Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified in Planning and Inventory Management (CPIM 8.0)

Last Update 7 hours ago Total Questions : 585

The Certified in Planning and Inventory Management (CPIM 8.0) content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include CPIM-8.0 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CPIM-8.0 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CPIM-8.0 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified in Planning and Inventory Management (CPIM 8.0) practice test comfortably within the allotted time.

Question # 121

Which of the following capabilities BEST distinguishes a Next-Generation Firewall (NGFW) from a traditional firewall?

A.

Ensures incoming and outgoing packets are inspected before they are allowed to pass through

B.

Offers features such as integrated intrusion prevention or application awareness and control

C.

Provides security when users traverse public networks such as the Internet

D.

Provides stateless and stateful inspection of incoming and outgoing network traffic

Question # 122

When a third-party needs to receive privileged information, which of the following would be the BEST to

transport the data?

A.

Layer 2 Tunneling Protocol

B.

Encrypted at rest

C.

Virtual Private Network (VPN)

D.

Encrypted in transit

Question # 123

Which of the following production activity control (PAC) techniques focuses on optimizing output?

A.

Gantt chart

B.

Priority sequencing rules

C.

Theory of constraints (TOC) scheduling

D.

Critical path management (CPM)

Question # 124

Following the setting of an organization’s risk appetite by senior management, a risk manager needs to prioritize all identified risks for treatment. Each risk has been scored based on its Annualized Loss Expectancy (ALE). Management has asked for an immediate risk mitigation plan focusing on top risks. Which is the MOST effective approach for the risk manager to quickly present a proposal to management?

A.

Rank all risks based on their Single-Loss Expectancy (SLE) and select those that exceed a maximum acceptable threshold derived from the risk appetite.

B.

Rank all risks based on ALE and select those that exceed a maximum acceptable threshold derived from the risk appetite.

C.

Rank all risks based on Single-Loss Expectancy (SLE) and select the top 10 risks.

D.

Rank all risks based on ALE and select the top 10 risks.

Question # 125

A Structured Query Language (SQL) database is hosted on a hardened, secure server. All unused ports are locked down, but external connections from untrusted networks are still required to be allowed through. What is the BEST way to ensure transactions to/from this server remain secure?

A.

Secure SQL service port with a Transport Layer Security (TLS) certificate.

B.

Use Multi-Factor Authentication (MFA) for all logins to the server.

C.

Secure SQL service port with a Secure Sockets Layer (SSL) certificate.

D.

Scan all connections to the server for malicious packets.

Question # 126

Which of the following is a threat modeling methodology used for accessing threats against applications and Operating Systems (OS)?

A.

Basically Available, Soft-State, Eventual-Consistency (BASE)

B.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial Of Service, And Elevation Of Privilege (STRIDE)

C.

Control Objectives For Information And Related Technology (COBIT)

D.

Security, Trust, Assurance And Risk (STAR)

Question # 127

An organization provides customer call center operations for major financial services organizations around the world. As part of a long-term strategy, the organization plans to add healthcare clients to the portfolio. In preparation for contract negotiations with new clients, to which cybersecurity framework(s) should the security team ensure the organization adhere?

A.

Control Objectives For Information And Related Technology (COBIT) and Health Insurance Portability And Accountability Act (HIPAA) frameworks

B.

National Institute Of Standards And Technology (NIST) and International Organization For Standardization (ISO) frameworks

C.

Frameworks specific to the industries and locations clients do business in

D.

Frameworks that fit the organization’s risk appetite, as cybersecurity does not vary industry to industry

Question # 128

Which of the following statements correctly describes the relationship between the strategic plan and the business plan?

A.

These are two names for the same plan.

B.

The strategic plan constrains the business plan.

C.

The two plans are developed independently.

D.

The two plans are the output of a single process.

Question # 129

An organization has implemented a control that requires users to change their passwords every 30 days. Which setting of the password policy will prevent users from reusing passwords?

A.

ReuseAllow

B.

History

C.

Iteration

D.

ReuseDeny

Question # 130

What is a strategic process that is aimed at considering possible attack scenarios and vulnerabilities within a proposed or existing application environment for the purpose of clearly identifying risk and impact levels?

A.

Threat modeling

B.

Asset management

C.

Risk management

D.

Asset modeling

Question # 131

An organization wants to implement Zero Trust (ZT). The Information Technology (IT) department is already using Multi-Factor Authentication (MFA) and Identity and Access Management (IAM). Which of the following would be the BEST solution for the organization to implement in order to have a ZT network?

A.

Next-generation firewall

B.

Host-Based Intrusion Detection System (HIDS)

C.

Micro-segmentation

D.

Network Intrusion Detection System (NIDS)

Question # 132

Which of the following is the workflow of the identity and access provisioning lifecycle?

A.

Creation, Assessment, Deletion

B.

Assessment, Creation, Deletion

C.

Provision, Review, Revocation

D.

Review, Provision, Revocation

Question # 133

Health information stored in paper form may be destroyed using which of the following methods?

A.

Shredding

B.

Degaussing

C.

De-identification

D.

Archiving

Question # 134

When resolving conflicts, which canon within the ISC2 Code of Ethics requires members to consider duties to principals and Individuals?

A.

Maintain the privacy and confidentiality of information obtained.

B.

Advance and protect the profession.

C.

Act honorably, honestly, justly, responsibly, and legally.

D.

Maintain competency in their respective fields.

Question # 135

To ensure the quality of its newly developed software, an organization is aiming to deploy an automated testing tool that validates the source code. What type of testing BEST supports this capability?

A.

Network vulnerability scanning

B.

Dynamic Application Security Testing (DAST)

C.

Static Application Security Testing (SAST)

D.

Fuzz parsing

Go to page: