Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CTPRP Exam Dumps - Certified Third-Party Risk Professional (CTPRP)

Go to page:
Question # 9

Physical access procedures and activity logs should require all of the following EXCEPT:

A.

Require multiple access controls for server rooms and data centers

B.

Require physical access logs to be retained indefinitely for audit purposes

C.

Record successful and unsuccessful attempts including investigation of unsuccessful access attempts

D.

Include a process to trigger review of the logs after security events

Full Access
Question # 10

An IT change management approval process includes all of the following components EXCEPT:

A.

Application version control standards for software release updates

B.

Documented audit trail for all emergency changes

C.

Defined roles between business and IT functions

D.

Guidelines that restrict approval of changes to only authorized personnel

Full Access
Question # 11

Which of the following statements BEST represent the relationship between incident response and incident notification plans?

A.

Cybersecurity incident response programs have the same scope and objectives as privacy incident notification procedures

B.

All privacy and security incidents should be treated alike until analysis is performed to quantify the number of records impacted

C.

Security incident response management is only included in crisis communication for externally reported events

D.

A security incident may become a security breach based upon analysis and trigger the organization's incident notification or crisis communication process

Full Access
Question # 12

Which of the following actions reflects the first step in developing an emergency response plan?

A.

Conduct an assessment that includes an inventory of the types of events that have the greatest potential to trigger an emergency response plan

B.

Consider work-from-home parameters in the emergency response plan

C.

incorporate periodic crisis management team tabletop exercises to test different scenarios

D.

Use the results of continuous monitoring tools to develop the emergency response plan

Full Access
Question # 13

You are updating program requirements due to shift in use of technologies by vendors to enable hybrid work. Which statement is LEAST likely to represent components of an Asset

Management Program?

A.

Asset inventories should include connections to external parties, networks, or systems that process data

B.

Each asset should include an organizational owner who is responsible for the asset throughout its life cycle

C.

Assets should be classified based on criticality or data sensitivity

D.

Asset inventories should track the flow or distribution of items used to fulfill products and Services across production lines

Full Access
Question # 14

An organization has experienced an unrecoverable data loss event after restoring a system. This is an example of:

A.

A failure to conduct a Root Cause Analysis (RCA)

B.

A failure to meet the Recovery Time Objective (RTO)

C.

A failure to meet the Recovery Consistency Objective (RCO)

D.

A failure to meet the Recovery Point Objective (RPO)

Full Access
Question # 15

Which statement is TRUE regarding the use of questionnaires in third party risk assessments?

A.

The total number of questions included in the questionnaire assigns the risk tier

B.

Questionnaires are optional since reliance on contract terms is a sufficient control

C.

Assessment questionnaires should be configured based on the risk rating and type of service being evaluated

D.

All topic areas included in the questionnaire require validation during the assessment

Full Access
Question # 16

When working with third parties, which of the following requirements does not reflect a “Zero Trust" approach to access management?

A.

Utilizing a solution that allows direct access by third parties to the organization's network

B.

Ensure that access is granted on a per session basis regardless of network location, user, or device

C.

Implement device monitoring, continual inspection and monitoring of logs/traffic

D.

Require that all communication is secured regardless of network location

Full Access
Go to page: