Pass the Shared Assessments Third Party Risk Management CTPRP Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following statements BEST represent the relationship between incident response and incident notification plans?

Options:

A.

Cybersecurity incident response programs have the same scope and objectives as privacy incident notification procedures


B.

All privacy and security incidents should be treated alike until analysis is performed to quantify the number of records impacted


C.

Security incident response management is only included in crisis communication for externally reported events


D.

A security incident may become a security breach based upon analysis and trigger the organization's incident notification or crisis communication process


Expert Solution
Questions # 32:

Which of the following data types would be classified as low risk data?

Options:

A.

Sanitized customer data used for aggregated profiling


B.

Non personally identifiable, but sensitive to an organizations significant process


C.

Government-issued number, credit card number or bank account information


D.

Personally identifiable data but stored in a test environment cloud container


Expert Solution
Questions # 33:

Which factor is the LEAST important attribute when classifying personal data?

Options:

A.

The volume of data records processed or retained


B.

The data subject category that identifies the data owner


C.

The sensitivity level of specific data elements that could identify an individual


D.

The assignment of a confidentiality level that differentiates public or non-public information


Expert Solution
Questions # 34:

Which statement is TRUE regarding defining vendor classification or risk tiering in a TPRM program?

Options:

A.

Vendor classification and risk tiers are based upon residual risk calculations


B.

Vendor classification and risk tiering should only be used for critical third party relationships


C.

Vendor classification and corresponding risk tiers utilize the same due diligence standards for controls evaluation based upon policy


D.

Vendor classification and risk tier is determined by calculating the inherent risk associated with outsourcing a specific product or service


Expert Solution
Questions # 35:

Which of the following factors is MOST important when assessing the risk of shadow IT in organizational security?

Options:

A.

The organization maintains adequate policies and procedures that communicate required controls for security functions


B.

The organization requires security training and certification for security personnel


C.

The organization defines staffing levels to address impact of any turnover in security roles


D.

The organization's resources and investment are sufficient to meet security requirements


Expert Solution
Questions # 36:

In which phase of the TPRM lifecycle should terms for return or destruction of data be defined and agreed upon?

Options:

A.

During contract negotiation


B.

At third party selection and initial due diligence


C.

When deploying ongoing monitoring


D.

At termination and exit


Expert Solution
Questions # 37:

Which statement is FALSE regarding the risk factors an organization may include when defining TPRM compliance requirements?

Options:

A.

Organizations include TPRM compliance requirements within vendor contracts, and periodically review and update mandatory contract provisions


B.

Organizations rely on regulatory mandates to define and structure TPRM compliance requirements


C.

Organizations incorporate the use of external standards and frameworks to align and map TPRM compliance requirements to industry practice


D.

Organizations define TPRM policies based on the company’s risk appetite to shape requirements based on the services being outsourced


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions