Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CTPRP Exam Dumps - Shared Assessments Third Party Risk Management Questions and Answers

Question # 24

The set of shared values and beliefs that govern a company’s attitude toward risk is known as:

Options:

A.

Risk tolerance

B.

Risk treatment

C.

Risk culture

D.

Risk appetite

Buy Now
Question # 25

During the contract negotiation process for a new vendor, the vendor states they have legal obligations to retain data for tax purposes. However, your company policy requires data

return or destruction at contract termination. Which statement provides the BEST approach to address this conflict?

Options:

A.

Determine if a policy exception and approval is required, and require that data safeguarding obligations continue after termination

B.

Change the risk rating of the vendor to reflect a higher risk tier

C.

Insist the vendor adheres to the policy and contract provisions without exception

D.

Conduct an assessment of the vendor's data governance and records management program

Buy Now
Question # 26

Which of the following BEST describes the distinction between a regulation and a standard?

Options:

A.

A regulation must be adhered to by all companies subject to its requirements, but companies “can voluntarily choose to follow standards.

B.

There is no distinction, regulations and standards are the same and have equal impact

C.

Standards are always a subset of a regulation

D.

A standard must be adhered to by companies based on the industry they are in, while regulations are voluntary.

Buy Now
Question # 27

Which of the following statements BEST represent the relationship between incident response and incident notification plans?

Options:

A.

Cybersecurity incident response programs have the same scope and objectives as privacy incident notification procedures

B.

All privacy and security incidents should be treated alike until analysis is performed to quantify the number of records impacted

C.

Security incident response management is only included in crisis communication for externally reported events

D.

A security incident may become a security breach based upon analysis and trigger the organization's incident notification or crisis communication process

Buy Now
Question # 28

A contract clause that enables each party to share the amount of information security risk is known as:

Options:

A.

Limitation of liability

B.

Cyber Insurance

C.

Force majeure

D.

Mutual indemnification

Buy Now
Question # 29

Which statement is FALSE regarding the primary factors in determining vendor risk classification?

Options:

A.

The geographic area where the vendor is located may trigger specific regulatory obligations

B.

The importance to the outsourcer's recovery objectives may trigger a higher risk tier

C.

The type and volume of personal data processed may trigger a higher risk rating based on the criticality of the systems

D.

Network connectivity or remote access may trigger a higher vendor risk classification only for third parties that process personal information

Buy Now
Question # 30

Which of the following data types would be classified as low risk data?

Options:

A.

Sanitized customer data used for aggregated profiling

B.

Non personally identifiable, but sensitive to an organizations significant process

C.

Government-issued number, credit card number or bank account information

D.

Personally identifiable data but stored in a test environment cloud container

Buy Now
Question # 31

You are reviewing assessment results of workstation and endpoint security. Which result should trigger more investigation due to greater risk potential?

Options:

A.

Use of multi-tenant laptops

B.

Disabled printing and USB devices

C.

Use of desktop virtualization

D.

Disabled or blocked access to internet

Buy Now
Question # 32

Which statement is FALSE regarding the foundational requirements of a well-defined third party risk management program?

Options:

A.

We conduct onsite or virtual assessments for all third parties

B.

We have defined senior and executive management accountabilities for oversight of our TPRM program

C.

We have established vendor risk ratings and classifications based on a tiered hierarchy

D.

We have established Management and Board-level reporting to enable risk-based decisionmaking

Buy Now
Question # 33

Which statement is FALSE when describing the differences between security vulnerabilities and security defects?

Options:

A.

A security defect is a security flaw identified in an application due to poor coding practices

B.

Security defects should be treated as exploitable vulnerabilities

C.

Security vulnerabilities and security defects are synonymous

D.

A security defect can become a security vulnerability if undetected after migration into production

Buy Now
Exam Code: CTPRP
Exam Name: Certified Third-Party Risk Professional (CTPRP)
Last Update: Feb 6, 2025
Questions: 125
CTPRP pdf

CTPRP PDF

$29.75  $84.99
CTPRP Engine

CTPRP Testing Engine

$33.25  $94.99
CTPRP PDF + Engine

CTPRP PDF + Testing Engine

$47.25  $134.99