Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which set of procedures is typically NOT addressed within data privacy policies?

Options:

A.

Procedures to limit access and disclosure of personal information to third parties


B.

Procedures for handling data access requests from individuals


C.

Procedures for configuration settings in identity access management


D.

Procedures for incident reporting and notification


Expert Solution
Questions # 2:

Which statement BEST describes the methods of performing due diligence during third party risk assessments?

Options:

A.

Inspecting physical and environmental security controls by conducting a facility tour


B.

Reviewing status of findings from the questionnaire and defining remediation plans


C.

interviewing subject matter experts or control owners, reviewing compliance artifacts, and validating controls


D.

Reviewing and assessing only the obligations that are specifically defined in the contract


Expert Solution
Questions # 3:

An outsourcer's vendor risk assessment process includes all of the following EXCEPT:

Options:

A.

Establishing risk evaluation criteria based on company policy


B.

Developing risk-tiered due diligence standards


C.

Setting remediation timelines based on the severity level of findings


D.

Defining assessment frequency based on resource capacity


Expert Solution
Questions # 4:

Which statement is FALSE regarding the methods of measuring third party risk?

Options:

A.

Risk can be measured both qualitatively and quantitatively


B.

Risk can be quantified by calculating the severity of impact and likelihood of occurrence


C.

Assessing risk impact requires an analysis of prior events, frequency of occurrence, and external trends to analyze and predict the potential of a particular event happening


D.

Risk likelihood or probability is a critical element in quantifying inherent or residual risk


Expert Solution
Questions # 5:

Which cloud deployment model is focused on the management of hardware equipment?

Options:

A.

Function as a service


B.

Platform as a service


C.

Software as a service


D.

Infrastructure as a service


Expert Solution
Questions # 6:

Which statement is TRUE regarding the onboarding process far new hires?

Options:

A.

New employees and contractors should not be on-boarded until the results of applicant screening are approved


B.

it is not necessary to have employees, contractors, and third party users sign confidentiality or non-disclosure agreements


C.

All job roles should require employees to sign non-compete agreements


D.

New employees and contactors can opt-out of having to attend security and privacy awareness training if they hold existing certifications


Expert Solution
Questions # 7:

Minimum risk assessment standards for third party due diligence should be:

Options:

A.

Set by each business unit based on the number of vendors to be assessed


B.

Defined in the vendor/service provider contract or statement of work


C.

Established by the TPRM program based on the company’s risk tolerance and risk appetite


D.

Identified by procurement and required for all vendors and suppliers


Expert Solution
Questions # 8:

You are reviewing assessment results of workstation and endpoint security. Which result should trigger more investigation due to greater risk potential?

Options:

A.

Use of multi-tenant laptops


B.

Disabled printing and USB devices


C.

Use of desktop virtualization


D.

Disabled or blocked access to internet


Expert Solution
Questions # 9:

When defining due diligence requirements for the set of vendors that host web applications which of the following is typically NOT part of evaluating the vendor's patch

management controls?

Options:

A.

The capability of the vendor to apply priority patching of high-risk systems


B.

Established procedures for testing of patches, service packs, and hot fixes prior to installation


C.

A documented process to gain approvals for use of open source applications


D.

The existence of a formal process for evaluation and prioritization of known vulnerabilities


Expert Solution
Questions # 10:

When updating TPRM vendor classification requirements with a focus on availability, which

risk rating factors provide the greatest impact to the analysis?

Options:

A.

Type of data by classification; volume of records included in data processing


B.

Financial viability of the vendor; ability to meet performance metrics


C.

Network connectivity; remote access to applications


D.

impact on operations and end users; impact on revenue; impact on regulatory compliance


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions