Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

APICS CPIM-8.0 Exam - Topic 2 Question 20 Discussion

Actual exam question for APICS's CPIM-8.0 exam
Question #: 20
Topic #: 2
[All CPIM-8.0 Questions]

During a manual source code review, an organization discovered a dependency with an open-source library that has a history of being exploited. Which action should the organization take FIRST to assess the risk of depending on the open-source library?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Mitsue
2 days ago
Totally agree, can't assess risk without knowing the version!
upvoted 0 times
...
Kristofer
7 days ago
A) is the best first step, gotta know what version you're dealing with.
upvoted 0 times
...
Kindra
12 days ago
Removing dependencies might be too drastic without assessing first.
upvoted 0 times
...
Shalon
18 days ago
Updating to the latest version is usually a good move.
upvoted 0 times
...
Gilberto
23 days ago
Surprised they even used that library in the first place!
upvoted 0 times
...
Stefanie
28 days ago
I think a penetration test is overkill at this stage.
upvoted 0 times
...
Ardella
1 month ago
Gotta check the specific version first!
upvoted 0 times
...
Lashon
1 month ago
I wonder if deploying the latest version is really the best first step. I think we need to understand the risks of the current version before doing anything drastic.
upvoted 0 times
...
Thad
1 month ago
I practiced a similar question, and I feel like jumping straight to a penetration test might be premature. We should know what version we're dealing with first.
upvoted 0 times
...
Vesta
2 months ago
I'm not entirely sure, but I remember something about needing to assess the current version before making any changes. It seems like option A makes sense.
upvoted 0 times
...
Alisha
2 months ago
I think the first step should be to identify the specific version of the open-source library. That way, we can see if it has known vulnerabilities.
upvoted 0 times
...

Save Cancel