Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

SHRM CTPRP Certified Third-Party Risk Professional (CTPRP) Exam Practice Test

Page: 1 / 13
Total 125 questions

Certified Third-Party Risk Professional (CTPRP) Questions and Answers

Question 1

Which statement is TRUE regarding the use of questionnaires in third party risk assessments?

Options:

A.

The total number of questions included in the questionnaire assigns the risk tier

B.

Questionnaires are optional since reliance on contract terms is a sufficient control

C.

Assessment questionnaires should be configured based on the risk rating and type of service being evaluated

D.

All topic areas included in the questionnaire require validation during the assessment

Question 2

Which requirement is NOT included in IT asset end-of-life (EOL) processes?

Options:

A.

The requirement to conduct periodic risk assessments to determine end-of-life

B.

The requirement to track status using a change initiation request form

C.

The requirement to track updates to third party provided systems or applications for any planned end-of-life support

D.

The requirement to establish defined procedures for secure destruction al sunset of asset

Question 3

Which statement does NOT reflect current practice in addressing fourth party risk or subcontracting risk?

Options:

A.

Third party contracts and agreements should require prior notice and approval for subcontracting

B.

Outsourcers should rely on requesting and reviewing external audit reports to address subcontracting risk

C.

Outsourcers should inspect the vendor's TPRM program and require evidence of the assessments of subcontractors

D.

Third party contracts should include capturing, maintaining, and tracking authorized subcontractors

Question 4

Which statement is TRUE regarding the onboarding process far new hires?

Options:

A.

New employees and contractors should not be on-boarded until the results of applicant screening are approved

B.

it is not necessary to have employees, contractors, and third party users sign confidentiality or non-disclosure agreements

C.

All job roles should require employees to sign non-compete agreements

D.

New employees and contactors can opt-out of having to attend security and privacy awareness training if they hold existing certifications

Question 5

During the contract negotiation process for a new vendor, the vendor states they have legal obligations to retain data for tax purposes. However, your company policy requires data

return or destruction at contract termination. Which statement provides the BEST approach to address this conflict?

Options:

A.

Determine if a policy exception and approval is required, and require that data safeguarding obligations continue after termination

B.

Change the risk rating of the vendor to reflect a higher risk tier

C.

Insist the vendor adheres to the policy and contract provisions without exception

D.

Conduct an assessment of the vendor's data governance and records management program

Question 6

In which phase of the TPRM lifecycle should terms for return or destruction of data be defined and agreed upon?

Options:

A.

During contract negotiation

B.

At third party selection and initial due diligence

C.

When deploying ongoing monitoring

D.

At termination and exit

Question 7

You are reviewing assessment results of workstation and endpoint security. Which result should trigger more investigation due to greater risk potential?

Options:

A.

Use of multi-tenant laptops

B.

Disabled printing and USB devices

C.

Use of desktop virtualization

D.

Disabled or blocked access to internet

Question 8

Which statement is FALSE regarding background check requirements for vendors or service providers?

Options:

A.

Background check requirements are not applicable for vendors or service providers based outside the United States

B.

Background checks should be performed prior to employment and may be updated after employment based upon criteria in HR policies

C.

Background check requirements should be applied to employees, contract workers and temporary workers

D.

Background check requirements may differ based on level of authority, risk, or job role

Question 9

Which statement is TRUE regarding artifacts reviewed when assessing the Cardholder Data Environment (CDE) in payment card processing?

Options:

A.

The Data Security Standards (DSS) framework should be used to scope the assessment

B.

The Report on Compliance (ROC) provides the assessment results completed by a qualified security assessor that includes an onsite audit

C.

The Self-Assessment Questionnaire (SAQ) provides independent testing of controls

D.

A System and Organization Controls (SOC) report is sufficient if the report addresses the same location

Question 10

Which of the following factors is LEAST likely to trigger notification obligations in incident response?

Options:

A.

Regulatory requirements

B.

Data classification or sensitivity

C.

Encryption of data

D.

Contractual terms

Question 11

You are updating the inventory of regulations that impact your TPRM program during the company's annual risk assessment. Which statement provides the optimal approach to

prioritizing the regulations?

Options:

A.

identify the applicable regulations that require an extension of specific obligations to service providers

B.

Narrow the focus only on the regulations that directly apply to personal information

C.

Include the regulations that have the greater risk of triggering enforcement or fines/penalties

D.

Emphasize the federal regulations since they supersede state regulations

Question 12

When conducting an assessment of a third party's physical security controls, which of the following represents the innermost layer in a ‘Defense in Depth’ model?

Options:

A.

Public internal

B.

Restricted entry

C.

Private internal

D.

Public external

Question 13

Physical access procedures and activity logs should require all of the following EXCEPT:

Options:

A.

Require multiple access controls for server rooms and data centers

B.

Require physical access logs to be retained indefinitely for audit purposes

C.

Record successful and unsuccessful attempts including investigation of unsuccessful access attempts

D.

Include a process to trigger review of the logs after security events

Question 14

Which factor in patch management is MOST important when conducting postcybersecurity incident analysis related to systems and applications?

Options:

A.

Configuration

B.

Log retention

C.

Approvals

D.

Testing

Question 15

Which policy requirement is typically NOT defined in an Asset Management program?

Options:

A.

The Policy states requirements for the reuse of physical media (e.9., devices, servers, disk drives, etc.)

B.

The Policy requires that employees and contractors return all company data and assets upon termination of their employment, contract or agreement

C.

The Policy defines requirements for the inventory, identification, and disposal of equipment “and/or physical media

D.

The Policy requires visitors (including other tenants and maintenance personnel) to sign-in and sign-out of the facility, and to be escorted at all times

Question 16

Which of the following is NOT an example of a type of application security testing?

Options:

A.

Cookie consent scanning

B.

Interactive testing

C.

Static testing

D.

Dynamic testing

Question 17

Which statement provides the BEST description of inherent risk?

Options:

A.

inherent risk is the amount of risk an organization can incur when there is an absence of controls

B.

Inherent risk is the level of risk triggered by outsourcing & product or service

C.

Inherent risk is the amount of risk an organization can accept based on their risk tolerance

D.

Inherent risk is the level of risk that exists with all of the necessary controls in place

Question 18

Which example BEST represents the set of restrictive areas that require an additional authentication factor for access control?

Options:

A.

Datacenters; telecom rooms; server rooms; exterior building entrance

B.

Datacenters; telecom rooms; security operations centers; loading docks

C.

Telecom rooms; parking garage; security operations centers; exterior building entrance

D.

Exterior building entrance; datacenters; telecom rooms; printer rooms

Question 19

Which statement is NOT an example of the purpose of internal communications and information sharing using TPRM performance metrics?

Options:

A.

To communicate the status of findings identified in vendor assessments and escalate issues es needed

B.

To communicate the status of policy compliance with TPRM onboarding, periodic assessment and off-boarding requirements

C.

To document the agreed upon corrective action plan between external parties based on the severity of findings

D.

To develop and provide periodic reporting to management based on TPRM results

Question 20

When updating TPRM vendor classification requirements with a focus on availability, which

risk rating factors provide the greatest impact to the analysis?

Options:

A.

Type of data by classification; volume of records included in data processing

B.

Financial viability of the vendor; ability to meet performance metrics

C.

Network connectivity; remote access to applications

D.

impact on operations and end users; impact on revenue; impact on regulatory compliance

Question 21

When evaluating compliance artifacts for change management, a robust process should include the following attributes:

Options:

A.

Approval, validation, auditable.

B.

Logging, approvals, validation, back-out and exception procedures

C.

Logging, approval, back-out.

D.

Communications, approval, auditable.

Question 22

Which example of analyzing a vendor's response should trigger further investigation of their information security policies?

Options:

A.

Determination that the security policies include contract or temporary workers

B.

Determination that the security policies do not specify any requirements for third party governance and oversight

C.

Determination that the security policies are approved by management and available to constituents including employees and contract workers

D.

Determination that the security policies are communicated to constituents including full and part-time employees

Question 23

Which statement is FALSE regarding the different types of contracts and agreements between outsourcers and service providers?

Options:

A.

Contract addendums are not sufficient for addressing third party risk obligations as each requirement must be outlined in the Master Services Agreement (MSA)

B.

Evergreen contracts are automatically renewed for each party after the maturity period, unless terminated under existing contract provisions

C.

Requests for Proposals (RFPs) for outsourced services should include mandatory requirements based on an organization's TPRM program policies, standards and procedures

D.

Statements of Work (SOWs) define operational requirements and obligations for each party

Question 24

Which capability is LEAST likely to be included in the annual testing activities for Business Continuity or Disaster Recovery plans?

Options:

A.

Plans to enable technology and business operations to be resumed at a back-up site

B.

Process to validate that specific databases can be accessed by applications at the designated location

C.

Ability for business personnel to perform their functions at an alternate work space location

D.

Require participation by third party service providers in collaboration with industry exercises

Question 25

Which of the following components is NOT typically included in external continuous monitoring solutions?

Options:

A.

Status updates on localized events based on geolocation

B.

Alerts on legal and regulatory actions involving the vendor

C.

Metrics that track SLAs for performance management

D.

Reports that identify changes in vendor financial viability

Question 26

Which statement provides the BEST example of the purpose of scoping in third party assessments?

Options:

A.

Scoping is used to reduce the number of questions the vendor has to complete based on vendor “classification

B.

Scoping is the process an outsourcer uses to configure a third party assessment based on the risk the vendor presents to the organization

C.

Scoping is an assessment technique only used for high risk or critical vendors that require on-site assessments

D.

Scoping is used primarily to limit the inclusion of supply chain vendors in third party assessments

Question 27

Which cloud deployment model is focused on the management of hardware equipment?

Options:

A.

Function as a service

B.

Platform as a service

C.

Software as a service

D.

Infrastructure as a service

Question 28

What attribute is MOST likely to be included in the software development lifecycle (SDLC) process?

Options:

A.

Scheduling the frequency of automated vulnerability scans

B.

Scanning for data input validation in production

C.

Conducting peer code reviews

D.

Defining the scope of annual penetration tests

Question 29

Which set of procedures is typically NOT addressed within data privacy policies?

Options:

A.

Procedures to limit access and disclosure of personal information to third parties

B.

Procedures for handling data access requests from individuals

C.

Procedures for configuration settings in identity access management

D.

Procedures for incident reporting and notification

Question 30

Tracking breach, credential exposure and insider fraud/theft alerts is an example of which continuous monitoring technique?

Options:

A.

Monitoring surface

B.

Vulnerabilities

C.

Passive and active indicators of compromise

D.

Business intelligence

Question 31

Which of the following actions reflects the first step in developing an emergency response plan?

Options:

A.

Conduct an assessment that includes an inventory of the types of events that have the greatest potential to trigger an emergency response plan

B.

Consider work-from-home parameters in the emergency response plan

C.

incorporate periodic crisis management team tabletop exercises to test different scenarios

D.

Use the results of continuous monitoring tools to develop the emergency response plan

Question 32

Which statement is TRUE regarding a vendor's approach to Environmental, Social, and Governance (ESG) programs?

Options:

A.

ESG expectations are driven by a company's executive team for internal commitments end not external entities

B.

ESG requirements and programs may be directed by regulatory obligations or in response to company commitments

C.

ESG commitments can only be measured qualitatively so it cannot be included in vendor due diligence standards

D.

ESG obligations only apply to a company with publicly traded stocks

Question 33

All of the following processes are components of controls evaluation in the Third Party Risk Assessment process EXCEPT:

Options:

A.

Reviewing compliance artifacts for the presence of control attributes

B.

Negotiating contract terms for the right to audit

C.

Analyzing assessment results to identify and report risk

D.

Scoping the assessment based on identified risk factors

Question 34

If a system requires ALL of the following for accessing its data: (1) a password, (2) a

security token, and (3) a user's fingerprint, the system employs:

Options:

A.

Biometric authentication

B.

Challenge/Response authentication

C.

One-Time Password (OTP) authentication

D.

Multi-factor authentication

Question 35

Which factor is the LEAST important attribute when classifying personal data?

Options:

A.

The volume of data records processed or retained

B.

The data subject category that identifies the data owner

C.

The sensitivity level of specific data elements that could identify an individual

D.

The assignment of a confidentiality level that differentiates public or non-public information

Question 36

The BEST way to manage Fourth-Nth Party risk is:

Options:

A.

Include a provision in the vender contract requiring the vendor to provide notice and obtain written consent before outsourcing any service

B.

Include a provision in the contract prohibiting the vendor from outsourcing any service which includes access to confidential data or systems

C.

Incorporate notification and approval contract provisions for subcontracting that require evidence of due diligence as defined by a TPRM program

D.

Require the vendor to maintain a cyber-insurance policy for any service that is outsourced which includes access to confidential data or systems

Question 37

The set of shared values and beliefs that govern a company’s attitude toward risk is known as:

Options:

A.

Risk tolerance

B.

Risk treatment

C.

Risk culture

D.

Risk appetite

Page: 1 / 13
Total 125 questions