Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Shared Assessments CTPRP - Certified Third-Party Risk Professional (CTPRP)

Page: 4 / 4
Total 125 questions

Which statement is NOT an example of the purpose of internal communications and information sharing using TPRM performance metrics?

A.

To communicate the status of findings identified in vendor assessments and escalate issues es needed

B.

To communicate the status of policy compliance with TPRM onboarding, periodic assessment and off-boarding requirements

C.

To document the agreed upon corrective action plan between external parties based on the severity of findings

D.

To develop and provide periodic reporting to management based on TPRM results

Which of the following statements BEST represent the relationship between incident response and incident notification plans?

A.

Cybersecurity incident response programs have the same scope and objectives as privacy incident notification procedures

B.

All privacy and security incidents should be treated alike until analysis is performed to quantify the number of records impacted

C.

Security incident response management is only included in crisis communication for externally reported events

D.

A security incident may become a security breach based upon analysis and trigger the organization's incident notification or crisis communication process

When measuring the operational performance of implementing a TPRM program, which example is MOST likely to provide meaningful metrics?

A.

logging the number of exceptions to existing due diligence standards

B.

Measuring the time spent by resources for task and corrective action plan completion

C.

Calculating the average time to remediate identified corrective actions

D.

Tracking the number of outstanding findings

Which of the following actions is an early step when triggering an Information Security

Incident Response Program?

A.

Implementing processes for emergency change control approvals

B.

Requiring periodic changes to the vendor's contract for breach notification

C.

Assessing the vendor's Business Impact Analysis (BIA) for resuming operations

D.

Initiating an investigation of the unauthorized disclosure of data

The primary disadvantage of Single Sign-On (SSO) access control is:

A.

The impact of a compromise of the end-user credential that provides access to multiple systems is greater

B.

A single password is easier to guess and be exploited

C.

Users store multiple passwords in a single repository limiting the ability to change the password

D.

Vendors must develop multiple methods to integrate system access adding cost and complexity

Which of the following BEST describes the distinction between a regulation and a standard?

A.

A regulation must be adhered to by all companies subject to its requirements, but companies “can voluntarily choose to follow standards.

B.

There is no distinction, regulations and standards are the same and have equal impact

C.

Standards are always a subset of a regulation

D.

A standard must be adhered to by companies based on the industry they are in, while regulations are voluntary.

Which statement is FALSE when describing the differences between security vulnerabilities and security defects?

A.

A security defect is a security flaw identified in an application due to poor coding practices

B.

Security defects should be treated as exploitable vulnerabilities

C.

Security vulnerabilities and security defects are synonymous

D.

A security defect can become a security vulnerability if undetected after migration into production