Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CPIM-8.0 Exam Dumps - Certified in Planning and Inventory Management (CPIM 8.0)

Go to page:
Question # 17

Based on the values reported in the table below, what is the inventory turnover?

A.

0.50

B.

0.58

C.

1.73

D.

2.60

Full Access
Question # 18

What is the main negative effect of changing the due dates of open orders?

A.

The schedule information becomes inaccurate.

B.

The customer service level decreases.

C.

It leads to "nervousness" in the schedule.

D.

The schedule does not support demand.

Full Access
Question # 19

Which of the following is typically used to control physical access to highly secure facilities?

A.

Surveillance

B.

Mantrap

C.

Dual control

D.

Door locks

Full Access
Question # 20

After reviewing the output of a threat modelling workshop, the development manager decides not to implement the application features where issues were identified. What is the BEST description of how the threats from the workshop are being addressed?

A.

Eliminated

B.

Mitigated

C.

Transferred

D.

Accepted

Full Access
Question # 21

Which compensating control is the MOST effective to prevent fraud within an organization?

A.

Separation of privilege

B.

Pre-employment background checks

C.

Principle of least privilege

D.

Log monitoring

Full Access
Question # 22

Which of the following is the BEST solution to implement to mitigate the risk of data breach in the event of a lost or stolen mobile device?

A.

Mobile application management

B.

Bring Your Own Device (BYOD) policy

C.

Network Access Control (NAC)

D.

Mobile Device Management (MDM)

Full Access
Question # 23

Internet Small Computer Systems Interface (iSCSI) protocol relies on Transmission Control Protocol/Internet Protocol (TCP/IP). Which can be used maliciously to interrupt the flow of data. Which Information Technology (IT) component would be impacted by such a disruption?

A.

Firewall.

B.

Switch.

C.

Storage.

D.

Router.

Full Access
Question # 24

An organization has recently been hacked. To prevent future breaches, the Chief Information Security Officer (CISO) hires a third-party vendor to perform penetration testing on the network. Once complete, the vendor provides to the CISO a final report generated by a high-quality vulnerability scanner. The CISO rejects the report as incomplete.

Why is the vendor's penetration test considered incomplete?

A.

The vendor should have attempted to exploit the identified vulnerabilities.

B.

The vendor should also provide a guide to remediate the identified vulnerabilities.

C.

The vendor should have provided a risk report of vulnerabilities found.

D.

The vendor should have worked closely with network engineers to understand the network infrastructure better.

Full Access
Go to page: