Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Information classification of personal information may trigger specific regulatory obligations. Which statement is the BEST response from a privacy perspective:

A.

Personally identifiable financial information includes only consumer report information

B.

Public personal information includes only web or online identifiers

C.

Personally identifiable information and personal data are similar in context, but may have different legal definitions based upon jurisdiction

D.

Personally Identifiable Information and Protected Healthcare Information require the exact same data protection safequards

The following statements reflect user obligations defined in end-user device policies

EXCEPT:

A.

A statement specifying the owner of data on the end-user device

B.

A statement that defines the process to remove all organizational data, settings and accounts alt offboarding

C.

A statement detailing user responsibility in ensuring the security of the end-user device

D.

A statement that specifies the ability to synchronize mobile device data with enterprise systems

Select the risk type that is defined as: “A third party may not be able to meet its obligations due to inadequate systems or processes”.

A.

Reliability risk

B.

Performance risk

C.

Competency risk

D.

Availability risk

Which statement is FALSE regarding analyzing results from a vendor risk assessment?

A.

The frequency for conducting a vendor reassessment is defined by regulatory obligations

B.

Findings from a vendor risk assessment may be defined at the entity level, and are based o na Specific topic or control

C.

Identifying findings from a vendor risk assessment can occur at any stage in the contract lifecycle

D.

Risk assessment findings identified by controls testing or validation should map back to the information gathering questionnaire and agreed upon framework

Which statement is NOT an example of the purpose of internal communications and information sharing using TPRM performance metrics?

A.

To communicate the status of findings identified in vendor assessments and escalate issues es needed

B.

To communicate the status of policy compliance with TPRM onboarding, periodic assessment and off-boarding requirements

C.

To document the agreed upon corrective action plan between external parties based on the severity of findings

D.

To develop and provide periodic reporting to management based on TPRM results

Which statement is NOT a method of securing web applications?

A.

Ensure appropriate logging and review of access and events

B.

Conduct periodic penetration tests

C.

Adhere to web content accessibility guidelines

D.

Include validation checks in SDLC for cross site scripting and SOL injections

A contract clause that enables each party to share the amount of information security risk is known as:

A.

Limitation of liability

B.

Cyber Insurance

C.

Force majeure

D.

Mutual indemnification

Which example of a response to external environmental factors is LEAST likely to be managed directly within the BCP or IT DR plan?

A.

Protocols for social media channels and PR communication

B.

Response to a natural or man-made disruption

C.

Dependency on key employee or supplier issues

D.

Response to a large scale illness or health outbreak

Which of the following is NOT a key component of TPRM requirements in the software development life cycle (SDLC)?

A.

Maintenance of artifacts that provide proof that SOLC gates are executed

B.

Process for data destruction and disposal

C.

Software security testing

D.

Process for fixing security defects

Which action statement BEST describes an assessor calculating residual risk?

A.

The assessor adjusts the vendor risk rating prior to reporting the findings to the business unit

B.

The assessor adjusts the vendor risk rating based on changes to the risk level after analyzing the findings and mitigating controls

C.

The business unit closes out the finding prior to the assessor submitting the final report

D.

The assessor recommends implementing continuous monitoring for the next 18 months