Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CTPRP Premium Access

View all detail and faqs for the CTPRP exam


832 Students Passed

95% Average Score

94% Same Questions
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are updating the inventory of regulations that impact your TPRM program during the company's annual risk assessment. Which statement provides the optimal approach to

prioritizing the regulations?

Options:

A.

identify the applicable regulations that require an extension of specific obligations to service providers

B.

Narrow the focus only on the regulations that directly apply to personal information

C.

Include the regulations that have the greater risk of triggering enforcement or fines/penalties

D.

Emphasize the federal regulations since they supersede state regulations

Questions # 22:

In which phase of the TPRM lifecycle should terms for return or destruction of data be defined and agreed upon?

Options:

A.

During contract negotiation

B.

At third party selection and initial due diligence

C.

When deploying ongoing monitoring

D.

At termination and exit

Questions # 23:

Which action statement BEST describes an assessor calculating residual risk?

Options:

A.

The assessor adjusts the vendor risk rating prior to reporting the findings to the business unit

B.

The assessor adjusts the vendor risk rating based on changes to the risk level after analyzing the findings and mitigating controls

C.

The business unit closes out the finding prior to the assessor submitting the final report

D.

The assessor recommends implementing continuous monitoring for the next 18 months

Questions # 24:

Which of the following changes to the production environment is typically NOT subject to the change control process?

Options:

A.

Change in network

B.

Change in systems

C.

Change to administrator access

D.

Update to application

Questions # 25:

Which statement is TRUE regarding defining vendor classification or risk tiering in a TPRM program?

Options:

A.

Vendor classification and risk tiers are based upon residual risk calculations

B.

Vendor classification and risk tiering should only be used for critical third party relationships

C.

Vendor classification and corresponding risk tiers utilize the same due diligence standards for controls evaluation based upon policy

D.

Vendor classification and risk tier is determined by calculating the inherent risk associated with outsourcing a specific product or service

Questions # 26:

Your company has been alerted that an IT vendor began utilizing a subcontractor located in a country restricted by company policy. What is the BEST approach to handle this situation?

Options:

A.

Notify management to approve an exception and ensure that contract provisions require prior “notification and evidence of subcontractor due diligence

B.

inform the business unit and recommend that the company cease future work with the IT vendor due to company policy

C.

Update the vender inventory with the mew location information in order to schedule a reassessment

D.

Inform the business unit and ask the vendor to replace the subcontractor at their expense in “order to move the processing back to an approved country

Questions # 27:

Data loss prevention in endpoint security is the strategy for:

Options:

A.

Assuring there are adequate data backups in the event of a disaster

B.

Preventing exfiltration of confidential information by users who access company systems

C.

Enabling high-availability to prevent data transactions from loss

D.

Preventing malware from entering secure systems used for processing confidential information

Questions # 28:

When evaluating compliance artifacts for change management, a robust process should include the following attributes:

Options:

A.

Approval, validation, auditable.

B.

Logging, approvals, validation, back-out and exception procedures

C.

Logging, approval, back-out.

D.

Communications, approval, auditable.

Questions # 29:

Which of the following methods of validating pre-employment screening attributes is appropriate due to limitations of international or state regulation?

Options:

A.

Reviewing evidence of web search of social media sites

B.

Providing and sampling complete personnel files to demonstrate unique screening results

C.

Requiring evidence of drug testing

D.

Requesting evidence of the performance of pre-employment screening when permitted by law

Questions # 30:

Which statement is TRUE regarding artifacts reviewed when assessing the Cardholder Data Environment (CDE) in payment card processing?

Options:

A.

The Data Security Standards (DSS) framework should be used to scope the assessment

B.

The Report on Compliance (ROC) provides the assessment results completed by a qualified security assessor that includes an onsite audit

C.

The Self-Assessment Questionnaire (SAQ) provides independent testing of controls

D.

A System and Organization Controls (SOC) report is sufficient if the report addresses the same location

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.