Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CTPRP Exam Dumps - Shared Assessments Third Party Risk Management Questions and Answers

Question # 4

Which of the following is NOT an attribute in the vendor inventory used to assign risk rating and vendor classification?

Options:

A.

Type of data accessed, processed, or retained

B.

Type of systems accessed

C.

Type of contract addendum

D.

Type of network connectivity

Buy Now
Question # 5

Which statement reflects a requirement that is NOT typically found in a formal Information Security Incident Management Program?

Options:

A.

The program includes the definition of internal escalation processes

B.

The program includes protocols for disclosure of information to external parties

C.

The program includes mechanisms for notification to clients

D.

The program includes processes in support of disaster recovery

Buy Now
Question # 6

Which type of contract provision is MOST important in managing Fourth-Nth party risk after contract signing and on-boarding due diligence is complete?

Options:

A.

Subcontractor notice and approval

B.

Indemnification and liability

C.

Breach notification

D.

Right to audit

Buy Now
Question # 7

Once a vendor questionnaire is received from a vendor what is the MOST important next step when evaluating the responses?

Options:

A.

Document your analysis and provide confirmation to the business unit regarding receipt of the questionnaire

B.

Update the vender risk registry and vendor inventory with the results in order to complete the assessment

C.

Calculate the total number of findings to rate the effectiveness of the vendor response

D.

Analyze the responses to identify adverse or high priority responses to prioritize controls that should be tested

Buy Now
Question # 8

An IT asset management program should include all of the following components EXCEPT:

Options:

A.

Maintaining inventories of systems, connections, and software applications

B.

Defining application security standards for internally developed applications

C.

Tracking and monitoring availability of vendor updates and any timelines for end of support

D.

Identifying and tracking adherence to IT asset end-of-life policy

Buy Now
Question # 9

Which cloud deployment model is primarily focused on the application layer?

Options:

A.

Infrastructure as a Service

B.

Software as a Service

C.

Function a3 a Service

D.

Platform as a Service

Buy Now
Question # 10

Tracking breach, credential exposure and insider fraud/theft alerts is an example of which continuous monitoring technique?

Options:

A.

Monitoring surface

B.

Vulnerabilities

C.

Passive and active indicators of compromise

D.

Business intelligence

Buy Now
Question # 11

Which capability is LEAST likely to be included in the annual testing activities for Business Continuity or Disaster Recovery plans?

Options:

A.

Plans to enable technology and business operations to be resumed at a back-up site

B.

Process to validate that specific databases can be accessed by applications at the designated location

C.

Ability for business personnel to perform their functions at an alternate work space location

D.

Require participation by third party service providers in collaboration with industry exercises

Buy Now
Question # 12

Which statement is FALSE regarding the methods of measuring third party risk?

Options:

A.

Risk can be measured both qualitatively and quantitatively

B.

Risk can be quantified by calculating the severity of impact and likelihood of occurrence

C.

Assessing risk impact requires an analysis of prior events, frequency of occurrence, and external trends to analyze and predict the potential of a particular event happening

D.

Risk likelihood or probability is a critical element in quantifying inherent or residual risk

Buy Now
Question # 13

Which statement is NOT a method of securing web applications?

Options:

A.

Ensure appropriate logging and review of access and events

B.

Conduct periodic penetration tests

C.

Adhere to web content accessibility guidelines

D.

Include validation checks in SDLC for cross site scripting and SOL injections

Buy Now
Exam Code: CTPRP
Exam Name: Certified Third-Party Risk Professional (CTPRP)
Last Update: Feb 5, 2025
Questions: 125
CTPRP pdf

CTPRP PDF

$29.75  $84.99
CTPRP Engine

CTPRP Testing Engine

$33.25  $94.99
CTPRP PDF + Engine

CTPRP PDF + Testing Engine

$47.25  $134.99