile

B.  

A security guard

C.  

A mantrap

D.  

A locking door

Discussion 0
Questions 51

Which burden of proof has been applied when a workplace investigation has a 51 percent or greater certainty that allegations are true?

Options:

A.  

Preponderance of evidence

B.  

Beyond a reasonable doubt

C.  

Some credible evidence

D.  

Clear and convincing

Discussion 0
Questions 52

An organization has a call center that uses a Voice Over Internet Protocol (VoIP) system. The conversations are sensitive, and the organization is concerned about employees other than the call agents accessing these conversations. What is the MOST effective additional security measure to make?

Options:

A.  

Ensure that the call agents are using an additional authentication method.

B.  

Implement a Network Access Control (NAC) solution.

C.  

Ensure that the voice media is using Secure Real-Time Transport Protocol.

D.  

Segment the voice network and add Next-Generation Firewalls (NGFW).

Discussion 0
Questions 53

A vendor has been awarded a contract to supply key business software. The vendor has declined all requests to have its security controls audited by customers. The organization insists the product must go live within 30 days. However, the security team is reluctant to allow the project to go live. What is the organization's BEST next step?

Options:

A.  

Shift the negative impact of the risk to a cyber insurance provider, i.e., risk transference.

B.  

Document a risk acceptance, in accordance with internal risk management procedures, that will allow the product to go-live.

C.  

Gain assurance on the vendor's security controls by examining independent audit reports and any relevant certifications the vendor can provide.

D.  

Evaluate available open source threat intelligence pertaining to the vendor and their product.

Discussion 0
Questions 54

As a result of a fault at a cloud service provider’s data center, the customer accounts of a utility organization were corrupted. Under the European Union’s (EU) General Data Protection Regulation (GDPR), which entity bears responsibility for resolving this?

Options:

A.  

Data steward

B.  

Data processor

C.  

Data controller

D.  

Data custodian

Discussion 0
Questions 55

An example of a cradle-to-cradle sustainability model would be:

Options:

A.  

a laundry service collects dirty baby clothes from families; cleans the clothes in large, efficient batches; and then sorts and delivers the clothes back to each family.

B.  

a coffee shop collects paper waste in its restaurants, has a selected supplier collect the paper waste to be recycled, and then purchases paper products from that supplier.

C.  

a company uses wood that has been gathered from multiple sources to construct items, such as beds and toys for babies and young children.

D.  

a bank offers the lowest interest rates on loans to firms that are committed to using recycled materials and implementing zero-waste initiatives in their processes.

Discussion 0
Questions 56

An organization has hired a new auditor to review its critical systems infrastructure for vulnerabilities. Which of the following BEST describes the methodology the auditor will use?

Options:

A.  

Select an appropriate sample size of changes to production servers related to critical systems within the audit period and ensure they adhere to documented policies and standards.

B.  

Select an appropriate sample size of recently deployed servers and review their configuration files against the organization's policies and standards.

C.  

Select all production servers related to critical systems and review their configuration files against the organization's policies and standards.

D.  

Select an appropriate sample size of changes to recently deployed servers within the audit period and ensure they adhere to documented policies and standards.

Discussion 0
Questions 57

A part is sold as a service part, and It is also used as a component In another part. Which of the following statements about the planning for this part is true?

Options:

A.  

Its low-level code is zero.

B.  

The material requirements for the part will be understated.

C.  

The service part demand can be included In the gross requirements.

D.  

It shouldn’t have any safety stock.

Discussion 0
Questions 58

A plant uses a level production strategy due to the high costs of hiring and letting go of skilled employees. The constrained resource is due to be upgraded in the fourth month of the planning horizon, and that will reduce capacity for that month by 17%.

Which of the following actions would be appropriate in this situation to maintain current levels of customer service and gross margin?

Options:

A.  

Increase planned production for the next three periods.

B.  

Defer the upgrade to a period beyond the planning time fence.

C.  

Increase planned production from the fifth period on.

D.  

Defer the upgrade to the period in which the highest stock level is planned.

Discussion 0
Questions 59

According to best practice, at which step in the system lifecycle shall a security professional begin involvement?

Options:

A.  

Project initiation and planning

B.  

Functional requirements and definition

C.  

System design specification

D.  

Build and document

Discussion 0
Questions 60

When resolving conflicts, which canon within the ISC2 Code of Ethics requires members to consider duties to principals and Individuals?

Options:

A.  

Maintain the privacy and confidentiality of information obtained.

B.  

Advance and protect the profession.

C.  

Act honorably, honestly, justly, responsibly, and legally.

D.  

Maintain competency in their respective fields.

Discussion 0
Questions 61

An organization is working to secure its Supervisory Control And Data Acquisition (SCADA) system, Which monitors water supply to the city. What type of security should the organization ensure FIRST?

Options:

A.  

Endpoint security

B.  

Network security

C.  

Cyber physical security

D.  

Cloud security

Discussion 0
Questions 62

The trade-off of increasing safety stock to improve customer fill rate would be a decrease in:

Options:

A.  

pipeline inventory.

B.  

transportation costs.

C.  

inventory turns.

D.  

sales revenue.

Discussion 0
Questions 63

The primary reason for tracing a component with scheduling problems to Its master production schedule (MPS) item is to:

Options:

A.  

revise the rough-cut capacity plan.

B.  

reschedule a related component on the shop floor.

C.  

check the accuracy of the bills for the MPS items.

D.  

determine if a customer order will be impacted.

Discussion 0
Questions 64

At which Open Systems Interconnection (OSI) layer does User Datagram Protocol (UDP) function?

Options:

A.  

Layer 1

B.  

Layer 2

C.  

Layer 4

D.  

Layer 3

Discussion 0
Questions 65

An effective approach to projecting requirements for materials with long lead times Includes which of the following options?

Options:

A.  

Initiate a multilevel master schedule.

B.  

Use phantom bills of materials (BOMs).

C.  

Increase the level of safety stock.

D.  

Decrease the planning horizon.

Discussion 0
Questions 66

Which of the following is the BEST way to identify the various types of software installed on an endpoint?

Options:

A.  

Active network scanning

B.  

Passive network scanning

C.  

Authenticated scanning

D.  

Port scanning

Discussion 0
Questions 67

The Data Loss Prevention (DLP) team in a major financial institution discovered network traffic that involved movement of sensitive material to a Cloud Service Provider (CSP). What action should be taken FIRST in this situation?

Options:

A.  

Contact the CSP to validate data access controls in the cloud.

B.  

Contact the network security team to block the traffic.

C.  

Contact the Identity And Access Management (IAM) team to remove the user from the network.

D.  

Contact the data owner to confirm the transfer was authorized.

Discussion 0
Questions 68

A security practitioner notices that workforce members retain access to information systems after transferring to new roles within the organization, which could lead to unauthorized changes to the information systems.

This is a direct violation of which common security model?

Options:

A.  

Clark-Wilson

B.  

Bell-LaPadula

C.  

Graham-Denning

D.  

Take-Grant

Discussion 0
Questions 69

Long lead-time items with stable demand would best be supported by a supply chain:

Options:

A.  

using a pull system.

B.  

linked through an enterprise resources planning (ERP) system.

C.  

designed to be responsive.

D.  

positioning inventory close to the consumer.

Discussion 0
Questions 70

An organization uses an external Identity Provider (IdP) to secure internal, external, or third-party applications. Which of the following is the GREATEST risk to the organization?

Options:

A.  

Unavailability of access logs

B.  

Integrity of authentication mechanism

C.  

Compromise of service

D.  

Deletion of federated tokens

Discussion 0
Questions 71

To mitigate risk related to natural disasters, an organization has a separate location with systems and communications in place. Data must be restored on the remote systems before they are ready for use. What type of remote site is this?

Options:

A.  

Cold Site

B.  

Mobile Site

C.  

Hot Site

D.  

Warm Sit

Discussion 0
Questions 72

Which assessing whether real-world threats to the security of an application have been mitigated, what is MOST effective source to confirm that sufficient security controls are in place for both end users and customers?

Options:

A.  

Software security team

B.  

Product management

C.  

Third-party reviews

D.  

Senior management

Discussion 0
Questions 73

Which of the following trade-offs should be evaluated when determining where to place inventory in a multi-echelon supply chain network?

Options:

A.  

Production cost and lot size quantity

B.  

Purchase cost and shrinkage rates

C.  

Transportation cost and delivery time

D.  

Customer price and order quantity

Discussion 0
Questions 74

Which of the following statements correctly describes the relationship between the strategic plan and the business plan?

Options:

A.  

These are two names for the same plan.

B.  

The strategic plan constrains the business plan.

C.  

The two plans are developed independently.

D.  

The two plans are the output of a single process.

Discussion 0
Questions 75

A company can easily change Its workforce, but inventory carrying costs are high. Which of the following strategies would be most appropriate during times of highly fluctuating demand?

Options:

A.  

Produceto backorders

B.  

Produceat a constant level

C.  

Produceto the sales forecast

D.  

Produceto demand

Discussion 0
Questions 76

Which of the following should be performed FIRST in the course of a digital forensics investigation?

Options:

A.  

Undelete files and investigate their content.

B.  

Search through unallocated space.

C.  

Shut down the system.

D.  

Identify any data that needs to be obtained.

Discussion 0
Questions 77

Following the setting of an organization’s risk appetite by senior management, a risk manager needs to prioritize all identified risks for treatment. Each risk has been scored based on its Annualized Loss Expectancy (ALE). Management has asked for an immediate risk mitigation plan focusing on top risks. Which is the MOST effective approach for the risk manager to quickly present a proposal to management?

Options:

A.  

Rank all risks based on their Single-Loss Expectancy (SLE) and select those that exceed a maximum acceptable threshold derived from the risk appetite.

B.  

Rank all risks based on ALE and select those that exceed a maximum acceptable threshold derived from the risk appetite.

C.  

Rank all risks based on Single-Loss Expectancy (SLE) and select the top 10 risks.

D.  

Rank all risks based on ALE and select the top 10 risks.

Discussion 0
Questions 78

An organization has been struggling to improve their security posture after a recent breach.

Where should the organization focus their efforts?

Options:

A.  

Common configuration enumerations

B.  

Business Continuity Plan (BCP)

C.  

Service-Level Agreements (SLA)

D.  

National vulnerability database

Discussion 0
Questions 79

An agency has the requirement to establish a direct data connection with another organization for the purpose of exchanging data between the agency and organization systems. There is a requirement for a formal agreement between the agency and organization. Which source of standards can the system owners use to define the roles and responsibilities along with details for the technical and security requirements?

Options:

A.  

International Organization For Standardization (ISO)

B.  

European Committee for Electrotechnical Standardization

C.  

Caribbean Community Regional Organization for Standards and Quality

D.  

Institute of Electrical and Electronics Engineers (IEEE)

Discussion 0
Questions 80

One way to mitigate liability risk in the supply chain is to:

Options:

A.  

negotiate lower component cost.

B.  

require traceability for components.

C.  

push inventory to supplier locations.

D.  

use less-than-truckload (LTL) shipments more frequently.

Discussion 0
Questions 81

Up-to-date Information about production order status is required to do which of the following tasks?

Options:

A.  

Calculate current takt time.

B.  

Determine planned orders.

C.  

Replenish kanban quantities.

D.  

Calculate the cost of work in process (WIP).

Discussion 0
Questions 82

Fishbone diagrams would help a service organization determine:

Options:

A.  

the proper level of service for a customer segment.

B.  

the source of a quality-of-service issue.

C.  

differences in the performance of employees.

D.  

the decomposition of customer return rates with seasonality.

Discussion 0
Questions 83

Disaster Recovery (DR) training plan outcomes should have which KEY quality?

Options:

A.  

Comprehensible

B.  

Identifiable

C.  

Measurable

D.  

Editable

Discussion 0
Questions 84

An organization is looking to integrate security concepts into the code development process early in development to detect issues before the software is launched. Which advantage does the organization gain from using Static Application Security Testing (SAST) techniques versus dynamic application security testing techniques?

Options:

A.  

Allows tailored techniques

B.  

Executes code to detect issues

C.  

Allows for earlier vulnerability detection

D.  

Simulates attacker patterns

Discussion 0
Questions 85

Which of the following methods places a replenishment order when the quantity on hand falls below a predetermined level?

Options:

A.  

Min-max system

B.  

Fixed order quantity

C.  

Periodic review

D.  

Available-to-promlse (ATP)

Discussion 0
Questions 86

Which of the following attributes describes a company with a global strategy?

Options:

A.  

Ituses the same basic competitive style worldwide and focuses efforts on building global brands.

B.  

Itcustomizes the basic competitive style to fit markets but focuses efforts on building global brands.

C.  

Itcoordinates major strategic decisions worldwide but gives country managers wide strategy-making latitude.

D.  

Itoperates plants in many host countries and uses decentralized distribution.

Discussion 0
Questions 87

Which of the following presents the GREATEST benefit to an organization's security posture when a change management process is implemented?

Options:

A.  

Accuracy of Key Risk Indicators (KRI) reported to senior management

B.  

Ensure the integrity of the organization's assets

C.  

Backups being completed in a timely manner

D.  

Accuracy of Key Performance Indicators (KPI) reported to senior management

Discussion 0
Questions 88

Which of the following tools shows process changes and random variation over time?

Options:

A.  

Check sheet

B.  

Control chart

C.  

Histogram

D.  

Pareto analysis

Discussion 0
Questions 89

An organization is planning to streamline its Identity and Access Management (IAM) processes and platform. The executive team mandated a compact platform to efficiently manage identities for internal and third-party services access. What is the BEST platform choice?

Options:

A.  

Cloud Single Sign-On (SSO)

B.  

On-premise IAM

C.  

Cloud IAM

D.  

Identity as a Service (IDaaS)

Discussion 0
Questions 90

An organization is implementing improvements to secure the Software Development Life Cycle (SDLC). When should defensive three modeling occur?

Options:

A.  

Standards review

B.  

Static Application Security Testing (SAST)

C.  

Design and requirements gathering

D.  

Dynamic Application Security Testing (DAST)

Discussion 0
Questions 91

What General Data Protection Regulation (GDPR) principle says that data should be collected lawfully and with the person’s consent?

Options:

A.  

Legitimate data collection

B.  

Limitation of use

C.  

Collection Categorization

D.  

Collection limitation

Discussion 0
Questions 92

A third-party vendor is procured to conduct a non-financial audit. Which report evaluates the effectiveness of the controls?

Options:

A.  

Statement of Auditing Standards (SAS) 70

B.  

System ad Organization Controls (SOC) 1

C.  

System ad Organization Controls (SOC) 2

D.  

System ad Organization Controls (SOC) 3

Discussion 0
Questions 93

Following the go-live of a new financial software, an organization allowed the Information Technology (IT) officer to maintain all rights and access permissions to help the organization staff should they have challenges in their day-to-day work. What is the BEST way to categorize the situation?

Options:

A.  

Excessive privileges

B.  

Need to know access

C.  

Training access

D.  

Least access principle

Discussion 0
Questions 94

Substituting capital equipment in place of direct labor can be economically Justified for which of the following scenarios?

Options:

A.  

Volumes are forecasted to increase

B.  

Material prices are forecasted to increase

C.  

Implementing a pull system in production

D.  

Functional layouts are being utilized

Discussion 0
Questions 95

What is the MOST effective way to begin a risk assessment?

Options:

A.  

Reviewing the policy, objectives, mandate, and commitment to manage risk

B.  

Learning the organization's ability to accept and/or manage risks

C.  

Identifying the resources available to manage risks within the organization

D.  

Identifying the nature of the risks faced by the organization

Discussion 0
Questions 96

Which of the following is the MOST significant flaw when using Federated Identity Management (FIM)?

Options:

A.  

The initial cost of the setup is prohibitively high for small business.

B.  

The token stored by the Identity Provider (IdP) may need to be renewed.

C.  

The token generated by the Identity Provider (IdP) may be corrupted.

D.  

The participating members in a federation may not adhere to the same rules of governance.

Discussion 0
Questions 97

A financial services organization wants to deploy a wireless network. Which of the following is the WEAKEST option for ensuring a secure network?

Options:

A.  

Separating internal wireless users from guests

B.  

Media Access control (MAC) address filtering

C.  

Multi-Factor Authentication (MFA)

D.  

Deploy mutual authentication between the client and the network

Discussion 0
Questions 98

An independent risk assessment determined that a hospital's existing policies did not have a formal process in place to address system misuse, abuse, or fraudulent activity by internal users. Which of the following would BEST address this deficiency in the Corrective Action Plan?

Options:

A.  

Create and deploy policies and procedures

B.  

Develop and implement a sanction policy

C.  

Implement a risk management program

D.  

Perform a security control gap analysis

Discussion 0
Questions 99

Which of the following design considerations would offer the BEST protection against unauthorized access to the facility?

Options:

A.  

Allowing only one person to enter at a time

B.  

Auditing access logs annually

C.  

Limiting access to regular business hours only

D.  

Establishing entry points from public areas only

Discussion 0
Questions 100

Forecast error typically triggers forecast revision when it is:

Options:

A.  

used in computing the tracking signal.

B.  

associated with the Introduction stage of the product life cycle.

C.  

continually increasing.

D.  

caused by random variation.

Discussion 0
Questions 101

Which of the following controls should a financial Institution have in place in order to prevent a trader from both entering and executing a trade?

Options:

A.  

Cameras in the trading room

B.  

Two-Factor Authentication (2FA)

C.  

Separation of Duties (SoD)

D.  

Least privilege

Discussion 0
Questions 102

An organizational policy requires that any data from organization-issued devices be securely destroyed before disposal. Which method provides the BEST assurance of data destruction?

Options:

A.  

Incinerating

B.  

Reformatting

C.  

Degaussing

D.  

Erasing

Discussion 0
Questions 103

A manufacturer has a primary assembly line supported by output from several subassembly lines. Which of the following scenarios would be the best argument for a multilevel master scheduling process?

Options:

A.  

Low variation in aggregate subassembly demand

B.  

High variation in aggregate subassembly demand

C.  

Low variation in subassembly demand mix

D.  

High variation in subassembly demand mix

Discussion 0
Questions 104

Based on the values reported in the table below, what is the inventory turnover?

Options:

A.  

0.50

B.  

0.58

C.  

1.73

D.  

2.60

Discussion 0
Questions 105

Capacity requirements planning (CRP) is applicable primarily In companies operating In an environment where:

Options:

A.  

backlog is very low.

B.  

the status of work orders is disregarded.

C.  

lean principles are used.

D.  

material requirements planning (MRP) is used.

Discussion 0
Questions 106

Which of the following statements characterizes a pull system In distribution management?

Options:

A.  

Each warehouse makes its own replenishment decisions.

B.  

It uses distribution requirements planning(DRP).

C.  

It uses uniform performance measures.

D.  

It uses fair-share allocation.

Discussion 0
Questions 107

An organization has a legacy application used in production. Security updates are no longer provided, which makes the legacy application vulnerable. The legacy application stores Social Security numbers and credit card numbers. Which actions will BEST reduce the risk?

Options:

A.  

Submit a security exception for the application and remove it from vulnerability scanning

B.  

Report to the privacy officer and increase logging and monitoring of the application

C.  

Continue to operate and monitor the application until it is no longer needed

D.  

Implement compensating controls and prioritize upgrading the application

Discussion 0
Questions 108

The most relevant measure of customer service performance Is:

Options:

A.  

service perceived by the customer against service expected by the customer.

B.  

service promised to the customer against service measured by the supplier.

C.  

customer complaints received as a percentage of orders shipped.

D.  

positive customer feedback as a percentage of customer feedback.

Discussion 0
Questions 109

Which of the following capabilities BEST distinguishes a Next-Generation Firewall (NGFW) from a traditional firewall?

Options:

A.  

Ensures incoming and outgoing packets are inspected before they are allowed to pass through

B.  

Offers features such as integrated intrusion prevention or application awareness and control

C.  

Provides security when users traverse public networks such as the Internet

D.  

Provides stateless and stateful inspection of incoming and outgoing network traffic

Discussion 0
Questions 110

An attacker wants to decrypt a message and has no knowledge of what may have been in the original message. The attacker chooses to use an attack that will exhaust the keyspace in order to decrypt the message. What type of cryptanalytic attack is the attacker using?

Options:

A.  

Ciphertext only

B.  

Chosen ciphertext

C.  

Brute force

D.  

Known plaintext

Discussion 0
Questions 111

Which of the following statements best characterizes enterprise resources planning (ERP) systems?

Options:

A.  

They track activity from customer order through payment.

B.  

They are expensive but easy to implement.

C.  

They provide real-time planning and scheduling, decision support, available-to-promise (ATP), and capable-to-promise (CTP) capabilities.

D.  

They are used for strategic reporting requirements.

Discussion 0
Questions 112

Which of the following should be done FIRST when implementing an Identity and Access Management (IAM) solution?

Options:

A.  

List and evaluate IAM available products.

B.  

Evaluate the existing Information Technology (IT) environment.

C.  

Evaluate business needs.

D.  

