Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CTPRP Premium Access

View all detail and faqs for the CTPRP exam


477 Students Passed

91% Average Score

94% Same Questions
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which statement BEST represents the primary objective of a third party risk assessment:

Options:

A.

To assess the appropriateness of non-disclosure agreements regarding the organization's systems/data

B.

To validate that the vendor/service provider has adequate controls in place based on the organization's risk posture

C.

To determine the scope of the business relationship

D.

To evaluate the risk posture of all vendors/service providers in the vendor inventory

Questions # 2:

When working with third parties, which of the following requirements does not reflect a “Zero Trust" approach to access management?

Options:

A.

Utilizing a solution that allows direct access by third parties to the organization's network

B.

Ensure that access is granted on a per session basis regardless of network location, user, or device

C.

Implement device monitoring, continual inspection and monitoring of logs/traffic

D.

Require that all communication is secured regardless of network location

Questions # 3:

Which of the following factors is MOST important when assessing the risk of shadow IT in organizational security?

Options:

A.

The organization maintains adequate policies and procedures that communicate required controls for security functions

B.

The organization requires security training and certification for security personnel

C.

The organization defines staffing levels to address impact of any turnover in security roles

D.

The organization's resources and investment are sufficient to meet security requirements

Questions # 4:

Which statement is FALSE when describing the differences between security vulnerabilities and security defects?

Options:

A.

A security defect is a security flaw identified in an application due to poor coding practices

B.

Security defects should be treated as exploitable vulnerabilities

C.

Security vulnerabilities and security defects are synonymous

D.

A security defect can become a security vulnerability if undetected after migration into production

Questions # 5:

Which statement provides the BEST example of the purpose of scoping in third party assessments?

Options:

A.

Scoping is used to reduce the number of questions the vendor has to complete based on vendor “classification

B.

Scoping is the process an outsourcer uses to configure a third party assessment based on the risk the vendor presents to the organization

C.

Scoping is an assessment technique only used for high risk or critical vendors that require on-site assessments

D.

Scoping is used primarily to limit the inclusion of supply chain vendors in third party assessments

Questions # 6:

Physical access procedures and activity logs should require all of the following EXCEPT:

Options:

A.

Require multiple access controls for server rooms and data centers

B.

Require physical access logs to be retained indefinitely for audit purposes

C.

Record successful and unsuccessful attempts including investigation of unsuccessful access attempts

D.

Include a process to trigger review of the logs after security events

Questions # 7:

Which statement is TRUE regarding the tools used in TPRM risk analyses?

Options:

A.

Risk treatment plans define the due diligence standards for third party assessments

B.

Risk ratings summarize the findings in vendor remediation plans

C.

Vendor inventories provide an up-to-date record of high risk relationships across an organization

D.

Risk registers are used for logging and tracking third party risks

Questions # 8:

Which of the following topics is LEAST important when evaluating a service provider's Security and Privacy Awareness Program?

Options:

A.

Training on phishing and social engineering risks and expected actions for employees and contractors

B.

Training on whistleblower compliance issue reporting mechanisms

C.

Training that is designed based on role, job scope, or level of access

D.

Training on acceptable use and data safeguards based on organization's policies

Questions # 9:

All of the following processes are components of controls evaluation in the Third Party Risk Assessment process EXCEPT:

Options:

A.

Reviewing compliance artifacts for the presence of control attributes

B.

Negotiating contract terms for the right to audit

C.

Analyzing assessment results to identify and report risk

D.

Scoping the assessment based on identified risk factors

Questions # 10:

Which statement provides the BEST description of inherent risk?

Options:

A.

inherent risk is the amount of risk an organization can incur when there is an absence of controls

B.

Inherent risk is the level of risk triggered by outsourcing & product or service

C.

Inherent risk is the amount of risk an organization can accept based on their risk tolerance

D.

Inherent risk is the level of risk that exists with all of the necessary controls in place

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.