Special Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

L6M7 Commercial Data Management Questions and Answers

Questions 4

A remote monitoring system is unable to protect an organisation from which of the following risks?

Options:

A.

Phishing

B.

Malware

C.

Unusual activity on the system

D.

Data corruption

Buy Now
Questions 5

Data that is produced in real time is known as …. ?

Options:

A.

Taxonomy

B.

Streaming

C.

Prompt

D.

AI

Buy Now
Questions 6

Which of the following approaches to cyber security takes a bottom-up approach to assessing vulnerabilities meticulously item by item?

Options:

A.

system approach

B.

technology approach

C.

elementary approach

D.

component approach

Buy Now
Questions 7

Fluffy Pillows Ltd has recently expanded its operations and has hired more staff. These staff will work remotely and because of this Fluffy Pillows Ltd is in need of buying and upgrading their IT systems. The CEO of Fluffy Pillows is examining the security of currently held data in preparation for the expansion and has recently completed a document which looks into what data is stored where and what the consequences would be if this data were to be stolen or corrupted. In his research he has found multiple data entries for the same information, which he believes could lead to inaccuracies in data reporting. He is also concerned that the data isn't being stored securely and is unsure whether he should retain some of the confidential personal details on employees who have left the business. He has decided that along with the introduction of new systems it is important that all members of staff at Fluffy Pillows are aware of the responsibilities of storing data correctly and the risks of cyber attacks.

What is the main legal concern regarding the data?

Options:

A.

Fluffy Pillows may get sued by past employees

B.

Data can be hacked and sold on

C.

Compliance with regulations such as GDPR

D.

Data can easily be corrupted and used for purposes it was not intended for

Buy Now
Questions 8

It is important for all Procurement and Supply Chain professionals to use Big Data in order to create efficiencies. Is this statement TRUE?

Options:

A.

Yes - Big Data can save procurement and supply chain functions money in the long term

B.

Yes - any organisation that refuses to use Big Data will be left behind and be unable to compete

C.

No - not all businesses are able to support the use of Big Data

D.

No - Big Data can lead to job losses and therefore should be avoided

Buy Now
Questions 9

Bruno is the newly appointed Head of Operations of a manufacturing organisation based in Coventry that makes children's toys. The company was established in 1958 and has many years of records of toys sold. Some of the early records are paper-based, but data from the 1990s onwards is computer-based. Bruno believes that as the company acquired the data legally, it should be stored in the office and can be used for marketing purposes. Is this true?

Options:

A.

Yes - if the company created the data, they can use it how they like

B.

Yes - they can use any data from electronic records

C.

No - data should not be held any longer than is necessary

D.

No - the old data will not be accurate

Buy Now
Questions 10

Jamila is the Head of Procurement at Big Smiles Ltd. A few years ago, e-procurement systems were introduced, which has led to huge efficiency and transparency gains for the organisation. The tools that Jamila's team use include a PO system and supplier KPI monitoring system, which are accessed through a web portal. Which of the following statements are true?

Options:

A.

The benefit of web-based portals is that all users have the same version, so items can be shared more easily

B.

The downside of web-based portals is that the cost of maintaining and updating the software is increased

C.

There is a limit to the number of users who can access web-based portals

D.

There is a higher risk of piracy from using web-based portals

Buy Now
Questions 11

Which of the following uses data with more than three dimensions?

Options:

A.

Taxonomy

B.

Array

C.

Hierarchy

D.

Data cube

Buy Now
Questions 12

Henry is the Head of IT at Purple Rain Ltd and is presenting a case to the Senior Leadership Team to ask for more investment in the company's IT strategy. Henry believes the company has an issue with data resilience and is asking for more money to be invested in this. He has completed a Business Impact Assessment (BIA) to better understand what data the company holds. Jon is the Head of Procurement and has listened intently to Henry's presentation. He has decided to go back to his department and complete a thorough risk assessment, as he is aware his team holds a lot of data on suppliers and contracts. The CEO of Purple Rain, Roger Nelson, has asked Henry about next steps in order to protect the company from further risks associated with the IT strategy. Data is currently stored on servers located at Purple Rain's Headquarters. The server room is locked at all times of the day and is only accessible to staff members who have a key. The building itself is extremely secure with CCTV systems located both inside the server room and outside it. However, the server room is prone to overheating.

What would Henry's BIA show?

Options:

A.

How important the data is to business operations

B.

What system the data is held on

C.

Why the IT department is underfunded

D.

The risks of cyberbullying facing the company

Buy Now
Questions 13

What is the benefit of an organisation using blockchain in data management?

Options:

A.

It is organisation-specific

B.

It allows data to be changed easily

C.

Data is stored centrally

D.

Data cannot be modified

Buy Now
Questions 14

The Data Protection Act covers any data that is input or held on a computer and does not cover paper filing systems. Is this TRUE?

Options:

A.

Yes - only electronic data is covered by the Act

B.

Yes - information on paper is not considered data

C.

No - the Act covers paper-based records

D.

No - the Act covers all forms of information, including electronic, paper-based, and verbal

Buy Now
Questions 15

The use of data to predict future demand and adjust prices accordingly is known as what?

Options:

A.

Dynamic pricing

B.

Data mining

C.

Price skimming

D.

Data-enabled services

Buy Now
Questions 16

The speed at which data can be transferred and accessed over the internet is known as … ?

Options:

A.

Bandwidth

B.

Latency

C.

Gigabytes

D.

Tolerance

Buy Now
Questions 17

Henry is the Head of IT at Purple Rain Ltd and is presenting a case to the Senior Leadership Team to ask for more investment in the company's IT strategy. Henry believes the company has an issue with data resilience and is asking for more money to be invested in this. He has completed a Business Impact Assessment (BIA) to better understand what data the company holds. Jon is the Head of Procurement and has listened intently to Henry's presentation. He has decided to go back to his department and complete a thorough risk assessment, as he is aware his team holds a lot of data on suppliers and contracts. The CEO of Purple Rain, Roger Nelson, has asked Henry about next steps in order to protect the company from further risks associated with the IT strategy. Data is currently stored on servers located at Purple Rain's Headquarters. The server room is locked at all times of the day and is only accessible to staff members who have a key. The building itself is extremely secure with CCTV systems located both inside the server room and outside it. However, the server room is prone to overheating.

What is Henry's primary concern?

Options:

A.

The accuracy of the data is questionable

B.

There is a lack of data to inform business requirements

C.

The company may not be able to recover quickly from disruption

D.

The data has gone missing

Buy Now
Questions 18

IT hacking can take many forms, and it is important for Procurement professionals to be aware of different ways their data can be compromised or stolen through cyber attacks. Which of the following is not a type of cyber attack?

Options:

A.

Birthday

B.

Phishing

C.

Man-in-the-middle

D.

Gooseberry

Buy Now
Questions 19

Henry is the Head of IT at Purple Rain Ltd and is presenting a case to the Senior Leadership Team to ask for more investment in the company's IT strategy. Henry believes the company has an issue with data resilience and is asking for more money to be invested in this. He has completed a Business Impact Assessment (BIA) to better understand what data the company holds. Jon is the Head of Procurement and has listened intently to Henry's presentation. He has decided to go back to his department and complete a thorough risk assessment, as he is aware his team holds a lot of data on suppliers and contracts. The CEO of Purple Rain, Roger Nelson, has asked Henry about next steps in order to protect the company from further risks associated with the IT strategy. Data is currently stored on servers located at Purple Rain's Headquarters. The server room is locked at all times of the day and is only accessible to staff members who have a key. The building itself is extremely secure with CCTV systems located both inside the server room and outside it. However, the server room is prone to overheating.

What should Henry's next steps be?

Options:

A.

Submit a budget request to increase the IT Security budget

B.

Train all members of staff in the importance of password-protecting their work and the dangers of phishing

C.

Contract a third-party cloud storage provider to manage the data on behalf of Purple Rain Ltd

D.

Complete a Priority Assessment and Recovery Objectives

Buy Now
Questions 20

What are the three size characteristics of 'Big Data'? Select THREE.

Options:

A.

Volume

B.

Variety

C.

Veracity

D.

Velocity

E.

Verity

Buy Now
Questions 21

What is the correct order of the 'Fetch-Execute' Cycle?

Options:

A.

Fetch, Execute, Decode, Store

B.

Fetch, Execute, Store, Decode

C.

Fetch, Decode, Execute, Store

D.

Fetch, Store, Decode, Execute

Buy Now
Questions 22

The storage of data by a third party is commonly known as what?

Options:

A.

Chips

B.

Cloud

C.

Integrated circuit

D.

USB

Buy Now
Questions 23

Below are details of five companies that have security issues related to their IT network or data storage. Each company is proposing a remedy to resolve the issue.

Instructions:

Drag and drop the correct Security Issue and Remedy into the table for each company. Some options may not be used.

L6M7 Question 23

Options:

Buy Now
Questions 24

In order to increase security at the Local Council building, the Local Council has decided to implement biometrics. What employee information would be required for this to be implemented?

Options:

A.

Their logging on password

B.

Their home address

C.

Their fingerprint

D.

Their council ID number

Buy Now
Exam Code: L6M7
Exam Name: Commercial Data Management
Last Update: Mar 29, 2025
Questions: 83

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now L6M7 testing engine

PDF (Q&A)

$36.75  $104.99
buy now L6M7 pdf