Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Shared Assessments CTPRP - Certified Third-Party Risk Professional (CTPRP)

Page: 2 / 4
Total 125 questions

Which of the following factors is MOST important when assessing the risk of shadow IT in organizational security?

A.

The organization maintains adequate policies and procedures that communicate required controls for security functions

B.

The organization requires security training and certification for security personnel

C.

The organization defines staffing levels to address impact of any turnover in security roles

D.

The organization's resources and investment are sufficient to meet security requirements

Which of the following statements is TRUE regarding the accountabilities in a three lines of defense model?

A.

The second line of defense is management within the business unit

B.

The first line of defense is the risk or compliance team that provides an oversight or governance function

C.

The third line of defense is an assurance function that has independence from the business unit

D.

The third line of defense must be limited to an external assessment firm

Which statement is TRUE regarding the use of questionnaires in third party risk assessments?

A.

The total number of questions included in the questionnaire assigns the risk tier

B.

Questionnaires are optional since reliance on contract terms is a sufficient control

C.

Assessment questionnaires should be configured based on the risk rating and type of service being evaluated

D.

All topic areas included in the questionnaire require validation during the assessment

The BEST time in the SDLC process for an application service provider to perform Threat Modeling analysis is:

A.

Before the application design and development activities begin

B.

After the application vulnerability or penetration test is completed

C.

After testing and before the deployment of the final code into production

D.

Prior to the execution of a contract with each client

Which statement is FALSE regarding the foundational requirements of a well-defined third party risk management program?

A.

We conduct onsite or virtual assessments for all third parties

B.

We have defined senior and executive management accountabilities for oversight of our TPRM program

C.

We have established vendor risk ratings and classifications based on a tiered hierarchy

D.

We have established Management and Board-level reporting to enable risk-based decisionmaking

You receive a call from a vendor that two laptops and a tablet are missing that were used to process your company data. The asset loss occurred two years ago, but was only recently discovered. That statement may indicate that this vendor is lacking an adequate:

A.

Asset Management Program

B.

Physical and Environmental Security Program

C.

Data Loss Prevention Program

D.

Information Security Incident Notification Policy

Which type of external event does NOT trigger an organization ta prompt a third party contract provisions review?

A.

Change in company point of contact

B.

Business continuity event

C.

Data breach/privacy incident

D.

Change in regulations

When updating TPRM vendor classification requirements with a focus on availability, which

risk rating factors provide the greatest impact to the analysis?

A.

Type of data by classification; volume of records included in data processing

B.

Financial viability of the vendor; ability to meet performance metrics

C.

Network connectivity; remote access to applications

D.

impact on operations and end users; impact on revenue; impact on regulatory compliance

Which of the following data types would be classified as low risk data?

A.

Sanitized customer data used for aggregated profiling

B.

Non personally identifiable, but sensitive to an organizations significant process

C.

Government-issued number, credit card number or bank account information

D.

Personally identifiable data but stored in a test environment cloud container

Which statement BEST reflects the factors that help you determine the frequency of cyclical assessments?

A.

Vendor assessments should be conducted during onboarding and then be replaced by continuous monitoring

B.

Vendor assessment frequency should be based on the level of risk and criticality of the vendor to your operations as determined by their vendor risk score

C.

Vendor assessments should be scheduled based on the type of services/products provided

D.

Vendor assessment frequency may need to be changed if the vendor has disclosed a data breach