Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which statement is FALSE when describing the differences between security vulnerabilities and security defects?

Options:

A.

A security defect is a security flaw identified in an application due to poor coding practices


B.

Security defects should be treated as exploitable vulnerabilities


C.

Security vulnerabilities and security defects are synonymous


D.

A security defect can become a security vulnerability if undetected after migration into production


Expert Solution
Questions # 22:

If a system requires ALL of the following for accessing its data: (1) a password, (2) a

security token, and (3) a user's fingerprint, the system employs:

Options:

A.

Biometric authentication


B.

Challenge/Response authentication


C.

One-Time Password (OTP) authentication


D.

Multi-factor authentication


Expert Solution
Questions # 23:

Which factor is MOST important when scoping assessments of cloud-based third parties that access, process, and retain personal data?

Options:

A.

The geographic location of the vendor's outsourced datacenters since assessments are only required for international data transfers


B.

The identification of the type of cloud hosting deployment or service model in order to confirm responsibilities between the third party and the cloud hosting provider


C.

The definition of requirements for backup capabilities for power generation and redundancy in the resilience plan


D.

The contract terms for the configuration of the environment which may prevent conducting the assessment


Expert Solution
Questions # 24:

Which example is typically NOT included in a Business Impact Analysis (BIA)?

Options:

A.

Including any contractual or legal/regulatory requirements


B.

Prioritization of business functions and processes


C.

Identifying the criticality of applications


D.

Requiring vendor participation in testing


Expert Solution
Questions # 25:

Tracking breach, credential exposure and insider fraud/theft alerts is an example of which continuous monitoring technique?

Options:

A.

Monitoring surface


B.

Vulnerabilities


C.

Passive and active indicators of compromise


D.

Business intelligence


Expert Solution
Questions # 26:

Which of the following is NOT a key component of TPRM requirements in the software development life cycle (SDLC)?

Options:

A.

Maintenance of artifacts that provide proof that SOLC gates are executed


B.

Process for data destruction and disposal


C.

Software security testing


D.

Process for fixing security defects


Expert Solution
Questions # 27:

Which statement does NOT reflect current practice in addressing fourth party risk or subcontracting risk?

Options:

A.

Third party contracts and agreements should require prior notice and approval for subcontracting


B.

Outsourcers should rely on requesting and reviewing external audit reports to address subcontracting risk


C.

Outsourcers should inspect the vendor's TPRM program and require evidence of the assessments of subcontractors


D.

Third party contracts should include capturing, maintaining, and tracking authorized subcontractors


Expert Solution
Questions # 28:

Which of the following BEST describes the distinction between a regulation and a standard?

Options:

A.

A regulation must be adhered to by all companies subject to its requirements, but companies “can voluntarily choose to follow standards.


B.

There is no distinction, regulations and standards are the same and have equal impact


C.

Standards are always a subset of a regulation


D.

A standard must be adhered to by companies based on the industry they are in, while regulations are voluntary.


Expert Solution
Questions # 29:

Which statement provides the BEST description of inherent risk?

Options:

A.

inherent risk is the amount of risk an organization can incur when there is an absence of controls


B.

Inherent risk is the level of risk triggered by outsourcing & product or service


C.

Inherent risk is the amount of risk an organization can accept based on their risk tolerance


D.

Inherent risk is the level of risk that exists with all of the necessary controls in place


Expert Solution
Questions # 30:

The BEST time in the SDLC process for an application service provider to perform Threat Modeling analysis is:

Options:

A.

Before the application design and development activities begin


B.

After the application vulnerability or penetration test is completed


C.

After testing and before the deployment of the final code into production


D.

Prior to the execution of a contract with each client


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions