CIPS L6M7 Übungsprüfungen
Zuletzt aktualisiert am 24.04.2025- Prüfungscode: L6M7
- Prüfungsname: Commercial Data Management
- Zertifizierungsanbieter: CIPS
- Zuletzt aktualisiert am: 24.04.2025
Hadoop and MapReduce are examples of what?
- A . Cloud Computing
- B . Hardware
- C . Digitalisation
- D . Problem-Solving Software
Fluffy Pillows Ltd has recently expanded its operations and has hired more staff. These staff will work remotely and because of this Fluffy Pillows Ltd is in need of buying and upgrading their IT systems. The CEO of Fluffy Pillows is examining the security of currently held data in preparation for the expansion and has recently completed a document which looks into what data is stored where and what the consequences would be if this data were to be stolen or corrupted. In his research he has found multiple data entries for the same information, which he believes could lead to inaccuracies in data reporting. He is also concerned that the data isn’t being stored securely and is unsure whether he should retain some of the confidential personal details on employees who have left the business. He has decided that along with the introduction of new systems it is important that all members of staff at Fluffy Pillows are aware of the responsibilities of storing data correctly and the risks of cyber attacks.
What is the main concern with regards to the quality of data currently held?
- A . Commission
- B . Omission
- C . Manipulation
- D . Corruption
Identifying patterns in data using data from more than one source is commonly known as…?
- A . Collaborative filtering
- B . Data mining
- C . Black box problem solving
- D . Data analysis
The speed at which data can be transferred and accessed over the internet is known as … ?
- A . Bandwidth
- B . Latency
- C . Gigabytes
- D . Tolerance
Fluffy Pillows Ltd has recently expanded its operations and has hired more staff. These staff will work remotely and because of this Fluffy Pillows Ltd is in need of buying and upgrading their IT systems. The CEO of Fluffy Pillows is examining the security of currently held data in preparation for the expansion and has recently completed a document which looks into what data is stored where and what the consequences would be if this data were to be stolen or corrupted. In his research he has found multiple data entries for the same information, which he believes could lead to inaccuracies in data reporting. He is also concerned that the data isn’t being stored securely and is unsure whether he should retain some of the confidential personal details on employees who have left the business. He has decided that along with the introduction of new systems it is important that all members of staff at Fluffy Pillows are aware of the responsibilities of storing data correctly and the risks of cyber attacks.
What is the main legal concern regarding the data?
- A . Fluffy Pillows may get sued by past employees
- B . Data can be hacked and sold on
- C . Compliance with regulations such as GDPR
- D . Data can easily be corrupted and used for purposes it was not intended for
Which of the following actions can help an organisation improve the security of their router? Select ALL that apply
- A . Locate the router in a communal area where all staff can access it
- B . Use the firewall
- C . Change login details from the default settings
- D . Run regular scripts to check for data breaches
What is the correct order of the ‚Fetch-Execute‘ Cycle?
- A . Fetch, Execute, Decode, Store
- B . Fetch, Execute, Store, Decode
- C . Fetch, Decode, Execute, Store
- D . Fetch, Store, Decode, Execute
Tracy is a logistics manager who is using an algorithm to solve a problem. She needs to work out the shortest travel time between a warehouse and a client’s location. She is using past data to help solve the problem.
What type of algorithm is she using?
- A . Simple recursive
- B . Divide and conquer
- C . Brute force
- D . Dynamic programming
Alicia is aware of the dangers of IT hacking and has therefore created a risk assessment to assess how susceptible her business is to this threat. In her risk assessment, she has considered her employees and suppliers.
Is this the correct thing to do?
- A . Yes – employees are most likely to be targeted by hackers
- B . Yes – a risk assessment will protect Alicia’s company from cyber threats
- C . No – Alicia should also consider risks throughout the supply chain
- D . No – the risk assessment should be completed by a third party
BI (Business Intelligence) can be used in the Procurement and Supply function to display which of the following data? Select ALL that apply
- A . What % of invoices have been paid on time
- B . How much money has been spent with Supplier X since 2015
- C . How many staff have achieved MCIPS
- D . Why supplier Y was awarded the new contract for packaging
- E . How much money has been saved by introducing e-procurement tools since 2017