Engage the sponsor and identify key stakeholders.

Discussion 0
Questions 113

An organization's security policy requires sensitive information to be protected when being transmitted to external sources via would be the BEST security solution to choose?

Options:

A.  

Use spam filters and anti-virus software to send emails externally.

B.  

Configure digital signatures to send emails externally.

C.  

Configure the system to utilize to send encrypted emails externally.

D.  

Use e-mail security gateway to send emails externally.

Discussion 0
Questions 114

Which of the following documents is the BEST reference to describe application functionality?

Options:

A.  

Disaster Recovery Plan (DRP)

B.  

System security plan

C.  

Business Impact Analysis (BIA) report

D.  

Vulnerability assessment report

Discussion 0
Questions 115

When designing a production cell, which of the following items would be the most important consideration?

Options:

A.  

Theunit per hour requirement for the production cell to meet the sales forecast

B.  

Theflow of materials into the cell and sequencing of operations to minimize total cycle time

C.  

Theoutput rate for the first operation and move time after the last workstation

D.  

Thetakt time requirement for each operator to meet the monthly production goals of the plant

Discussion 0
Questions 116

An information system containing Protected Health Information (PHI) will be accessed by doctors, nurses, and others working in a hospital. The same application will be used by staff in the pharmacy department only for dispensing prescribed medication. Additionally, patients can log in to view medical history. The system owner needs to propose an access control model that considers environment, situation, compliance, and security policies while dynamically granting the required level of access. Which access control model is the MOST suitable?

Options:

A.  

Role-Based Access Control (RBAC)

B.  

Attribute-Based Access Control (ABAC)

C.  

Task-based access control

D.  

Risk-adaptive access control

Discussion 0
Questions 117

Business management should be engaged in the creation of Business Continuity (BC) and Disaster Recovery plans (DRP) because they need to

Options:

A.  

Ensure that the technology chosen for implementation meets all of the requirements.

B.  

Provide resources and support for the development and testing of the plan.

C.  

Predetermine spending for development and implantation of the plan.

D.  

Specify the solution and options around which the plans will be developed.

Discussion 0
Questions 118

A large retail organization will be creating new Application Programming Interfaces (API) as part of a customer-facing shopping solution. The solution will accept information from users both inside and outside of the organization. What is the safest software development practice the team can follow to protect the APIs against Structured Query Language Injection (SQLi) attacks?

Options:

A.  

Strictly validate all inputs for safe characters.

B.  

Grant database access using the principle of least authority.

C.  

Escape special characters in input statements.

D.  

Use prepared input statements.

Discussion 0
Questions 119

Which of the following circumstances would cause a move from acceptance sampling to 100% inspection?

Options:

A.  

History shows that the quality level has been stable from lot to lot.

B.  

The company uses one of its qualified suppliers.

C.  

Downstream operators encounter recurring defects.

D.  

The percent of defects is expected to be greater than 5%.

Discussion 0
Questions 120

Increased use of third-party logistics (3PL) services is likely to have which of the following effects on a firm's balance sheet?

Options:

A.  

Decreased fixed assets

B.  

Decreased retained earnings

C.  

Increased accounts receivable

D.  

Increased intangible assets

Discussion 0
Questions 121

After a recent threat modeling workshop, the organization has requested that the Chief Information Security Officer (CISO) implement zero trust (ZT) policies. What was the MOST likely threat identified in the workshop?

Options:

A.  

Natural threats

B.  

Elevation of privilege

C.  

Repudiation

D.  

Information disclosure

Discussion 0
Questions 122

Who is ultimately responsible for ensuring that specific data is protected?

Options:

A.  

Custodian

B.  

Data owner

C.  

Data controller

D.  

System owner

Discussion 0
Questions 123

A logistics manager Is faced with delivering an order via rail or truck. Shipping via rail costs S300 and takes 14 days. Shipping via truck costs $600 and takes 3 days. If the holding cost is $40 per day, what is the cost to deliver the order?

Options:

A.  

$340for rail,$600 for truck

B.  

$340for rail.$720 for truck

C.  

$860for rail,$720 for truck

D.  

$860for rail.$600 for truck

Discussion 0
Questions 124

Which of the following BEST describes an individual modifying something the individual is not supposed to?

Options:

A.  

Exfiltration

B.  

Tampering

C.  

Spoofing

D.  

Repudiation

Discussion 0
Questions 125

Which of the following is the BEST option for a security director to use in order to mitigate the risk of inappropriate use of credentials by individuals with administrative rights?

Options:

A.  

Have administrators sign appropriate access agreements.

B.  

Define the Acceptable Use Policy (AUP) for administrators.

C.  

Have administrators accept a Non-Disclosure Agreement.

D.  

Perform extensive background checks on administrators.

Discussion 0
Questions 126

A company that uses concurrent engineering is likely to experience which of the following outcomes in the first period of a product's life cycle?

Options:

A.  

Fewer product design changes

B.  

An increase in obsolete inventory

C.  

More accurate forecasting

D.  

Conflicts between purchasing and engineering

Discussion 0
Questions 127

Which of the following is a disadvantage of using federated identity?

Options:

A.  

The administrative burden is increased

B.  

The application has access to the user’s credentials

C.  

Applications may need complex modifications to implement

D.  

A compromised credential provides access to all the user’s applications

Discussion 0
Questions 128

In the context of mobile device security, which of the following BEST describes why a walled garden should be implemented?

Options:

A.  

To track user actions and activity

B.  

To prevent the installation of untrusted software

C.  

To restrict a user's ability to change device settings

D.  

To limit web access to only approved sites

Discussion 0
Questions 129

Endpoint security needs to be established after an organization procured 1,000 industrial Internet Of Things (IoT) sensors. Which of the following challenges are the security engineers MOST likely to face?

Options:

A.  

Identity And Access Management (IAM)

B.  

Power and physical security

C.  

Configuration Management (CM) and deployment

D.  

Installation and connection

Discussion 0
Questions 130

A statistical safety stock calculation would be appropriate for:

Options:

A.  

components used in multiple end items.

B.  

new products at time of introduction.

C.  

end items with stable demand.

D.  

supply-constrained raw materials.

Discussion 0
Questions 131

Which authentication method is used by an email server to verify that a sender’s Internet Protocol (IP) address is authorized to send messages by the sending domain?

Options:

A.  

DomainKeys Identified Mail (DKIM)

B.  

Sender policy framework

C.  

Pointer record

D.  

Secure/Multipurpose Internet Mail Extensions (S/MIME)

Discussion 0
Questions 132

A potentially life-threatening vulnerability is found in vendor software that is used to manage critical systems. Which of the following is generally considered the BEST method to disclose the vulnerability from an ethical hacking perspective?

Options:

A.  

Coordinated disclosure because it compels the vendor to act within a certain time frame

B.  

Bug bounty disclosure programs because the researcher should get paid for finding the vulnerability

C.  

Full public disclosure because the vulnerability is serious and the organizations using the software need to know quickly

D.  

Full vendor disclosure because it is the vendor’s responsibility to disclose vulnerabilities to its customers

Discussion 0
Questions 133

When starting an external benchmarking study, a firm must first:

Options:

A.  

determine the metrics which will be measured and compared.

B.  

identify the target firms with which to benchmark against.

C.  

understand its own processes and document performance.

D.  

determine its areas of weakness versus the competition's.

Discussion 0
Questions 134

A security engineer is implementing an authentication system for a new web application. The authentication requirements include the ability for a server to authenticate the client and for the client to authenticate the server. Which of the following choices BEST supports this requirement?

Options:

A.  

Secure Shell (SSH)

B.  

Trusted Platform Module (TPM)

C.  

Virtual Private Network (VPN)

D.  

Transport Layer Security (TLS)

Discussion 0
Questions 135

While doing a penetration test, auditors found an old credential hash for a privileged user. To prevent a privileged user's hash from being cached, what is the MOST appropriate policy to mandate?

Options:

A.  

Add privileged user to the domain admin group.

B.  

Add privileged users to the protected users group.

C.  

Enable security options for each privileged user.

D.  

Place each privileged user in a separate Kerberos policy.

Discussion 0
Questions 136

In order to meet retention requirements, it may be necessary to migrate digital records to different media because of which of the following issues?

Options:

A.  

Deduplication conserves storage.

B.  

Regulatory guidance requires compliance.

C.  

Digital media can degrade.

D.  

Hierarchical storage facilitates access.

Discussion 0
Questions 137

A cloud-based web application requires the use of cryptographic keys to encrypt user-uploaded files at rest. Where is the safest place to store these cryptographic keys?

Options:

A.  

Keys are stored in a password protected zip file.

B.  

Keys are stored with source code in a revision control system.

C.  

Keys are stored in a cloud-based file storage system.

D.  

Keys are stored in a central, internal key management system.

Discussion 0
Questions 138

Which Virtual Private Network (VPN) protocol provides a built-in encryption?

Options:

A.  

Layer 2 Tunneling Protocol

B.  

Point-to-Point Tunneling Protocol

C.  

Layer 2 Forwarding Protocol

D.  

Internet Protocol Security (IPsec)

Discussion 0
Questions 139

An organization is designing a new Disaster Recovery (DR) site. What is the BEST option to harden security of the site?

Options:

A.  

Physical access control

B.  

Natural disaster insurance

C.  

Natural surveillance

D.  

Territorial reinforcement

Discussion 0
Questions 140

An organization provides customer call center operations for major financial services organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?

Options:

A.  

Control Objectives For Information And Related Technology (COBIT) and Health Insurance Portability And Accountability Act (HIPAA) frameworks

B.  

National Institute Of Standards And Technology (NIST) and International Organization For Standardization (ISO) frameworks

C.  

Frameworks specific to the industries and locations clients do business in

D.  

Frameworks that fit the organization’s risk appetite, as cybersecurity does not vary industry to industry

Discussion 0
Questions 141

After a data loss event, an organization is reviewing its Identity and Access Management (IAM) governance process. The organization determines that the process is not operating effectively. What should be the FIRST step to effectively manage the IAM governance process?

Options:

A.  

Complete an inventory of who has access to systems.

B.  

Create a Role-Based Access Control (RBAC) process to determine what a specific group of users can access.

C.  

Create an Attribute-Based Access Control (ABAC) process to assign access to users based on their account attributes and characteristics.

D.  

Conduct an assessment and remove all inactive accounts.

Discussion 0
Questions 142

Health information stored in paper form may be destroyed using which of the following methods?

Options:

A.  

Shredding

B.  

Degaussing

C.  

De-identification

D.  

Archiving

Discussion 0
Questions 143

An organization implemented a threat modeling program focusing on key assets. However, after a short time it became clear that the organization was having difficulty executing the threat modeling program.

Which approach will MOST likely have been easier to execute?

Options:

A.  

System-centric approach

B.  

Attacker-centric approach

C.  

Asset-centric approach

D.  

Developer-centric approach

Discussion 0
Questions 144

After a recent cybersecurity incident, a manufacturing organization is interested in further hardening its Identity and Access Management (IAM) solution. Knowing that the organization limits the use of personal devices in the facility, which could BEST be implemented to enhance the manufacturing organization's IAM solution?

Options:

A.  

Enhanced background checks

B.  

Mobile Multi-Factor Authentication (MFA) application

C.  

Biometric system

D.  

Personal Identification Number (PIN) code

Discussion 0
Questions 145

If organizational leadership determines that its required continuous monitoring plan is too costly for the organization, what action should be taken by leadership and the Authorizing Official (AO)?

Options:

A.  

Determine if the organization’s risk posture allows the system to operate without the continuous monitoring of the controls in question

B.  

Identify and monitor only the technical controls, as they cover the most critical threats to the organization

C.  

Ensure that the organization’s Configuration Management (CM) and control processes are documented and executed according to policy

D.  

Continue developing the system using a secure Software Development Life Cycle (SDLC) approach and testing, thereby eliminating the need for monitoring the security controls

Discussion 0
Questions 146

Open Authorized (OAuth) has been chosen as technology to use across applications in the enterprise. Which of the following statements is TRUE about an OAuth token?

Options:

A.  

Does not specify a time interval

B.  

Can be used for authentication

C.  

Can be used across multiple sites

D.  

Specifies what information can be accessed

Discussion 0
Questions 147

Which of the following outcomes Is a benefit of mixed-model scheduling?

Options:

A.  

Increased inventory

B.  

Improved demand response

C.  

Fewer setups

D.  

Fewer material shortages

Discussion 0
Questions 148

A cybersecurity professional has been tasked with instituting a risk management function at a new organization. Which of the following is the MOST important step the professional should take in this endeavor?

Options:

A.  

Determine the acceptable level of loss exposure at which the organization is comfortable operating.

B.  

Conduct a gap assessment and produce a risk rating report for the executive leadership.

C.  

Engage consultants to audit the organization against best practices and provide a risk report.

D.  

Implement an enterprise Governance, Risk, and Compliance (GRC) management solution.

Discussion 0
Questions 149

Check sheets can be used to:

Options:

A.  

determine the frequency of a defect and the time period between occurrences.

B.  

provide a quick method to identify if possible defects exist.

C.  

allow improvement teams to see if action items are being completed on time.

D.  

provide an indication of correlation between defects.

Discussion 0
Questions 150

Which of the following actions provides the BEST evidence for forensic analysis of powered-off device?

Options:

A.  

Copy all potentially useful files from the system to a network drive.

B.  

Image the entire hard disk on an external drive.

C.  

Copy all system and application log files to an external drive.

D.  

Collect the memory, running processes, and temporary files.

Discussion 0
Questions 151

The results of a threat campaign show a high risk of potential intrusion. Which of the following parameters of the Common Vulnerability Scoring System (CVSS) will MOST likely provide information on threat conditions for the organization to consider?

Options:

A.  

Modified base metrics

B.  

Remediation level

C.  

Integrity requirements

D.  

Attack complexity

Discussion 0
Questions 152

Which Open Systems Interconnection (OSI) layer is concerned with Denial-Of-Service (DoS) SYN flood attacks?

Options:

A.  

Data

B.  

Physical

C.  

Network

D.  

Transport

Discussion 0
Questions 153

A disadvantage of a capacity-lagging strategy may be:

Options:

A.  

lack of capacity to fully meet demand.

B.  

risk of excess capacity if demand does not reach forecast.

C.  

a high cost of inventories.

D.  

planned capital investments occur earlier than needed.

Discussion 0
Questions 154

Which of the following is the BEST reason to conduct a penetration test?

Options:

A.  

To verify compliance with organizational patching policies.

B.  

To document that all relevant patches have been installed.

C.  

To identify technical vulnerabilities.

D.  

To determine if weaknesses can be exploited.

Discussion 0
Questions 155

Which of the following threats MUST be included while conducting threat modeling for a Cloud Service Provider (CSP)?

Options:

A.  

Risks of data breaches that can result from inadequate encryption of tenant data in transit and at rest

B.  

Potential legal actions from third parties due to tenants’ activities on the CSP’s platform

C.  

Vulnerabilities in shared resources that can be exploited by attackers to affect multiple tenants

D.  

Threats originating from the CSP’s tenants that can impact the infrastructure and other tenants

Discussion 0
Questions 156

The production plan defines which of the following targets?

Options:

A.  

Sales forecast

B.  

Quantities of each product to be produced

C.  

Level of output to be produced

D.  

Business plans for the company

Discussion 0
Questions 157

During an emergency management and planning session, an organization is discussing how to identify, prevent, prepare for, or respond to emergencies. Which of the following will provide the BEST possible outcome?

APerform drills on a recurring basis.

B.Harden all critical facilities.

C.Outsource to an external organization.

D.Allocate 100% of required funds.

Options:

Discussion 0
Questions 158

What is the MAIN benefit of network segmentation?

Options:

A.  

Limiting data transfer

B.  

Limiting cyberattack damage

C.  

Limiting privilege access

D.  

