CIPS L6M7 Exam (page: 2)
CIPS Commercial Data Management
Updated on: 31-Mar-2026

Viewing Page 2 of 12

Wiggles Ltd works closely with a supplier called Waggles Incorporated. They are considering a merger but this is not yet public knowledge. The CEOs of each organisation have acknowledged the risk of cyber security in relation to the negotiation and have decided to restrict communications between the organisations on the matter to only a few select individuals.
What form of cyber threat does this reduce?

  1. Installation of malware on hardware devices
  2. Social engineering and phishing
  3. Spreading of rumours
  4. Denial of service

Answer(s): B

Explanation:

If most employees at Wiggles and Waggles don't know the information, they are pointless targets for social engineering. You can only get information from someone who knows something. Option C is incorrect--although restricting information will reduce rumours, this isn't a cyber threat. P.170 Domain: 3.1



Oliver has recently purchased some USB drives for his team. These are small portable storage devices that can hold dat

  1. He has sought assurances from the manufacturer that these are safe to use and do not contain viruses.
    Which of the following should he receive?
  2. A warranty
  3. A guarantee
  4. Evidence of quality assurance testing
  5. Evidence the packaging has not been tampered with

Answer(s): C

Explanation:

The manufacturer should provide evidence that the USB devices have been quality assured prior to purchase. Options A and B are incorrect because these relate to the items being fit for purpose for the next couple of years, rather than ensuring there isn't any virus on them now. Option D is also incorrect because it's possible for viruses to be installed on the device before it's packaged. P.177 Domain: 3.2



Which of the following would be considered personal data? Select ALL that apply

  1. An employee's work ID number
  2. The average age of customers in a retail store
  3. The time that someone drove into a carpark
  4. A child's Date of Birth

Answer(s): A,D

Explanation:

Personal data is anything that can be used to identify someone, so options A and D are correct. Examples of personal data include any form of ID number, addresses, dates of birth, bank details, DNA, or medical information. Option B is incorrect because it's an average age, not a person's age. Option C is incorrect because you can't identify someone from the time they entered a car park.
P.120
Domain: 2.3



Which of the following is a type of firewall?

  1. Proxy
  2. Software
  3. Script
  4. Bot

Answer(s): A

Explanation:

A proxy is a type of firewall. It works at the IT application level rather than on a whole network. A firewall is a security measure that prevents unauthorized access to a system. P.184 Domain: 3.2



Bob is the CEO of Big Leaf Company and has a lot of sensitive data on his phone. The IT department has advised Bob he should increase his security measures to protect unwanted people accessing his phone, which he often leaves on his desk when he goes to Board Meetings.
Which of the following would be most useful to Bob?

  1. CCTV in his office
  2. Multi-factor authentication
  3. Biometrics
  4. Firewall

Answer(s): B

Explanation:

Multi-factor authentication would be the most useful to protect a mobile phone. Multi-factor authentication uses three things: something you know (password), something you have (a secret code or token), and something you are (biometric scan). This is more secure than biometrics alone. CCTV does not prevent someone from accessing Bob's phone. A firewall is better suited for an IT system or intranet. P.187
Domain: 3.2



Which of the following actions can help an organisation improve the security of their router? Select ALL that apply

  1. Locate the router in a communal area where all staff can access it
  2. Use the firewall
  3. Change login details from the default settings
  4. Run regular scripts to check for data breaches

Answer(s): B,C

Explanation:

The correct answers are B and C. Not all routers have a firewall, but if they do, it should be used. Option A is incorrect because the router should be placed in a secure location. Option D is incorrect because you can't run a script on a router. P.195
Domain: 3.2



Which of the following can be used to protect a computer's operating system and hardware and often requires a user to update?

  1. Server
  2. Internet of Things
  3. Firewall
  4. Firmware

Answer(s): D

Explanation:

Firmware can be used to protect a computer's operating system and hardware. The requirements for updates depend on the complexity of the device, but most need regular updates. P.200 Domain: 3.2



Fluffy Pillows Ltd has recently expanded its operations and has hired more staff. These staff will work remotely, and because of this, Fluffy Pillows Ltd is in need of buying and upgrading their IT systems. The CEO of Fluffy Pillows is examining the security of currently held data in preparation for the expansion and has recently completed a document that looks into what data is stored where and what the consequences would be if this data were to be stolen or corrupted. In his research, he has found multiple data entries for the same information, which he believes could lead to inaccuracies in data reporting. He is also concerned that the data isn't being stored securely and is unsure whether he should retain some of the confidential personal details on employees who have left the business. He has decided that along with the introduction of new systems, it is important that all members of staff at Fluffy Pillows are aware of the responsibilities of storing data correctly and the risks of cyber attacks.
How can Fluffy Pillows ensure data is accessible for the new staff members who work from home?

  1. Cloud storage
  2. USB devices
  3. Portable laptops
  4. Network Attached Storage

Answer(s): A

Explanation:

Cloud storage is the answer. All the new people will be working in different places, so there needs to be a central place for them to access documents. Physical storage options such as USBs, laptops, and network-attached storage devices wouldn't work.
Domain: Scenario



Viewing Page 2 of 12



Share your comments for CIPS L6M7 exam with other users:

Rahul Kumar 8/31/2023 12:30:00 PM

need certification.
CANADA


Diran Ole 9/17/2023 5:15:00 PM

great exam prep
CANADA


Venkata Subbarao Bandaru 6/24/2023 8:45:00 AM

i require dump
Anonymous


D 7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,
Anonymous


Ann 9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks
AUSTRALIA


Sridhar 1/16/2024 9:19:00 PM

good questions
Anonymous


Summer 10/4/2023 9:57:00 PM

looking forward to the real exam
Anonymous


vv 12/2/2023 2:45:00 PM

good ones for exam preparation
UNITED STATES


Danny Zas 9/15/2023 4:45:00 AM

this is a good experience
UNITED STATES


SM 1211 10/12/2023 10:06:00 PM

hi everyone
UNITED STATES


A 10/2/2023 6:08:00 PM

waiting for the dump. please upload.
UNITED STATES


Anonymous 7/16/2023 11:05:00 AM

upload cks exam questions
Anonymous


Johan 12/13/2023 8:16:00 AM

awesome training material
NETHERLANDS


PC 7/28/2023 3:49:00 PM

where is dump
Anonymous


YoloStar Yoloing 10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.
Anonymous


Zelalem Nega 5/14/2023 12:45:00 PM

please i need if possible h12-831,
UNITED KINGDOM


unknown-R 11/23/2023 7:36:00 AM

good collection of questions and solution for pl500 certification
UNITED STATES


Swaminathan 5/11/2023 9:59:00 AM

i would like to appear the exam.
Anonymous


Veenu 10/24/2023 6:26:00 AM

i am very happy as i cleared my comptia a+ 220-1101 exam. i studied from as it has all exam dumps and mock tests available. i got 91% on the test.
Anonymous


Karan 5/17/2023 4:26:00 AM

need this dump
Anonymous


Ramesh Kutumbaka 12/30/2023 11:17:00 PM

its really good to eventuate knowledge before appearing for the actual exam.
Anonymous


anonymous 7/20/2023 10:31:00 PM

this is great
CANADA


Xenofon 6/26/2023 9:35:00 AM

please i want the questions to pass the exam
UNITED STATES


Diego 1/21/2024 8:21:00 PM

i need to pass exam
Anonymous


Vichhai 12/25/2023 3:25:00 AM

great, i appreciate it.
AUSTRALIA


P Simon 8/25/2023 2:39:00 AM

please could you upload (isc)2 certified in cybersecurity (cc) exam questions
SOUTH AFRICA


Karim 10/8/2023 8:34:00 PM

good questions, wrong answers
Anonymous


Itumeleng 1/6/2024 12:53:00 PM

im preparing for exams
Anonymous


MS 1/19/2024 2:56:00 PM

question no: 42 isnt azure vm an iaas solution? so, shouldnt the answer be "no"?
Anonymous


keylly 11/28/2023 10:10:00 AM

im study azure
Anonymous


dorcas 9/22/2023 8:08:00 AM

i need this now
Anonymous


treyf 11/9/2023 5:13:00 AM

i took the aws saa-c03 test and scored 935/1000. it has all the exam dumps and important info.
UNITED STATES


anonymous 1/11/2024 4:50:00 AM

good questions
Anonymous


Anjum 9/23/2023 6:22:00 PM

well explained
Anonymous