Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CTPRP Exam Dumps - Certified Third-Party Risk Professional (CTPRP)

Go to page:
Question # 17

An outsourcer's vendor risk assessment process includes all of the following EXCEPT:

A.

Establishing risk evaluation criteria based on company policy

B.

Developing risk-tiered due diligence standards

C.

Setting remediation timelines based on the severity level of findings

D.

Defining assessment frequency based on resource capacity

Full Access
Question # 18

An IT asset management program should include all of the following components EXCEPT:

A.

Maintaining inventories of systems, connections, and software applications

B.

Defining application security standards for internally developed applications

C.

Tracking and monitoring availability of vendor updates and any timelines for end of support

D.

Identifying and tracking adherence to IT asset end-of-life policy

Full Access
Question # 19

Which of the following indicators is LEAST likely to trigger a reassessment of an existing vendor?

A.

Change in vendor location or use of new fourth parties

B.

Change in scope of existing work (e.g., new data or system access)

C.

Change in regulation that impacts service provider requirements

D.

Change at outsourcer due to M&A

Full Access
Question # 20

Which of the following BEST reflects components of an environmental controls testing program?

A.

Scheduling testing of building access and intrusion systems

B.

Remote monitoring of HVAC, Smoke, Fire, Water or Power

C.

Auditing the CCTV backup process and card-key access process

D.

Conducting periodic reviews of personnel access controls and building intrusion systems

Full Access
Question # 21

When conducting an assessment of a third party's physical security controls, which of the following represents the innermost layer in a ‘Defense in Depth’ model?

A.

Public internal

B.

Restricted entry

C.

Private internal

D.

Public external

Full Access
Question # 22

Which vendor statement provides the BEST description of the concept of least privilege?

A.

We require dual authorization for restricted areas

B.

We grant people access to the minimum necessary to do their job

C.

We require separation of duties for performance of high risk activities

D.

We limit root and administrator access to only a few personnel

Full Access
Question # 23

Which statement is TRUE regarding artifacts reviewed when assessing the Cardholder Data Environment (CDE) in payment card processing?

A.

The Data Security Standards (DSS) framework should be used to scope the assessment

B.

The Report on Compliance (ROC) provides the assessment results completed by a qualified security assessor that includes an onsite audit

C.

The Self-Assessment Questionnaire (SAQ) provides independent testing of controls

D.

A System and Organization Controls (SOC) report is sufficient if the report addresses the same location

Full Access
Question # 24

Which activity BEST describes conducting due diligence of a lower risk vendor?

A.

Accepting a service providers self-assessment questionnaire responses

B.

Preparing reports to management regarding the status of third party risk management and remediation activities

C.

Reviewing a service provider's self-assessment questionnaire and external audit report(s)

D.

Requesting and filing a service provider's external audit report(s) for future reference

Full Access
Go to page: