Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with ValidTests

Exam CTPRP All Questions
Exam CTPRP Premium Access

View all detail and faqs for the CTPRP exam

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which requirement is NOT included in IT asset end-of-life (EOL) processes?

Options:

A.

The requirement to conduct periodic risk assessments to determine end-of-life

B.

The requirement to track status using a change initiation request form

C.

The requirement to track updates to third party provided systems or applications for any planned end-of-life support

D.

The requirement to establish defined procedures for secure destruction al sunset of asset

Expert Solution
Questions # 32:

Which type of external event does NOT trigger an organization ta prompt a third party contract provisions review?

Options:

A.

Change in company point of contact

B.

Business continuity event

C.

Data breach/privacy incident

D.

Change in regulations

Expert Solution
Questions # 33:

Which of the following actions reflects the first step in developing an emergency response plan?

Options:

A.

Conduct an assessment that includes an inventory of the types of events that have the greatest potential to trigger an emergency response plan

B.

Consider work-from-home parameters in the emergency response plan

C.

incorporate periodic crisis management team tabletop exercises to test different scenarios

D.

Use the results of continuous monitoring tools to develop the emergency response plan

Expert Solution
Questions # 34:

A set of principles for software development that address the top application security risks and industry web requirements is known as:

Options:

A.

Application security design standards

B.

Security testing methodology

C.

Secure code reviews

D.

Secure architecture risk analysis

Expert Solution
Questions # 35:

An outsourcer's vendor risk assessment process includes all of the following EXCEPT:

Options:

A.

Establishing risk evaluation criteria based on company policy

B.

Developing risk-tiered due diligence standards

C.

Setting remediation timelines based on the severity level of findings

D.

Defining assessment frequency based on resource capacity

Expert Solution
Questions # 36:

Which of the following is a component of evaluating a third party's use of Remote Access within their information security policy?

Options:

A.

Maintaining blocked IP address ranges

B.

Reviewing the testing and deployment procedures to networking components

C.

Providing guidelines to configuring ports on a router

D.

Identifying the use of multifactor authentication

Expert Solution
Questions # 37:

Which of the following BEST reflects components of an environmental controls testing program?

Options:

A.

Scheduling testing of building access and intrusion systems

B.

Remote monitoring of HVAC, Smoke, Fire, Water or Power

C.

Auditing the CCTV backup process and card-key access process

D.

Conducting periodic reviews of personnel access controls and building intrusion systems

Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions