Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with ValidTests

Exam CTPRP All Questions
Exam CTPRP Premium Access

View all detail and faqs for the CTPRP exam

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

Your company has been alerted that an IT vendor began utilizing a subcontractor located in a country restricted by company policy. What is the BEST approach to handle this situation?

Options:

A.

Notify management to approve an exception and ensure that contract provisions require prior “notification and evidence of subcontractor due diligence

B.

inform the business unit and recommend that the company cease future work with the IT vendor due to company policy

C.

Update the vender inventory with the mew location information in order to schedule a reassessment

D.

Inform the business unit and ask the vendor to replace the subcontractor at their expense in “order to move the processing back to an approved country

Expert Solution
Questions # 22:

Which of the following topics is LEAST important when evaluating a service provider's Security and Privacy Awareness Program?

Options:

A.

Training on phishing and social engineering risks and expected actions for employees and contractors

B.

Training on whistleblower compliance issue reporting mechanisms

C.

Training that is designed based on role, job scope, or level of access

D.

Training on acceptable use and data safeguards based on organization's policies

Expert Solution
Questions # 23:

An IT change management approval process includes all of the following components EXCEPT:

Options:

A.

Application version control standards for software release updates

B.

Documented audit trail for all emergency changes

C.

Defined roles between business and IT functions

D.

Guidelines that restrict approval of changes to only authorized personnel

Expert Solution
Questions # 24:

Physical access procedures and activity logs should require all of the following EXCEPT:

Options:

A.

Require multiple access controls for server rooms and data centers

B.

Require physical access logs to be retained indefinitely for audit purposes

C.

Record successful and unsuccessful attempts including investigation of unsuccessful access attempts

D.

Include a process to trigger review of the logs after security events

Expert Solution
Questions # 25:

Once a vendor questionnaire is received from a vendor what is the MOST important next step when evaluating the responses?

Options:

A.

Document your analysis and provide confirmation to the business unit regarding receipt of the questionnaire

B.

Update the vender risk registry and vendor inventory with the results in order to complete the assessment

C.

Calculate the total number of findings to rate the effectiveness of the vendor response

D.

Analyze the responses to identify adverse or high priority responses to prioritize controls that should be tested

Expert Solution
Questions # 26:

Which approach demonstrates GREATER maturity of physical security compliance?

Options:

A.

Leveraging periodic reporting to schedule facility inspections based on reported events

B.

Providing a checklist for self-assessment

C.

Maintaining a standardized scheduled for confirming controls to defined standards

D.

Conducting unannounced checks an an ac-hac basis

Expert Solution
Questions # 27:

When defining due diligence requirements for the set of vendors that host web applications which of the following is typically NOT part of evaluating the vendor's patch

management controls?

Options:

A.

The capability of the vendor to apply priority patching of high-risk systems

B.

Established procedures for testing of patches, service packs, and hot fixes prior to installation

C.

A documented process to gain approvals for use of open source applications

D.

The existence of a formal process for evaluation and prioritization of known vulnerabilities

Expert Solution
Questions # 28:

Which statement is TRUE regarding the onboarding process far new hires?

Options:

A.

New employees and contractors should not be on-boarded until the results of applicant screening are approved

B.

it is not necessary to have employees, contractors, and third party users sign confidentiality or non-disclosure agreements

C.

All job roles should require employees to sign non-compete agreements

D.

New employees and contactors can opt-out of having to attend security and privacy awareness training if they hold existing certifications

Expert Solution
Questions # 29:

When conducting an assessment of a third party's physical security controls, which of the following represents the innermost layer in a ‘Defense in Depth’ model?

Options:

A.

Public internal

B.

Restricted entry

C.

Private internal

D.

Public external

Expert Solution
Questions # 30:

If a system requires ALL of the following for accessing its data: (1) a password, (2) a

security token, and (3) a user's fingerprint, the system employs:

Options:

A.

Biometric authentication

B.

Challenge/Response authentication

C.

One-Time Password (OTP) authentication

D.

Multi-factor authentication

Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions