CIPS L4M3 Commercial Contracting Online Training
CIPS L4M3 Online Training
The questions for L4M3 were last updated at Nov 23,2024.
- Exam Code: L4M3
- Exam Name: Commercial Contracting
- Certification Provider: CIPS
- Latest update: Nov 23,2024
Which of the following should be taken to avoid the conflicts between orally negotiated terms before the conclusion of contract and the final written contract?
- A . Finding signs of misrepresentation of the other contracting party
- B . Prevailing orally negotiated terms over the final written contract
- C . Embedding a term excluding all prior oral discussions that are not mentioned in the final written contract
- D . Avoiding long negotiation
C
Explanation:
When a written contract is based on oral negotiation, to avoid the conflicts between orally negotiated terms and final written contract, the contract should include an express term that specifically excludes all prior oral discussion. However, orally negotiated terms can be used to interpret the final contract.
This practice (excluding prior discussion) is so common in international commercial contract that UNIDROIT Principles of International Commercial Contracts have an article (2.1.17) dealing with this.
Reference: CIPS study guide page 130
LO 3, AC 3.1
Governance
- A . 2 and 3 only
- B . 1 and 2 only
- C . 1 and 4 only
- D . 3 and 4 only
A
Explanation:
Information Assurance (IA)
Information Assurance (IA) is the practice of managing information-related risks and the steps involved to protect information systems such as computer and network systems. The IA transformation is a partnership that stretches across the Department of Defense (DoD), Office of National Intelligence, Committee on National Security Systems, National Institute of Science and Technology (NIST), and the Office of Management and Budget.
The US Government’s definition of information assurance is:
“measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”
Information Assurance (IA) is essentially protecting information systems, and is often associated with the following five pillars:
– Integrity
– Availability
– Authentication
– Confidentiality
– Nonrepudiation
The following pillars can be applied in a variety of ways, depending on the sensitivity of the information, or information systems within your organization. Currently, these five pillars are used at the heart of the US Governments ability to conduct safe and secure operations in a global environment.
Governance
- A . 2 and 3 only
- B . 1 and 2 only
- C . 1 and 4 only
- D . 3 and 4 only
A
Explanation:
Information Assurance (IA)
Information Assurance (IA) is the practice of managing information-related risks and the steps involved to protect information systems such as computer and network systems. The IA transformation is a partnership that stretches across the Department of Defense (DoD), Office of National Intelligence, Committee on National Security Systems, National Institute of Science and Technology (NIST), and the Office of Management and Budget.
The US Government’s definition of information assurance is:
“measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”
Information Assurance (IA) is essentially protecting information systems, and is often associated with the following five pillars:
– Integrity
– Availability
– Authentication
– Confidentiality
– Nonrepudiation
The following pillars can be applied in a variety of ways, depending on the sensitivity of the information, or information systems within your organization. Currently, these five pillars are used at the heart of the US Governments ability to conduct safe and secure operations in a global environment.
Governance
- A . 2 and 3 only
- B . 1 and 2 only
- C . 1 and 4 only
- D . 3 and 4 only
A
Explanation:
Information Assurance (IA)
Information Assurance (IA) is the practice of managing information-related risks and the steps involved to protect information systems such as computer and network systems. The IA transformation is a partnership that stretches across the Department of Defense (DoD), Office of National Intelligence, Committee on National Security Systems, National Institute of Science and Technology (NIST), and the Office of Management and Budget.
The US Government’s definition of information assurance is:
“measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”
Information Assurance (IA) is essentially protecting information systems, and is often associated with the following five pillars:
– Integrity
– Availability
– Authentication
– Confidentiality
– Nonrepudiation
The following pillars can be applied in a variety of ways, depending on the sensitivity of the information, or information systems within your organization. Currently, these five pillars are used at the heart of the US Governments ability to conduct safe and secure operations in a global environment.
Governance
- A . 2 and 3 only
- B . 1 and 2 only
- C . 1 and 4 only
- D . 3 and 4 only
A
Explanation:
Information Assurance (IA)
Information Assurance (IA) is the practice of managing information-related risks and the steps involved to protect information systems such as computer and network systems. The IA transformation is a partnership that stretches across the Department of Defense (DoD), Office of National Intelligence, Committee on National Security Systems, National Institute of Science and Technology (NIST), and the Office of Management and Budget.
The US Government’s definition of information assurance is:
“measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”
Information Assurance (IA) is essentially protecting information systems, and is often associated with the following five pillars:
– Integrity
– Availability
– Authentication
– Confidentiality
– Nonrepudiation
The following pillars can be applied in a variety of ways, depending on the sensitivity of the information, or information systems within your organization. Currently, these five pillars are used at the heart of the US Governments ability to conduct safe and secure operations in a global environment.
Governance
- A . 2 and 3 only
- B . 1 and 2 only
- C . 1 and 4 only
- D . 3 and 4 only
A
Explanation:
Information Assurance (IA)
Information Assurance (IA) is the practice of managing information-related risks and the steps involved to protect information systems such as computer and network systems. The IA transformation is a partnership that stretches across the Department of Defense (DoD), Office of National Intelligence, Committee on National Security Systems, National Institute of Science and Technology (NIST), and the Office of Management and Budget.
The US Government’s definition of information assurance is:
“measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”
Information Assurance (IA) is essentially protecting information systems, and is often associated with the following five pillars:
– Integrity
– Availability
– Authentication
– Confidentiality
– Nonrepudiation
The following pillars can be applied in a variety of ways, depending on the sensitivity of the information, or information systems within your organization. Currently, these five pillars are used at the heart of the US Governments ability to conduct safe and secure operations in a global environment.
Governance
- A . 2 and 3 only
- B . 1 and 2 only
- C . 1 and 4 only
- D . 3 and 4 only
A
Explanation:
Information Assurance (IA)
Information Assurance (IA) is the practice of managing information-related risks and the steps involved to protect information systems such as computer and network systems. The IA transformation is a partnership that stretches across the Department of Defense (DoD), Office of National Intelligence, Committee on National Security Systems, National Institute of Science and Technology (NIST), and the Office of Management and Budget.
The US Government’s definition of information assurance is:
“measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”
Information Assurance (IA) is essentially protecting information systems, and is often associated with the following five pillars:
– Integrity
– Availability
– Authentication
– Confidentiality
– Nonrepudiation
The following pillars can be applied in a variety of ways, depending on the sensitivity of the information, or information systems within your organization. Currently, these five pillars are used at the heart of the US Governments ability to conduct safe and secure operations in a global environment.
Which of the following is the model form of contract for construction which is recommended by World Bank?
- A . ITC
- B . JCT
- C . CIPS
- D . FIDIC
D
Explanation:
FIDIC is the International Federation of Consulting Engineers (or Fédération Internationale des Ingénieurs Conseils in French). FIDIC has produced many publications, including the model form contracts, best practice guidances, research on sustainability, integrity and risk management. FIDIC model form contracts have been developed by this organisation since 1999, now they consist of several different books which are marked by colours. Thus, FIDIC model contracts also have the nickname "Rainbow suite of contracts".
Basically, the "Rainbow Suite" include the following books:
* Yellow book: Plant and Design-Build Contract (2 editions: 1999 and 2017)
* Silver book: EPC/Turnkey Contract (2 editions: 1999 and 2017)
* Red book: Construction Contracts (2 editions: 1999 and 2017)
* Emerald book: Conditions of Contract for Underground Works (1st Ed 2019)
* Blue-Green book: Dredgers Contract (2 editions: 2006 and 2016)
* Gold book: Design, Build and Operate Contract Guide
* Pink book: Construction Contract Multilateral Development Bank Harmonised Ed (2 editions: 2005 and 2010)
This type of model contract is commonly used around the world because its author, International Federation of Consulting Engineers, collaborates closely with development banks such as World Bank, Africa Development Bank, Asia Development Bank, etc. Every construction project that is financed by these institutions must adopt the FIDIC contracts. The Joint Contracts Tribunal, also known as the JCT, produces standard forms of contract for construction, guidance notes and other standard documentation for use in the construction industry in the United Kingdom. From its establishment in 1931, JCT has
expanded the number of contributing organisations.
ITC (International Trade Centre) produces contracts specifically designed for small companies doing international business, covering the sale of goods, distribution, services and joint ventures. Many small companies are now engaged in international trade, but don’t have access to the necessary contract forms to protect themselves. ITC and leading legal experts developed eight generic contract templates that incorporate internationally recognized standards and laws for most small business situations.
CIPS has several model forms of contract designed specifically for IT buying and servicing.
Reference: CIPS study guide page 142
LO 3, AC 3.1
The pricing arrangement in which markup is added into cost base to calculate the final price is known as…?
- A . Fixed Price approach
- B . Market based approach
- C . Price indices
- D . Cost plus pricing
D
Explanation:
The market approach is a method of determining the value of an asset based on the selling price of similar assets.
A fixed-price strategy means you set a price and keep it constant for an extended period of time.
Cost-plus pricing is also known as markup pricing. It’s a pricing method where a fixed percentage is added on top of the cost to produce
A price index (PI) is a measure of how prices change over a period of time, or in other words, it is a way to measure inflation. There are multiple methods on how to calculate inflation (or deflation).
Reference: CIPS study guide page 176-179
LO 3, AC 3.3
Which of the following will be always automatically deemed as a consideration?
- A . Promise to perform over and above an existing obligation
- B . Promise given to a third party
- C . Implied consideration
- D . Past consideration
A
Explanation:
Consideration only appears in common law countries. Below are some examples of what is and what is not consideration:
– Past consideration is something that has already been done or given. This cannot act as consideration
– Implied consideration: if the detail of a promise to pay is expressed after the provision of goods or services, but there is an implication that such promise would be forthcoming, this may (depending on the facts) be valid consideration.
– A promise given to a third party: this is not normally consideration, and is based on a concept known as privity of contract. Anyone who is not a party to the contract, even if they are beneficiary of it, cannot sue if the terms of the contract are breached.
– A promise to perform over and above an existing obligation: This is always consideration
Reference:
– Consideration & Promissory Estoppel
– CIPS study guide page 36-40
LO 1, AC 1.2