Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Certified Third-Party Risk Professional (CTPRP)

Last Update 21 hours ago Total Questions : 125

The Certified Third-Party Risk Professional (CTPRP) content is now fully updated, with all current exam questions added 21 hours ago. Deciding to include CTPRP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CTPRP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CTPRP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Third-Party Risk Professional (CTPRP) practice test comfortably within the allotted time.

Question # 4

Which example BEST represents the set of restrictive areas that require an additional authentication factor for access control?

A.

Datacenters; telecom rooms; server rooms; exterior building entrance

B.

Datacenters; telecom rooms; security operations centers; loading docks

C.

Telecom rooms; parking garage; security operations centers; exterior building entrance

D.

Exterior building entrance; datacenters; telecom rooms; printer rooms

Question # 5

Which approach for managing end-user device security is typically used for lost or stolen company-owned devices?

A.

Remotely enable lost mode status on the device

B.

Deletion of data after a pre-defined number of failed login attempts

C.

Enterprise wipe of all company data and contacts

D.

Remote wipe of the device and restore to factory settings

Question # 6

Which activity BEST describes conducting due diligence of a lower risk vendor?

A.

Accepting a service providers self-assessment questionnaire responses

B.

Preparing reports to management regarding the status of third party risk management and remediation activities

C.

Reviewing a service provider's self-assessment questionnaire and external audit report(s)

D.

Requesting and filing a service provider's external audit report(s) for future reference

Question # 7

Which statement does NOT reflect current practice in addressing fourth party risk or subcontracting risk?

A.

Third party contracts and agreements should require prior notice and approval for subcontracting

B.

Outsourcers should rely on requesting and reviewing external audit reports to address subcontracting risk

C.

Outsourcers should inspect the vendor's TPRM program and require evidence of the assessments of subcontractors

D.

Third party contracts should include capturing, maintaining, and tracking authorized subcontractors

Question # 8

Which of the following statements is FALSE about Data Loss Prevention Programs?

A.

DLP programs include the policy, tool configuration requirements, and processes for the identification, blocking or monitoring of data

B.

DLP programs define the consequences for non-compliance to policies

C.

DLP programs define the required policies based on default tool configuration

D.

DLP programs include acknowledgement the company can apply controls to remove any data

Question # 9

Which of the following factors is LEAST likely to trigger notification obligations in incident response?

A.

Regulatory requirements

B.

Data classification or sensitivity

C.

Encryption of data

D.

Contractual terms

Question # 10

An IT change management approval process includes all of the following components EXCEPT:

A.

Application version control standards for software release updates

B.

Documented audit trail for all emergency changes

C.

Defined roles between business and IT functions

D.

Guidelines that restrict approval of changes to only authorized personnel

Go to page: