Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The horizon for forecasts that are input to the sales and operations planning (S&OP) process should be long enough that:

A.

cumulative forecast deviation approaches zero.

B.

planned product launches can be incorporated.

C.

required resources can be properly planned.

D.

supply constraints can be resolved.

Improving the performance of a constraint in a job shop environment will:

A.

Reduce work-in-process (WIP) inventory

B.

Adjust the load of non-bottleneck operations

C.

Increase the cycle time

D.

Increase production throughput

Organization A provides scalable Information Technology (IT) infrastructure while Organization B provides security services to customers via Software as a Service (SaaS) model. Which document is used to express a set of intended actions between the organizations with respect to meeting the customers’ needs?

A.

Business partnership agreement

B.

Interconnection Security Agreement (ISA)

C.

Framework partnership agreement

D.

Memorandum of Understanding (MOU)

An information system security manager is tasked with properly applying risk management principle to their cloud information system as outlined by the National Institute of Standards and Technology (NIST).

Which of the following is the INITIAL step?

A.

Categorize

B.

Select

C.

Assess

D.

Prepare

Which of the following is the fundamental difference between finite loading and other capacity planning approaches?

A.

It is highly dependent on advanced computer software to function effectively.

B.

It is only managed by shop floor supervisors.

C.

It can use historical information to drive decision-making processes.

D.

It considers adjustments to plans based on planned capacity utilization.

In times of monetary inflation, which of the following methods of inventory valuation results in the greatest cost of sales for the early years of a particular product?

A.

Moving average

B.

Last in, first out (LIFO)

C.

First in, first out (FIFO)

D.

Standard

The Cloud Security Alliance (CSA) publishes the Egregious Eleven, a list of common threats to organizations using cloud services. According to the CSA Egregious Eleven, which of the following cases falls under the category of misconfiguration and inadequate change control?

A.

Having a public-facing website with Hypertext Markup Language (HTML) encoding enabled.

B.

Exposure of data stored in cloud repositories.

C.

Username and password are sent using a POST in plain text.

D.

Unsecured data storage elements or storage containers.

What is the MOST appropriate action to take when media classification needs to be downgraded to a less sensitive classification?

A.

Modify access permissions on media at appropriate classification level.

B.

Modify access logging on media at appropriate classification level.

C.

Sanitize media using appropriate data destruction procedure.

D.

Mark the media with less sensitive classification label.

Which of the following BEST describes how an Application Programming Interface (API) gateway fits into an application architecture?

A.

An API gateway is a specialized reverse proxy that can make different APIs appear as if they are a single API.

B.

An API gateway inspects traffic and blocks many common attacks against Hypertext Transfer Protocol (HTTP) web services.

C.

An API gateway ensures that a Denial-Of-Service (DoS) attack cannot occur within the application.

D.

An API gateway monitors traffic within internal networks and ensures suspicious patterns are detected on any API.

The results of a threat campaign show a high risk of potential intrusion. Which of the following parameters of the Common Vulnerability Scoring System (CVSS) will MOST likely provide information on threat conditions for the organization to consider?

A.

Modified base metrics

B.

Remediation level

C.

Integrity requirements

D.

Attack complexity

In the context of mobile device security, which of the following BEST describes why a walled garden should be implemented?

A.

To track user actions and activity

B.

To prevent the installation of untrusted software

C.

To restrict a user's ability to change device settings

D.

To limit web access to only approved sites

Which of the following is MOST important for an international retail company to consider when handling and retaining information about its customers?

A.

Internal security policies

B.

General Data Protection Regulation (GDPR)

C.

System And Organization Controls (SOC) audit criteria

D.

Cyber insurance premiums

Which of the following statements is true about total productive maintenance (TPM)?

A.

It uses statistical tools.

B.

It is part of the business strategy.

C.

It influences the product design process.

D.

It minimizes unscheduled breakdowns.

An organization decides to conduct penetration testing. Senior management is concerned about the potential loss of information through data exfiltration. The organization is currently preparing a major product launch that is time-sensitive. Which of the following methods of testing is MOST appropriate?

A.

Gray box

B.

Green box

C.

Black box

D.

White box

Which specification enables organizations to ensure penetration test results are documented using open, machine-readable standards?

A.

Security Content Automation Protocol (SCAP)

B.

Security Orchestration, Automation And Response (SOAR)

C.

Common Weakness Enumeration (CWE)

D.

Common Vulnerability Reporting Framework (CVRF)