Winter Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

All CPIM-8.0 Test Inside APICS Questions

Page: 31 / 44
Total 585 questions

Certified in Planning and Inventory Management (CPIM 8.0) Questions and Answers

Question 121

How would a master production schedule (MPS) be used In an assemble-to-order (ATO) manufacturing environment?

Options:

A.

The MPS is used to plan subassemblies and components; end items are only scheduled when a customer order is received.

B.

Subassemblies are scheduled in the MPS when the customer order is received, and production can start.

C.

Typically, the MPS is not used in companies using an ATO manufacturing strategy.

D.

Often In an ATO environment, the MPS is created once a year and only revised if a product is discontinued.

Question 122

Which security audit phase is MOST important to ensure correct controls are applied to classified data in a production environment?

Options:

A.

Data gathering

B.

Data analysis

C.

Planning and research

D.

Audit reporting and follow-up

Question 123

After a data loss event, an organization is reviewing its Identity and Access Management (IAM) governance process. The organization determines that the process is not operating effectively. What should be the FIRST step to effectively manage the IAM governance process?

Options:

A.

Complete an inventory of who has access to systems.

B.

Create a Role-Based Access Control (RBAC) process to determine what a specific group of users can access.

C.

Create an Attribute-Based Access Control (ABAC) process to assign access to users based on their account attributes and characteristics.

D.

Conduct an assessment and remove all inactive accounts.

Question 124

Which of the following BEST describes how an Application Programming Interface (API) gateway fits into an application architecture?

Options:

A.

An API gateway is a specialized reverse proxy that can make different APIs appear as if they are a single API.

B.

An API gateway inspects traffic and blocks many common attacks against Hypertext Transfer Protocol (HTTP) web services.

C.

An API gateway ensures that a Denial-Of-Service (DoS) attack cannot occur within the application.

D.

An API gateway monitors traffic within internal networks and ensures suspicious patterns are detected on any API.

Page: 31 / 44
Total 585 questions