Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CIPS Level 6 Professional Diploma in Procurement and Supply L6M7 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam L6M7 Premium Access

View all detail and faqs for the L6M7 exam


507 Students Passed

92% Average Score

98% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the purpose of a 'Logic Gate'?

Options:

A.

To assist in the analysis of large data sets

B.

To take input from two transistors and convert it to one output

C.

To display data in different formats, e.g., videos

D.

To increase the operating speed of a computer

Questions # 2:

Which of the following is a human risk in cybersecurity? Select ALL that apply.

Options:

A.

Malware

B.

Weak passwords

C.

System overheating

D.

Opening unsecure attachments

E.

Obsolescent technology

Questions # 3:

Which of the following is an example of a data-enhanced product?

Options:

A.

A third-party cloud storage system

B.

A fridge that can recommend recipes based on the contents inside it

C.

An airline that changes the price of flights depending on demand

D.

An air-conditioning unit in a hot warehouse

Questions # 4:

Henry is the Head of IT at Purple Rain Ltd and is presenting a case to the Senior Leadership Team to ask for more investment in the company's IT strategy. Henry believes the company has an issue with data resilience and is asking for more money to be invested in this. He has completed a Business Impact Assessment (BIA) to better understand what data the company holds. Jon is the Head of Procurement and has listened intently to Henry's presentation. He has decided to go back to his department and complete a thorough risk assessment, as he is aware his team holds a lot of data on suppliers and contracts. The CEO of Purple Rain, Roger Nelson, has asked Henry about next steps in order to protect the company from further risks associated with the IT strategy. Data is currently stored on servers located at Purple Rain's Headquarters. The server room is locked at all times of the day and is only accessible to staff members who have a key. The building itself is extremely secure with CCTV systems located both inside the server room and outside it. However, the server room is prone to overheating.

What is Henry's primary concern?

Options:

A.

The accuracy of the data is questionable

B.

There is a lack of data to inform business requirements

C.

The company may not be able to recover quickly from disruption

D.

The data has gone missing

Questions # 5:

Which of the following is an International Standard in Security Management Systems?

Options:

A.

ISO 14001

B.

ISO 9001

C.

ISO 28000

D.

ISO 20400

Questions # 6:

Francis bought a car 4 years ago and is unsure if the company has any data on her. What can Francis do?

Options:

A.

Make a Subject Access Request

B.

Make a Freedom of Information Request

C.

Nothing - the car company will not have data on her as this was 4 years ago

D.

Nothing - the car company does not need to reveal what information it holds about customers

Questions # 7:

At Consultancy X, employees create a range of documents daily, from presentation slides to spreadsheets. Consultancy X was concerned that important data could easily be lost, so it implemented a system where data entered during the day is saved overnight on a backup server. This way, if any individual computer or device should fail, the employee can still access their data. What is the risk approach taken by Consultancy X?

Options:

A.

Eliminate

B.

Reduce

C.

Transfer

D.

Accept

Questions # 8:

Zach is the Head of Procurement at a super secret military base. He does not want anyone outside of the base to know what he is procuring or which suppliers he uses as this information could be critical to national defence. He is aware that cyber criminals may be interested in stealing this information so he has decided to disconnect critical machines and systems from the internet. What is this approach to data security known as?

Options:

A.

Unsyncing

B.

Non-repudiation

C.

Filtering

D.

Air-gapping

Questions # 9:

Unstructured data can be organized into semi-structured or structured data by using a short word or phrase to describe what is held in the digital file. What is this marker commonly known as?

Options:

A.

Structured Query Language

B.

Tag

C.

Syncing

D.

Bot

Questions # 10:

In order to keep data secure, which three things should be considered?

Options:

A.

Access, accuracy, confidentiality

B.

Location, availability, access

C.

Integrity, location, format

D.

Confidentiality, availability, integrity

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.