Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CTPRP Premium Access

View all detail and faqs for the CTPRP exam


832 Students Passed

95% Average Score

94% Same Questions
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

An IT asset management program should include all of the following components EXCEPT:

Options:

A.

Maintaining inventories of systems, connections, and software applications

B.

Defining application security standards for internally developed applications

C.

Tracking and monitoring availability of vendor updates and any timelines for end of support

D.

Identifying and tracking adherence to IT asset end-of-life policy

Questions # 32:

Select the risk type that is defined as: “A third party may not be able to meet its obligations due to inadequate systems or processes”.

Options:

A.

Reliability risk

B.

Performance risk

C.

Competency risk

D.

Availability risk

Questions # 33:

A set of principles for software development that address the top application security risks and industry web requirements is known as:

Options:

A.

Application security design standards

B.

Security testing methodology

C.

Secure code reviews

D.

Secure architecture risk analysis

Questions # 34:

Which of the following indicators is LEAST likely to trigger a reassessment of an existing vendor?

Options:

A.

Change in vendor location or use of new fourth parties

B.

Change in scope of existing work (e.g., new data or system access)

C.

Change in regulation that impacts service provider requirements

D.

Change at outsourcer due to M&A

Questions # 35:

Which of the following is a component of evaluating a third party's use of Remote Access within their information security policy?

Options:

A.

Maintaining blocked IP address ranges

B.

Reviewing the testing and deployment procedures to networking components

C.

Providing guidelines to configuring ports on a router

D.

Identifying the use of multifactor authentication

Questions # 36:

Which activity BEST describes conducting due diligence of a lower risk vendor?

Options:

A.

Accepting a service providers self-assessment questionnaire responses

B.

Preparing reports to management regarding the status of third party risk management and remediation activities

C.

Reviewing a service provider's self-assessment questionnaire and external audit report(s)

D.

Requesting and filing a service provider's external audit report(s) for future reference

Questions # 37:

Which set of procedures is typically NOT addressed within data privacy policies?

Options:

A.

Procedures to limit access and disclosure of personal information to third parties

B.

Procedures for handling data access requests from individuals

C.

Procedures for configuration settings in identity access management

D.

Procedures for incident reporting and notification

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.