Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Shared Assessments Certified Third-Party Risk Professional (CTPRP) CTPRP Questions and answers with ValidTests

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

When evaluating remote access risk, which of the following is LEAST applicable to your analysis?

Options:

A.

Logging of remote access authentication attempts

B.

Limiting access by job role of business justification

C.

Monitoring device activity usage volumes

D.

Requiring application whitelisting

Expert Solution
Questions # 2:

When evaluating compliance artifacts for change management, a robust process should include the following attributes:

Options:

A.

Approval, validation, auditable.

B.

Logging, approvals, validation, back-out and exception procedures

C.

Logging, approval, back-out.

D.

Communications, approval, auditable.

Expert Solution
Questions # 3:

Which of the following is a positive aspect of adhering to a secure SDLC?

Options:

A.

Promotes a “check the box" compliance approach

B.

A process that defines and meets both the business requirements and the security requirements

C.

A process that forces quality code repositories management

D.

Enables the process if system code is managed in different IT silos

Expert Solution
Questions # 4:

The BEST way to manage Fourth-Nth Party risk is:

Options:

A.

Include a provision in the vender contract requiring the vendor to provide notice and obtain written consent before outsourcing any service

B.

Include a provision in the contract prohibiting the vendor from outsourcing any service which includes access to confidential data or systems

C.

Incorporate notification and approval contract provisions for subcontracting that require evidence of due diligence as defined by a TPRM program

D.

Require the vendor to maintain a cyber-insurance policy for any service that is outsourced which includes access to confidential data or systems

Expert Solution
Questions # 5:

Which of the following is typically NOT included within the scape of an organization's network access policy?

Options:

A.

Firewall settings

B.

Unauthorized device detection

C.

Website privacy consent banners

D.

Remote access

Expert Solution
Questions # 6:

Which statement is FALSE regarding analyzing results from a vendor risk assessment?

Options:

A.

The frequency for conducting a vendor reassessment is defined by regulatory obligations

B.

Findings from a vendor risk assessment may be defined at the entity level, and are based o na Specific topic or control

C.

Identifying findings from a vendor risk assessment can occur at any stage in the contract lifecycle

D.

Risk assessment findings identified by controls testing or validation should map back to the information gathering questionnaire and agreed upon framework

Expert Solution
Questions # 7:

Which activity BEST describes conducting due diligence of a lower risk vendor?

Options:

A.

Accepting a service providers self-assessment questionnaire responses

B.

Preparing reports to management regarding the status of third party risk management and remediation activities

C.

Reviewing a service provider's self-assessment questionnaire and external audit report(s)

D.

Requesting and filing a service provider's external audit report(s) for future reference

Expert Solution
Questions # 8:

When working with third parties, which of the following requirements does not reflect a “Zero Trust" approach to access management?

Options:

A.

Utilizing a solution that allows direct access by third parties to the organization's network

B.

Ensure that access is granted on a per session basis regardless of network location, user, or device

C.

Implement device monitoring, continual inspection and monitoring of logs/traffic

D.

Require that all communication is secured regardless of network location

Expert Solution
Questions # 9:

Which statement is TRUE regarding defining vendor classification or risk tiering in a TPRM program?

Options:

A.

Vendor classification and risk tiers are based upon residual risk calculations

B.

Vendor classification and risk tiering should only be used for critical third party relationships

C.

Vendor classification and corresponding risk tiers utilize the same due diligence standards for controls evaluation based upon policy

D.

Vendor classification and risk tier is determined by calculating the inherent risk associated with outsourcing a specific product or service

Expert Solution
Questions # 10:

Which of the following statements is FALSE about Data Loss Prevention Programs?

Options:

A.

DLP programs include the policy, tool configuration requirements, and processes for the identification, blocking or monitoring of data

B.

DLP programs define the consequences for non-compliance to policies

C.

DLP programs define the required policies based on default tool configuration

D.

DLP programs include acknowledgement the company can apply controls to remove any data

Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions