Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with ValidTests

Exam CTPRP All Questions
Exam CTPRP Premium Access

View all detail and faqs for the CTPRP exam

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which statement is TRUE regarding artifacts reviewed when assessing the Cardholder Data Environment (CDE) in payment card processing?

Options:

A.

The Data Security Standards (DSS) framework should be used to scope the assessment

B.

The Report on Compliance (ROC) provides the assessment results completed by a qualified security assessor that includes an onsite audit

C.

The Self-Assessment Questionnaire (SAQ) provides independent testing of controls

D.

A System and Organization Controls (SOC) report is sufficient if the report addresses the same location

Expert Solution
Questions # 12:

Which risk treatment approach typically requires a negotiation of contract terms between parties?

Options:

A.

Monitor the risk

B.

Mitigate the risk

C.

Accept the risk

D.

Transfer the risk

Expert Solution
Questions # 13:

Which statement is FALSE regarding the foundational requirements of a well-defined third party risk management program?

Options:

A.

We conduct onsite or virtual assessments for all third parties

B.

We have defined senior and executive management accountabilities for oversight of our TPRM program

C.

We have established vendor risk ratings and classifications based on a tiered hierarchy

D.

We have established Management and Board-level reporting to enable risk-based decisionmaking

Expert Solution
Questions # 14:

Your organization has recently acquired a set of new global third party relationships due to M&A. You must define your risk assessment process based on your due diligence

standards. Which risk factor is LEAST important in defining your requirements?

Options:

A.

The risk of increased expense to conduct vendor assessments based on client contractual requirements

B.

The risk of natural disasters and physical security risk based on geolocation

C.

The risk of increased government regulation and decreased political stability based on country risk

D.

The financial risk due to local economic factors and country infrastructure

Expert Solution
Questions # 15:

Which statement is FALSE when describing the third party risk assessors’ role when conducting a controls evaluation using an industry framework?

Options:

A.

The Assessor's role is to conduct discovery with subject matter experts to understand the control environment

B.

The Assessor's role is to conduct discovery and validate responses from the risk assessment questionnaire by testing or validating controls

C.

The Assessor's role is to provide an opinion on the effectiveness of controls conducted over a period of time in their report

D.

The Assessor's role is to review compliance artifacts and identify potential control gaps based on evaluation of the presence of control attributes

Expert Solution
Questions # 16:

Which factor is less important when reviewing application risk for application service providers?

Options:

A.

Remote connectivity

B.

The number of software releases

C.

The functionality and type of data the application processes

D.

APl integration

Expert Solution
Questions # 17:

Which statement is FALSE regarding problem or issue management?

Options:

A.

Problems or issues are the root cause of an actual or potential incident

B.

Problem or issue management involves managing workarounds or known errors

C.

Problems or issues typically lead to systemic failures

D.

Problem or issue management may reduce the likelihood and impact of incidents

Expert Solution
Questions # 18:

All of the following processes are components of controls evaluation in the Third Party Risk Assessment process EXCEPT:

Options:

A.

Reviewing compliance artifacts for the presence of control attributes

B.

Negotiating contract terms for the right to audit

C.

Analyzing assessment results to identify and report risk

D.

Scoping the assessment based on identified risk factors

Expert Solution
Questions # 19:

Which statement is FALSE when describing the differences between security vulnerabilities and security defects?

Options:

A.

A security defect is a security flaw identified in an application due to poor coding practices

B.

Security defects should be treated as exploitable vulnerabilities

C.

Security vulnerabilities and security defects are synonymous

D.

A security defect can become a security vulnerability if undetected after migration into production

Expert Solution
Questions # 20:

You are reviewing assessment results of workstation and endpoint security. Which result should trigger more investigation due to greater risk potential?

Options:

A.

Use of multi-tenant laptops

B.

Disabled printing and USB devices

C.

Use of desktop virtualization

D.

Disabled or blocked access to internet

Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions