Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CTPRP Premium Access

View all detail and faqs for the CTPRP exam


832 Students Passed

95% Average Score

94% Same Questions
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

What attribute is MOST likely to be included in the software development lifecycle (SDLC) process?

Options:

A.

Scheduling the frequency of automated vulnerability scans

B.

Scanning for data input validation in production

C.

Conducting peer code reviews

D.

Defining the scope of annual penetration tests

Questions # 12:

Which of the following is NOT an example of a type of application security testing?

Options:

A.

Cookie consent scanning

B.

Interactive testing

C.

Static testing

D.

Dynamic testing

Questions # 13:

Which of the following is LEAST likely to be included in an organization's mobile device policy?

Options:

A.

Language on restricting the use of the mobile device to only business purposes

B.

Language to require a mutual Non Disclosure Agreement (NDA)

C.

Language detailing the user's responsibility to not bypass security settings or monitoring applications

D.

Language detailing specific actions that an organization may take in the event of an information security incident

Questions # 14:

Which of the following components are typically NOT part of a cloud hosting vendor assessment program?

Options:

A.

Reviewing the entity's image snapshot approval and management process

B.

Requiring security services documentation and audit attestation reports

C.

Requiring compliance evidence that provides the definition of patching responsibilities

D.

Conducting customer performed penetration tests

Questions # 15:

When measuring the operational performance of implementing a TPRM program, which example is MOST likely to provide meaningful metrics?

Options:

A.

logging the number of exceptions to existing due diligence standards

B.

Measuring the time spent by resources for task and corrective action plan completion

C.

Calculating the average time to remediate identified corrective actions

D.

Tracking the number of outstanding findings

Questions # 16:

Which requirement is NOT included in IT asset end-of-life (EOL) processes?

Options:

A.

The requirement to conduct periodic risk assessments to determine end-of-life

B.

The requirement to track status using a change initiation request form

C.

The requirement to track updates to third party provided systems or applications for any planned end-of-life support

D.

The requirement to establish defined procedures for secure destruction al sunset of asset

Questions # 17:

When updating TPRM vendor classification requirements with a focus on availability, which

risk rating factors provide the greatest impact to the analysis?

Options:

A.

Type of data by classification; volume of records included in data processing

B.

Financial viability of the vendor; ability to meet performance metrics

C.

Network connectivity; remote access to applications

D.

impact on operations and end users; impact on revenue; impact on regulatory compliance

Questions # 18:

The BEST way to manage Fourth-Nth Party risk is:

Options:

A.

Include a provision in the vender contract requiring the vendor to provide notice and obtain written consent before outsourcing any service

B.

Include a provision in the contract prohibiting the vendor from outsourcing any service which includes access to confidential data or systems

C.

Incorporate notification and approval contract provisions for subcontracting that require evidence of due diligence as defined by a TPRM program

D.

Require the vendor to maintain a cyber-insurance policy for any service that is outsourced which includes access to confidential data or systems

Questions # 19:

Which type of external event does NOT trigger an organization ta prompt a third party contract provisions review?

Options:

A.

Change in company point of contact

B.

Business continuity event

C.

Data breach/privacy incident

D.

Change in regulations

Questions # 20:

Once a vendor questionnaire is received from a vendor what is the MOST important next step when evaluating the responses?

Options:

A.

Document your analysis and provide confirmation to the business unit regarding receipt of the questionnaire

B.

Update the vender risk registry and vendor inventory with the results in order to complete the assessment

C.

Calculate the total number of findings to rate the effectiveness of the vendor response

D.

Analyze the responses to identify adverse or high priority responses to prioritize controls that should be tested

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.