Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CPIM-8.0 VCE Exam Download

Page: 41 / 41
Total 552 questions

Certified in Planning and Inventory Management (CPIM 8.0) Questions and Answers

Question 161

An attacker wants to decrypt a message and has no knowledge of what may have been in the original message. The attacker chooses to use an attack that will exhaust the keyspace in order to decrypt the message. What type of cryptanalytic attack is the attacker using?

Options:

A.

Ciphertext only

B.

Chosen ciphertext

C.

Brute force

D.

Known plaintext

Question 162

In preparing for a facility location decision, proximity to suppliers would be classified as which kind of criteria?

Options:

A.

Service level requirements

B.

Future flexibility factors

C.

Access to transportation

D.

Cost factors

Question 163

According to best practice, at which step in the system lifecycle shall a security professional begin involvement?

Options:

A.

Project initiation and planning

B.

Functional requirements and definition

C.

System design specification

D.

Build and document

Question 164

What are the FIRST two steps an organization should conduct to classify its assets?

Options:

A.

Define user requirements and collate existing inventories

B.

Categorize assets and set minimum security controls

C.

Conduct an inventory of assets and determine the owners

D.

Obtain senior management buy-in and conduct a risk assessment

Page: 41 / 41
Total 552 questions