Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CTPRP Exam Dumps - Shared Assessments Third Party Risk Management Questions and Answers

Question # 14

Which statement is FALSE when describing the third party risk assessors’ role when conducting a controls evaluation using an industry framework?

Options:

A.

The Assessor's role is to conduct discovery with subject matter experts to understand the control environment

B.

The Assessor's role is to conduct discovery and validate responses from the risk assessment questionnaire by testing or validating controls

C.

The Assessor's role is to provide an opinion on the effectiveness of controls conducted over a period of time in their report

D.

The Assessor's role is to review compliance artifacts and identify potential control gaps based on evaluation of the presence of control attributes

Buy Now
Question # 15

Which of the following data safeguarding techniques provides the STRONGEST assurance that data does not identify an individual?

Options:

A.

Data masking

B.

Data encryption

C.

Data anonymization

D.

Data compression

Buy Now
Question # 16

A set of principles for software development that address the top application security risks and industry web requirements is known as:

Options:

A.

Application security design standards

B.

Security testing methodology

C.

Secure code reviews

D.

Secure architecture risk analysis

Buy Now
Question # 17

Which of the following is typically NOT included within the scape of an organization's network access policy?

Options:

A.

Firewall settings

B.

Unauthorized device detection

C.

Website privacy consent banners

D.

Remote access

Buy Now
Question # 18

Which of the following methods of validating pre-employment screening attributes is appropriate due to limitations of international or state regulation?

Options:

A.

Reviewing evidence of web search of social media sites

B.

Providing and sampling complete personnel files to demonstrate unique screening results

C.

Requiring evidence of drug testing

D.

Requesting evidence of the performance of pre-employment screening when permitted by law

Buy Now
Question # 19

Which statement is TRUE regarding the tools used in TPRM risk analyses?

Options:

A.

Risk treatment plans define the due diligence standards for third party assessments

B.

Risk ratings summarize the findings in vendor remediation plans

C.

Vendor inventories provide an up-to-date record of high risk relationships across an organization

D.

Risk registers are used for logging and tracking third party risks

Buy Now
Question # 20

Which factor in patch management is MOST important when conducting postcybersecurity incident analysis related to systems and applications?

Options:

A.

Configuration

B.

Log retention

C.

Approvals

D.

Testing

Buy Now
Question # 21

Which example of analyzing a vendor's response should trigger further investigation of their information security policies?

Options:

A.

Determination that the security policies include contract or temporary workers

B.

Determination that the security policies do not specify any requirements for third party governance and oversight

C.

Determination that the security policies are approved by management and available to constituents including employees and contract workers

D.

Determination that the security policies are communicated to constituents including full and part-time employees

Buy Now
Question # 22

Which of the following is a component of evaluating a third party's use of Remote Access within their information security policy?

Options:

A.

Maintaining blocked IP address ranges

B.

Reviewing the testing and deployment procedures to networking components

C.

Providing guidelines to configuring ports on a router

D.

Identifying the use of multifactor authentication

Buy Now
Question # 23

Which statement is FALSE regarding the risk factors an organization may include when defining TPRM compliance requirements?

Options:

A.

Organizations include TPRM compliance requirements within vendor contracts, and periodically review and update mandatory contract provisions

B.

Organizations rely on regulatory mandates to define and structure TPRM compliance requirements

C.

Organizations incorporate the use of external standards and frameworks to align and map TPRM compliance requirements to industry practice

D.

Organizations define TPRM policies based on the company’s risk appetite to shape requirements based on the services being outsourced

Buy Now
Exam Code: CTPRP
Exam Name: Certified Third-Party Risk Professional (CTPRP)
Last Update: Feb 6, 2025
Questions: 125
CTPRP pdf

CTPRP PDF

$29.75  $84.99
CTPRP Engine

CTPRP Testing Engine

$33.25  $94.99
CTPRP PDF + Engine

CTPRP PDF + Testing Engine

$47.25  $134.99