Decide Fast & Get 50% Flat Discount | Limited Time Offer - Ends In 0d 00h 00m 00s Coupon code: SAVE50

Master CIPS L6M7 Exam with Reliable Practice Questions

Page: 1 out of Viewing questions 1-5 out of 83 questions
Last exam update: Feb 12,2025
Upgrade to Premium
Question 1

If data has been modified, which aspect of the Information Security triangle has been breached?


Correct : A

Integrity refers to the trustworthiness and accuracy of data. If data has been altered, its integrity has been compromised. The Information Security Triangle consists of Confidentiality, Integrity, and Availability (CIA). Accuracy is not part of this model. (P.143)


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

IT hacking can take many forms, and it is important for Procurement professionals to be aware of different ways their data can be compromised or stolen through cyber attacks. Which of the following is not a type of cyber attack?


Correct : D

Gooseberry is not a type of cyber attack. The others---birthday attacks, phishing, and man-in-the-middle---are real cybersecurity threats. Other common attacks include malware, denial of service (DoS), drive-by attacks, password attacks, SQL injection, cross-site scripting, and eavesdropping. (P.146)


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Alicia is aware of the dangers of IT hacking and has therefore created a risk assessment to assess how susceptible her business is to this threat. In her risk assessment, she has considered her employees and suppliers. Is this the correct thing to do?


Correct : C

While it is important to consider employees and suppliers, cybersecurity risks can exist at various points in the supply chain. Alicia needs to assess potential threats at every stage. A risk assessment alone does not protect against threats (Option B is incorrect), and there is no indication that a third party must complete the assessment (Option D). (P.154)


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

At what stage in the procurement cycle should a buyer clarify a supplier's cybersecurity policy?


Correct : A

Cybersecurity policies should be evaluated as early as possible in the procurement process. The pre-qualification stage allows buyers to assess suppliers' security practices before inviting them to bid, ensuring that only secure vendors are considered. (P.156)


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

Which of the following is a human risk in cybersecurity? Select ALL that apply.


Correct : B, D

Human errors, such as using weak passwords and opening insecure attachments, are major risks in cybersecurity. Educating users on best security practices can help mitigate these threats. The other options relate to technical or system risks rather than human behavior. (P.173)


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500