Limiting network addresses

Discussion 0
Questions 159

A forecasting method that responds slowly to changes in demand would be most appropriate when the historical demand pattern shows a:

Options:

A.  

Minor seasonal component

B.  

Major seasonal component

C.  

Minor random component

D.  

Major random component

Discussion 0
Questions 160

Which of the following items does the master scheduler have the authority to change in the master scheduling process?

Options:

A.  

Product mix

B.  

Aggregate volume

C.  

Engineering change effectivity date

D.  

Customer order quantities

Discussion 0
Questions 161

The Business Continuity Plan (BCP) has multiple components. The information security plan portion must prioritize its efforts. Which 3 aspects of information security MUST be prioritized?

Options:

A.  

Confidentiality, integrity, availability

B.  

Physical security, access control, asset protection

C.  

Intent, capability, opportunity

D.  

Threat level, network security, information disposal

Discussion 0
Questions 162

A security consultant is recommending the implementation of a security-focused Configuration Management (CM) process in an organization. What would be the BEST benefit the security consultant would include in the recommendation?

Options:

A.  

Security-focused CM integrates the general concepts of CM with existing security requirements of the organization.

B.  

Security-focused CM integrates the general concepts of CM with regulatory requirements placed on an organization.

C.  

Security-focused CM surpasses existing security requirements of the organization.

D.  

Security-focused CM integrates the general concepts of CM with best practices derived from industry frameworks.

Discussion 0
Questions 163

To ensure the quality of its newly developed software, an organization is aiming to deploy an automated testing tool that validates the source code. What type of testing BEST supports this capability?

Options:

A.  

Network vulnerability scanning

B.  

Dynamic Application Security Testing (DAST)

C.  

Static Application Security Testing (SAST)

D.  

Fuzz parsing

Discussion 0
Questions 164

Which of the following MUST exist for an activity to be considered an audit?

Options:

A.  

An auditor that is in no way employed, connected or associated to the organization being audited

B.  

Stored Personally Identifiable Information (PII) that an organization has a legal obligation to protect

C.  

A predefined standard and systematic approach to test the application of that standard

D.  

A certified member of a professional body qualified in the area of inspection

Discussion 0
Questions 165

What is the MAIN privacy risk raised by federated identity solutions?

Options:

A.  

The potential for tracking and profiling an individual's transactions

B.  

The potential to break the chain of trust between identity brokers

C.  

The potential for exposing an organization's sensitive business information

D.  

The potential for unauthorized access to user attributes

Discussion 0
Questions 166

A systems engineer has been tasked by management to provide a recommendation with a prioritized, focused set of actions to help the organization stop high-risk cyber attacks and ensure data security. What should the systems engineer recommend the organization use to accomplish this?

Options:

A.  

Center for Internet Security critical security controls

B.  

Control Objectives for Information and Related Technology (COBIT)

C.  

Inventory baseline controls

D.  

Security content automation protocol controls

Discussion 0
Questions 167

What document MOST likely states an organization’s values?

Options:

A.  

Union labor agreement

B.  

Information protection policy

C.  

Code of conduct

D.  

Management standards

Discussion 0
Questions 168

What is the PRIMARY benefit an organization obtains by adapting a cybersecurity framework to their cybersecurity program?

Options:

A.  

A structured risk management process

B.  

A common set of security capabilities

C.  

A structured cybersecurity program

D.  

A common language and methodology

Discussion 0
Questions 169

A contractor hacked into an unencrypted session on an organization's wireless network. Which authentication configuration is MOST likely to have enabled this?

Options:

A.  

Remote Authentication Dial-In User Service (RADIUS)

B.  

Captive web portal

C.  

Lightweight Directory Access Protocol (LDAP)

D.  

Token authentication

Discussion 0
Questions 170

Which of the following terms below BEST describes the measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces security policy?

Options:

A.  

Risk tolerance

B.  

Residual risk

C.  

Security architecture

D.  

Security assurance

Discussion 0
Questions 171

When conducting a vulnerability test using a scanner tool, which unintended consequence can occur?

Options:

A.  

Opening of previously closed ports

B.  

Adding administrator rights on servers

C.  

Performing a Cross-Site Scripting (XSS) attack

D.  

Creating a Denial-Of-Service (DoS) condition

Discussion 0
Questions 172

An organization’s computer incident response team PRIMARILY responds to which type of control?

Options:

A.  

Detective

B.  

Administrative

C.  

Preventative

D.  

Corrective

Discussion 0
Questions 173

A house of quality (HOQ) chart aligns which pair of functions?

Options:

A.  

Customer requirements with costing

B.  

Engineering with operations

C.  

Customer purchasing with supplier shipping

D.  

Competitive analysis with product design

Discussion 0
Questions 174

An organization is concerned that if an employee’s mobile device is lost or stolen and does not reconnect to the carrier network, the data on the device may still be at risk. Consequently, the organization has implemented a control on all mobile devices to require an eight-character passcode for unlock and login. What should happen after multiple incorrect passcode attempts?

Options:

A.  

The device should be restarted.

B.  

The device should be wiped.

C.  

The device should be turned off.

D.  

The device passcode should be reset.

Discussion 0
Questions 175

Which of the following is an access control method that organizations can use to prevent unauthorized access?

Options:

A.  

Bring Your Own Device (BYOD)

B.  

Man-in-the-Middle (MITM)

C.  

Token-based authentication

D.  

Digital verification

Discussion 0