CIPS L6M7 Exam (page: 2)
CIPS Commercial Data Management
Updated on: 25-Dec-2025

Viewing Page 2 of 12

Wiggles Ltd works closely with a supplier called Waggles Incorporated. They are considering a merger but this is not yet public knowledge. The CEOs of each organisation have acknowledged the risk of cyber security in relation to the negotiation and have decided to restrict communications between the organisations on the matter to only a few select individuals.
What form of cyber threat does this reduce?

  1. Installation of malware on hardware devices
  2. Social engineering and phishing
  3. Spreading of rumours
  4. Denial of service

Answer(s): B

Explanation:

If most employees at Wiggles and Waggles don't know the information, they are pointless targets for social engineering. You can only get information from someone who knows something. Option C is incorrect--although restricting information will reduce rumours, this isn't a cyber threat. P.170 Domain: 3.1



Oliver has recently purchased some USB drives for his team. These are small portable storage devices that can hold dat

  1. He has sought assurances from the manufacturer that these are safe to use and do not contain viruses.
    Which of the following should he receive?
  2. A warranty
  3. A guarantee
  4. Evidence of quality assurance testing
  5. Evidence the packaging has not been tampered with

Answer(s): C

Explanation:

The manufacturer should provide evidence that the USB devices have been quality assured prior to purchase. Options A and B are incorrect because these relate to the items being fit for purpose for the next couple of years, rather than ensuring there isn't any virus on them now. Option D is also incorrect because it's possible for viruses to be installed on the device before it's packaged. P.177 Domain: 3.2



Which of the following would be considered personal data? Select ALL that apply

  1. An employee's work ID number
  2. The average age of customers in a retail store
  3. The time that someone drove into a carpark
  4. A child's Date of Birth

Answer(s): A,D

Explanation:

Personal data is anything that can be used to identify someone, so options A and D are correct. Examples of personal data include any form of ID number, addresses, dates of birth, bank details, DNA, or medical information. Option B is incorrect because it's an average age, not a person's age. Option C is incorrect because you can't identify someone from the time they entered a car park.
P.120
Domain: 2.3



Which of the following is a type of firewall?

  1. Proxy
  2. Software
  3. Script
  4. Bot

Answer(s): A

Explanation:

A proxy is a type of firewall. It works at the IT application level rather than on a whole network. A firewall is a security measure that prevents unauthorized access to a system. P.184 Domain: 3.2



Bob is the CEO of Big Leaf Company and has a lot of sensitive data on his phone. The IT department has advised Bob he should increase his security measures to protect unwanted people accessing his phone, which he often leaves on his desk when he goes to Board Meetings.
Which of the following would be most useful to Bob?

  1. CCTV in his office
  2. Multi-factor authentication
  3. Biometrics
  4. Firewall

Answer(s): B

Explanation:

Multi-factor authentication would be the most useful to protect a mobile phone. Multi-factor authentication uses three things: something you know (password), something you have (a secret code or token), and something you are (biometric scan). This is more secure than biometrics alone. CCTV does not prevent someone from accessing Bob's phone. A firewall is better suited for an IT system or intranet. P.187
Domain: 3.2



Which of the following actions can help an organisation improve the security of their router? Select ALL that apply

  1. Locate the router in a communal area where all staff can access it
  2. Use the firewall
  3. Change login details from the default settings
  4. Run regular scripts to check for data breaches

Answer(s): B,C

Explanation:

The correct answers are B and C. Not all routers have a firewall, but if they do, it should be used. Option A is incorrect because the router should be placed in a secure location. Option D is incorrect because you can't run a script on a router. P.195
Domain: 3.2



Which of the following can be used to protect a computer's operating system and hardware and often requires a user to update?

  1. Server
  2. Internet of Things
  3. Firewall
  4. Firmware

Answer(s): D

Explanation:

Firmware can be used to protect a computer's operating system and hardware. The requirements for updates depend on the complexity of the device, but most need regular updates. P.200 Domain: 3.2



Fluffy Pillows Ltd has recently expanded its operations and has hired more staff. These staff will work remotely, and because of this, Fluffy Pillows Ltd is in need of buying and upgrading their IT systems. The CEO of Fluffy Pillows is examining the security of currently held data in preparation for the expansion and has recently completed a document that looks into what data is stored where and what the consequences would be if this data were to be stolen or corrupted. In his research, he has found multiple data entries for the same information, which he believes could lead to inaccuracies in data reporting. He is also concerned that the data isn't being stored securely and is unsure whether he should retain some of the confidential personal details on employees who have left the business. He has decided that along with the introduction of new systems, it is important that all members of staff at Fluffy Pillows are aware of the responsibilities of storing data correctly and the risks of cyber attacks.
How can Fluffy Pillows ensure data is accessible for the new staff members who work from home?

  1. Cloud storage
  2. USB devices
  3. Portable laptops
  4. Network Attached Storage

Answer(s): A

Explanation:

Cloud storage is the answer. All the new people will be working in different places, so there needs to be a central place for them to access documents. Physical storage options such as USBs, laptops, and network-attached storage devices wouldn't work.
Domain: Scenario



Viewing Page 2 of 12



Share your comments for CIPS L6M7 exam with other users:

loso 7/25/2023 5:18:00 AM

please upload thank.
THAILAND


Paul 6/23/2023 7:12:00 AM

please can you share 1z0-1055-22 dump pls
UNITED STATES


exampei 10/7/2023 8:14:00 AM

i will wait impatiently. thank youu
Anonymous


Prince 10/31/2023 9:09:00 PM

is it possible to clear the exam if we focus on only these 156 questions instead of 623 questions? kindly help!
Anonymous


Ali Azam 12/7/2023 1:51:00 AM

really helped with preparation of my scrum exam
Anonymous


Jerman 9/29/2023 8:46:00 AM

very informative and through explanations
Anonymous


Jimmy 11/4/2023 12:11:00 PM

prep for exam
INDONESIA


Abhi 9/19/2023 1:22:00 PM

thanks for helping us
Anonymous


mrtom33 11/20/2023 4:51:00 AM

i prepared for the eccouncil 350-401 exam. i scored 92% on the test.
Anonymous


JUAN 6/28/2023 2:12:00 AM

aba questions to practice
UNITED STATES


LK 1/2/2024 11:56:00 AM

great content
Anonymous


Srijeeta 10/8/2023 6:24:00 AM

how do i get the remaining questions?
INDIA


Jovanne 7/26/2022 11:42:00 PM

well formatted pdf and the test engine software is free. well worth the money i sept.
ITALY


CHINIMILLI SATISH 8/29/2023 6:22:00 AM

looking for 1z0-116
Anonymous


Pedro Afonso 1/15/2024 8:01:00 AM

in question 22, shouldnt be in the data (option a) layer?
Anonymous


Pushkar 11/7/2022 12:12:00 AM

the questions are incredibly close to real exam. you people are amazing.
INDIA


Ankit S 11/13/2023 3:58:00 AM

q15. answer is b. simple
UNITED STATES


S. R 12/8/2023 9:41:00 AM

great practice
FRANCE


Mungara 3/14/2023 12:10:00 AM

thanks to this exam dumps, i felt confident and passed my exam with ease.
UNITED STATES


Anonymous 7/25/2023 2:55:00 AM

need 1z0-1105-22 exam
Anonymous


Nigora 5/31/2022 10:05:00 PM

this is a beautiful tool. passed after a week of studying.
UNITED STATES


Av dey 8/16/2023 2:35:00 PM

can you please upload the dumps for 1z0-1096-23 for oracle
INDIA


Mayur Shermale 11/23/2023 12:22:00 AM

its intresting, i would like to learn more abouth this
JAPAN


JM 12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.
UNITED STATES


Freddie 12/12/2023 12:37:00 PM

helpful dump questions
SOUTH AFRICA


Da Costa 8/25/2023 7:30:00 AM

question 423 eigrp uses metric
Anonymous


Bsmaind 8/20/2023 9:22:00 AM

hello nice dumps
Anonymous


beau 1/12/2024 4:53:00 PM

good resource for learning
UNITED STATES


Sandeep 12/29/2023 4:07:00 AM

very useful
Anonymous


kevin 9/29/2023 8:04:00 AM

physical tempering techniques
Anonymous


Blessious Phiri 8/15/2023 4:08:00 PM

its giving best technical knowledge
Anonymous


Testbear 6/13/2023 11:15:00 AM

please upload
ITALY


shime 10/24/2023 4:23:00 AM

great question with explanation thanks!!
ETHIOPIA


Thembelani 5/30/2023 2:40:00 AM

does this exam have lab sections?
Anonymous