Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

An IT change management approval process includes all of the following components EXCEPT:

Options:

A.

Application version control standards for software release updates


B.

Documented audit trail for all emergency changes


C.

Defined roles between business and IT functions


D.

Guidelines that restrict approval of changes to only authorized personnel


Expert Solution
Questions # 12:

When defining third party requirements for transmitting Pll, which factors provide stranger controls?

Options:

A.

Full disk encryption and backup


B.

Available bandwidth and redundancy


C.

Strength of encryption cipher and authentication method


D.

Logging and monitoring


Expert Solution
Questions # 13:

Which vendor statement provides the BEST description of the concept of least privilege?

Options:

A.

We require dual authorization for restricted areas


B.

We grant people access to the minimum necessary to do their job


C.

We require separation of duties for performance of high risk activities


D.

We limit root and administrator access to only a few personnel


Expert Solution
Questions # 14:

Which of the following actions reflects the first step in developing an emergency response plan?

Options:

A.

Conduct an assessment that includes an inventory of the types of events that have the greatest potential to trigger an emergency response plan


B.

Consider work-from-home parameters in the emergency response plan


C.

incorporate periodic crisis management team tabletop exercises to test different scenarios


D.

Use the results of continuous monitoring tools to develop the emergency response plan


Expert Solution
Questions # 15:

Which of the following is NOT an attribute in the vendor inventory used to assign risk rating and vendor classification?

Options:

A.

Type of data accessed, processed, or retained


B.

Type of systems accessed


C.

Type of contract addendum


D.

Type of network connectivity


Expert Solution
Questions # 16:

All of the following processes are components of controls evaluation in the Third Party Risk Assessment process EXCEPT:

Options:

A.

Reviewing compliance artifacts for the presence of control attributes


B.

Negotiating contract terms for the right to audit


C.

Analyzing assessment results to identify and report risk


D.

Scoping the assessment based on identified risk factors


Expert Solution
Questions # 17:

Which of the following data safeguarding techniques provides the STRONGEST assurance that data does not identify an individual?

Options:

A.

Data masking


B.

Data encryption


C.

Data anonymization


D.

Data compression


Expert Solution
Questions # 18:

Which statement BEST describes the use of risk based decisioning in prioritizing gaps identified at a critical vendor when defining the corrective action plan?

Options:

A.

The assessor determined that gaps should be analyzed, documented, reviewed for compensating controls, and submitted to the business owner to approve risk treatment plan


B.

The assessor decided that the critical gaps should be discussed in the closing meeting so that the vendor can begin to implement corrective actions immediately


C.

The assessor concluded that all gaps should be logged and treated as high severity findings since the assessment was performed on a critical vendor


D.

The assessor determined that all gaps should be logged and communicated that if the gaps were corrected immediately they would not need to be included in the findings report


Expert Solution
Questions # 19:

When working with third parties, which of the following requirements does not reflect a “Zero Trust" approach to access management?

Options:

A.

Utilizing a solution that allows direct access by third parties to the organization's network


B.

Ensure that access is granted on a per session basis regardless of network location, user, or device


C.

Implement device monitoring, continual inspection and monitoring of logs/traffic


D.

Require that all communication is secured regardless of network location


Expert Solution
Questions # 20:

Which type of contract termination is MOST likely to occur after failure to remediate assessment findings?

Options:

A.

Regulatory/supervisory termination


B.

Termination for convenience


C.

Normal termination


D.

Termination for cause


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions