APICS CPIM-8-0 Exam Questions

Questions for the CPIM-8-0 were updated on : Nov 21 ,2025

Page 1 out of 38. Viewing questions 1-15 out of 565

Question 1

An organization undergoing acquisition merged IT departments and infrastructure. During server
decommissioning, some servers still in use by customers were mistakenly removed, causing order
processing failures. Which type of review would have BEST avoided this scenario?

  • A. Disaster Recovery (DR)
  • B. Change management
  • C. Business Continuity (BC)
  • D. Business impact assessment
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

An advertising agency is working on a campaign for a prospective client. Competitors are working on
a similar campaign and are interested in knowing what the firm has designed. What should the
advertising agency do to BEST ensure intellectual property does not leave the organization?

  • A. Protect the information by installing a Data Loss Prevention (DLP) system
  • B. Block all organizational email communication with the competitor
  • C. Install an Intrusion Prevention System (IPS)
  • D. Encrypt the data on the servers and distribute private-key information to authorized users
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

How much data an organization can afford to lose is determined by the:

  • A. Service-Level Agreement (SLA)
  • B. Business Continuity Plan (BCP)
  • C. Recovery Time Objective (RTO)
  • D. Recovery Point Objective (RPO)
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

At which Open Systems Interconnection (OSI) layer does User Datagram Protocol (UDP) function?

  • A. Layer 1
  • B. Layer 2
  • C. Layer 4
  • D. Layer 3
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

The results of a threat campaign show a high risk of potential intrusion. Which of the following
parameters of the Common Vulnerability Scoring System (CVSS) will MOST likely provide information
on threat conditions for the organization to consider?

  • A. Modified base metrics
  • B. Remediation level
  • C. Integrity requirements
  • D. Attack complexity
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

An organization is migrating some of its applications to the cloud. The Chief Information Security
Officer (CISO) is concerned about the accuracy of the reports showing which application should be
migrated and how many applications reside on each server. As a result, the CISO is looking to
establish asset management requirements. Which of these elements should be considered part of
asset management requirements?

  • A. Threat modelling and discovery
  • B. Configuration Management (CM) database
  • C. Risk management framework
  • D. Integration testing program
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What is the BEST reason to include a Hardware Security Module (HSM) in the key management
system when securing cloud storage?

  • A. To provide additional layers of firewalls to the environment
  • B. To create additional logical barriers to entry
  • C. To allow access to new cryptographic keys
  • D. To manage cryptographic keys in a tamper-proof model
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Who is responsible for ensuring compliance when an organization uses a cloud provider to host its
Virtual Machine (VM) instances?

  • A. An independent auditor employed by the cloud provider is responsible for ensuring compliance.
  • B. The cyber insurance carrier is responsible for ensuring compliance.
  • C. The cloud provider may have a level of responsibility; however, the customer is ultimately responsible for ensuring compliance.
  • D. Compliance is equally shared between the cloud provider, the customer, and third-party vendors that interact with the VM instances.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following regarding authentication protocols is a PRIMARY consideration when
designing an authentication and key management system?

  • A. Refresh
  • B. Visibility
  • C. Authorization
  • D. Integrity
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

An attacker was able to identify an organization’s wireless network, collect proprietary network
resource information, and capture several user credentials. The attacker then used that information
to conduct a more sophisticated and impactful attack against the organization. Which method did the
attacker MOST likely use to gather the initial information?

  • A. Proxy manipulation and Man-in-the-Middle (MITM) attack
  • B. Media Access Control (MAC) spoofing and proxy manipulation
  • C. Rogue access point and Man-in-the-Middle (MITM) attack
  • D. Media Access Control (MAC) spoofing and rogue access point
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Following the setting of an organization’s risk appetite by senior management, a risk manager needs
to prioritize all identified risks for treatment. Each risk has been scored based on its Annualized Loss
Expectancy (ALE). Management has asked for an immediate risk mitigation plan focusing on top
risks. Which is the MOST effective approach for the risk manager to quickly present a proposal to
management?

  • A. Rank all risks based on their Single-Loss Expectancy (SLE) and select those that exceed a maximum acceptable threshold derived from the risk appetite.
  • B. Rank all risks based on ALE and select those that exceed a maximum acceptable threshold derived from the risk appetite.
  • C. Rank all risks based on Single-Loss Expectancy (SLE) and select the top 10 risks.
  • D. Rank all risks based on ALE and select the top 10 risks.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

An organization is planning to streamline its Identity and Access Management (IAM) processes and
platform. The executive team mandated a compact platform to efficiently manage identities for
internal and third-party services access. What is the BEST platform choice?

  • A. Cloud Single Sign-On (SSO)
  • B. On-premise IAM
  • C. Cloud IAM
  • D. Identity as a Service (IDaaS)
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

A software organization is getting ready to launch a new application. A security engineer notices the
application allows unrestricted access to files on the web server. Which of the following
recommendations will BEST resolve this security issue?

  • A. Eliminate all calls for file access requests.
  • B. Eliminate illegitimate calls for file access requests.
  • C. Whitelist files and folders for file access requests.
  • D. Blacklist files and folders for file access requests.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following capabilities BEST distinguishes a Next-Generation Firewall (NGFW) from a
traditional firewall?

  • A. Ensures incoming and outgoing packets are inspected before they are allowed to pass through
  • B. Offers features such as integrated intrusion prevention or application awareness and control
  • C. Provides security when users traverse public networks such as the Internet
  • D. Provides stateless and stateful inspection of incoming and outgoing network traffic
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

An organization’s computer incident response team PRIMARILY responds to which type of control?

  • A. Detective
  • B. Administrative
  • C. Preventative
  • D. Corrective
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2