Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Shared Assessments CTPRP - Certified Third-Party Risk Professional (CTPRP)

Page: 3 / 4
Total 125 questions

When conducting an assessment of a third party's physical security controls, which of the following represents the innermost layer in a ‘Defense in Depth’ model?

A.

Public internal

B.

Restricted entry

C.

Private internal

D.

Public external

Which TPRM risk assessment component would typically NOT be maintained in a Risk Register?

A.

An assessment of the impact and likelihood the risk will occur and the possible seriousness

B.

Vendor inventory of all suppliers, vendors, and service providers prioritized by contract value

C.

An outline of proposed mitigation actions and assignment of risk owner

D.

A grading of each risk according to a risk assessment table or hierarchy

What attribute is MOST likely to be included in the software development lifecycle (SDLC) process?

A.

Scheduling the frequency of automated vulnerability scans

B.

Scanning for data input validation in production

C.

Conducting peer code reviews

D.

Defining the scope of annual penetration tests

Which action statement BEST describes an assessor calculating residual risk?

A.

The assessor adjusts the vendor risk rating prior to reporting the findings to the business unit

B.

The assessor adjusts the vendor risk rating based on changes to the risk level after analyzing the findings and mitigating controls

C.

The business unit closes out the finding prior to the assessor submitting the final report

D.

The assessor recommends implementing continuous monitoring for the next 18 months

The BEST way to manage Fourth-Nth Party risk is:

A.

Include a provision in the vender contract requiring the vendor to provide notice and obtain written consent before outsourcing any service

B.

Include a provision in the contract prohibiting the vendor from outsourcing any service which includes access to confidential data or systems

C.

Incorporate notification and approval contract provisions for subcontracting that require evidence of due diligence as defined by a TPRM program

D.

Require the vendor to maintain a cyber-insurance policy for any service that is outsourced which includes access to confidential data or systems

Which activity BEST describes conducting due diligence of a lower risk vendor?

A.

Accepting a service providers self-assessment questionnaire responses

B.

Preparing reports to management regarding the status of third party risk management and remediation activities

C.

Reviewing a service provider's self-assessment questionnaire and external audit report(s)

D.

Requesting and filing a service provider's external audit report(s) for future reference

Which of the following would be a component of an arganization’s Ethics and Code of Conduct Program?

A.

Participation in the company's annual privacy awareness program

B.

A disciplinary process for non-compliance with key policies, including formal termination or change of status process based on non-compliance

C.

Signing acknowledgement of Acceptable Use policy for use of company assets

D.

A process to conduct periodic access reviews of critical Human Resource files

Which of the following BEST reflects components of an environmental controls testing program?

A.

Scheduling testing of building access and intrusion systems

B.

Remote monitoring of HVAC, Smoke, Fire, Water or Power

C.

Auditing the CCTV backup process and card-key access process

D.

Conducting periodic reviews of personnel access controls and building intrusion systems

Which of the following factors is LEAST likely to trigger notification obligations in incident response?

A.

Regulatory requirements

B.

Data classification or sensitivity

C.

Encryption of data

D.

Contractual terms

Which of the following indicators is LEAST likely to trigger a reassessment of an existing vendor?

A.

Change in vendor location or use of new fourth parties

B.

Change in scope of existing work (e.g., new data or system access)

C.

Change in regulation that impacts service provider requirements

D.

Change at outsourcer due to M&A