CPE Qualifying Assessment Module (1-7) Please add www.3prinstitute-qa.com to your Safe Senders list /175 C3PRMP Qualifying Assessment - Modules (1-7) 1) Your company has outsourced its call center to a third-party and they are changing telecom providers. What is the relationship your company has with the third party’s telecom provider? A) A third party relationship B) A “non-vendor” third party relationship C) A fourth party relationship 2) Which of the following services is infrequently outsourced to a third party? A) Call center B) Internal Audit C) Financial transaction processing 3) Third party relationships are: A) Your company’s contracted partners only B) Your company’s vendors and other relationships that are not those as your customer C) Your company’s customers 4) Ransomware is: A) A sophisticated piece of malware that blocks the victim’s access to his/her files until a ransom is paid, typically in an “untraceable” form such as Bitcoin or cash B) A sophisticated form of extortion where the hacker blackmails the company or target by threatening to publicly reveal confidential or private information C) A sophisticated way to launder money, virtually undetectable by lawmakers 5) 12. ISO 27001, a high-level framework, helps companies establish a set of Information Security Management Standards (ISMS) to guide development and implementation of a framework for managing the security of their information assets, including: A) Financial information, intellectual property, information entrusted to them by customers, and third parties B) Security posture, protection of confidential information and intellectual property C) Regulatory requirements, protection of financial assets and information entrusted to them by customers 6) Which of the following third party risk management activities is commonly performed by the 1st Line of Defense? A) Risk reporting B) Managing performance C) Evaluating the effectiveness of the third party’s controls 7) The type and amount of third party risk that remains after taking into consideration the strength of the third party’s control environment is called: A) Risk exposure B) Inherent risk C) Residual risk 8) NPPI stands for: A) Non-public personal information B) No personal or public information C) No personal information or intellectual property 9) Is “one size fits all” approach to third party risk management effective? A) Yes, technology enables a risk-adjusted approach B) No, it misaligns exposure to risk and work effort C) Yes, the three Lines of Defense have different roles and responsibilities 10) The purpose of third party due diligence is to: A) Identify required controls B) Verify facts and evaluate controls C) Communicate business needs 11) How does mass digitization of records increase operational risk? A) Digital records are more portable than paper records, making them hard to trace if they are lost or stolen B) Large volumes of confidential data stored in digital formats are high value assets that can be sold on the dark web or used for identify-theft, making them the primary target of hackers C) Digital records stored in third party cloud solutions are less secure than those stored in onsite servers 12) What is an important “lesson learned” from serious information security breaches experienced by a large, reputable third parties? A) Due diligence addresses key risks B) Well-known, trusted companies with a solid reputation can still experience a serious information security breach C) Their failure to respond appropriately can affect the market value of the company 13) What is the difference between an incident and an issue? A) Incidents require immediate attention while issues are typically systemic, becoming evident over time B) Issues require immediate attention while incidents are typically systemic, becoming evident over time C) These two terms are interchangeable 14) Any serious misalignment between risk control functions, processes and risk taxonomy will: A) Frustrate the business while creating gaps, overlaps, and missed opportunities B) Justify increased investment in risk management professionals C) Lead to fines and other penalties 15) Which of the following is typically not in scope for third party cyber and information security due diligence? A) Whether access is strictly on a need to know basis, including for the third party’s sub-contractors, your company’s material 4th parties B) Whether they use multi-factor authentication C) Their technology and new products road map 16) The most challenging “pane” to address in Johari’s Window is: A) You don’t know what you know B) You know what you don’t know C) You don’t know what you don’t know 17) Which type of controls could be imposed to offset deficiencies in the third party’s controls and/or immature risk management capabilities in the contracting business unit? A) Compensating B) Residual C) Strong 18) The lifecycle of a third party relationship begins with identifying a business need that will be fulfilled by a third-party and ends with __________. A) Execution of the contingency plan B) Execution of the exit strategy C) Execution of due diligence and contracting 19) A performance curve in a third party contract that provides a significant increase in the value of incentive payouts following a relatively small increase in performance level is typically: A) Low risk B) Moderate risk C) High risk 20) Which of the following makes the greatest contribution to effective performance management of critical third parties? A) Concise Service and Operating Level agreements B) Policies, processes and tools C) Strategic Business Reviews 21) Why are “point of sale” technologies especially vulnerable? A) Ease of compromising the hardware B) They aren’t networked devices, so they are secure C) Software bugs 22) To be useful, risk taxonomy - a common language to identify, classify, understand and communicate risks - must be: A) Recorded in a risk register B) Understandable, consistent and communicated effectively C) Approved by the board 23) What is the most efficient way to enable comprehensive third party risk reporting? A) Documented procedures B) An enterprise-wide risk register C) A third-party risk management technology solution 24) Accounting for third party vendor services are recorded as _______ on a company’s Income Statement? A) Expenses B) Liabilities C) Intangible assets 25) To fulfill their responsibilities to customers, shareholders and the board, senior management must have: A) Detailed Key Risk Indicators (KRIs) B) Timely and accurate risk information and insight C) An enterprise risk management function 26) Internal risk management controls within market-dominant third parties are always: A) Standardized B) Variable in terms of their strength C) Strong 27) What is the most important “lesson learned” from the story about “Larry’s Laptop”? A) You may not know where your company’s confidential data is being stored B) Remote access to your company’s network and systems may not always be secure C) The days of contracting with a third party that lacks a strong risk culture and has serious controls deficiencies is over, regardless of their expertise 28) Which type of risk is your company exposed to in the following case study?“Your third party’s senior leadership team is experiencing a period of rapid turnover” A) Operational Risk B) Financial Risk C) Strategic Risk 29) When assessing exposure to third party risk, which of the following assessments is subjective? A) Financial B) Operational C) Reputational 30) In the Cloud, identity management, security and compliance: A) can be controlled with the same rigor as any technology B) are much more difficult to manage than other technologies C) are less difficult to manage than other technologies 31) FCPA is an acronym for: A) Federal Consumer Privacy Act B) Federal Compliance Protection Act C) Foreign Corrupt Practices Act 32) The type and amount of third party risk that your company assumes by entering in a relationship with a third party before evaluating the strength of the third party’s controls is called: A) Residual risk B) Inherent risk C) Controls risk 33) Governance practices may not be as critically dependent on direct expenditures as they are on the ability of management, boards, audit committees and internal auditors to work together to properly focus oversight attention, and larger banks have an edge in focusing that attention more efficiently.” Collectively, these practices are referred to as: A) Tone at the Top B) Risk Tolerance C) Strategic risk 34) DDOS (Distributed Denial of Service) attack occurs when: A) A malicious hacker or group of hackers takes control of internet-connected devices and launches many thousands of requests for service to a website in an attempt to overwhelm it and shut it down B) A company falls victim to a Zero Day hacker, exposing them to an undetected breach that shuts down their network C) A serious failure by a critical third party disrupts delivery of products or services to its customers 35) ____________ third parties are out of scope for most third party risk management programs A) Low risk, low spend B) Monopolistic C) Publicly traded, AAA rated 36) Transparency and predictability are key indicators of effective: A) Risk management practices B) Due diligence C) Risk reporting 37) For greater clarity about the importance and risks of each relationship and easy comparison of risks across your portfolio of critical third party relationships, effective third party risk management programs separate third parties into Tiers, according to: A) Criticality and ease of replacement B) Criticality and contingency C) Criticality and inherent risks 38) Unexpected events of such magnitude and consequence that they have a dominant role in history are called: A) Black Swans B) Systemic events C) Natural disasters, including earthquakes and floods 39) BIA’s should consider: A) Contractual controls in third party contracts B) The impact of legal and regulatory requirements C) ISO 22301 standards 40) What is the most important lesson learned by the Equifax breach? A) Train staff on the threat of phishing emails B) Homeland Security should have notified the public sooner C) Third party software should be subjected to the same degree of due diligence as any other third party relationship 41) The best KRIs enable business leaders and risk managers with an opportunity to __________ significant third party risks that are expected to become incidents or losses, before they happen? A) Identify B) Classify C) Action 42) A company's Risk Appetite is: A) The organization's readiness to bear the risk after risk treatment in order to achieve its objectives, expressed in quantitative terms B) The desired amount, type and level of risk that an organization is prepared to accept, linked to expected returns C) The norms or traditions of behaviors that determine the way they identify, understand and act on the risk the organization takes 43) Which of the following is an intangible asset? A) Inventory B) Land C) Trademark 44) The weakest link in your company’s defensive perimeter is A) Your critical third parties’ control environment B) Your employees’ and critical third party’s mobile devices C) Both A and B 45) A “risk-centric” third party lifecycle management framework: A) Promotes risk culture B) Takes a risk-based approach C) Has a well-defined RACI 46) A copy of the third party’s ISO 22301 Certificate of Compliance that covers contracted services could be an efficient and effective substitute for: A) Establishing a hot back up site B) Developing a Contingency Plan C) Conducting your own due diligence 47) Deficiencies in the third party’s controls identified during due diligence may be mitigated by : A) Residual controls B) Inherent controls C) Compensating controls 48) An information or cyber security event is: A) a deficiency in information and cyber security risk detection, prevention, and management B) a discrete set of electronic information resources organized for the collection, processing, maintenance, use, sharing, dissemination or disposition of electronic information, C) any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on the Information System. 49) Effective risk management, and therefore effective third-party risk management, is strongest in which type of corporate culture? A) Hierarchical B) Risk-centric C) Aligned 50) In relative terms, getting a cold back up site and a hot back up site up and running will take A) The same length of time B) A hot back up site will take longer to get up and running than a cold back up site C) A cold back up site will take longer to get up and running than a hot back up site 51) A third party relationship is: A) Any business relationship between your company and another person or entity, except as your customer, where monies are exchanged B) Any business relationship between your company and another person or entity C) Any business relationship between your company and another person or entity, except as your customer, regardless of whether monies are exchanged 52) The difference and relationship between assurance and other monitoring activities is clarified by the: A) Risk Appetite Statement B) Risk committee of the board C) Three Lines of Defense model 53) Internal Audit provides independent assurance to ________________ concerning the effectiveness of third party risk management and controls A) Senior management B) The board C) Both A and B 54) To be effective, a core principle of “controllable” metrics in an effective Service Level Agreement is that: A) the third party has the ability to control the outcome B) the contracting company has the ability to control the outcome C) both parties agree on the controls to be measured 55) A framework widely used by global companies to help them protect against, prepare for, respond to, and recover from disruptive incidents is: A) BIA B) ISO 22301 C) FFIEC 56) The most common source of vulnerability to a successful cyber-attack is: A) Failure to conduct penetration testing at least annually B) Insider threat C) Weak physical security controls 57) “Tone at the Top” is a term that has been widely adopted to describe A) The role of the board and senior management B) Appropriate business behaviors that align with a strong risk management culture C) The basis for senior management compensation 58) Computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware are examples of: A) Software bugs B) Malware C) Encryption 59) To fulfill their fiduciary duties, boards must: A) Review risk oversight policies and procedures at the board and committee levels B) Navigate organizational growth while protecting the organization from unnecessary risk C) Both A and B 60) The core role of Internal Audit in ERM is to: A) Verify and report on compliance to regulations and laws B) Provide objective assurance to senior management on the effectiveness of risk management policies and practices C) Provide objective assurance to the board on the effectiveness of risk management policies and practices 61) In a well-designed RACI matrix, if there is more than one designated Responsible party for a specific task there is a need to “zoom in” further detail on the sub process associated with “obtain resource commitment” to: A) name each Responsible party B) separate the individual responsibilities C) seek approval to proceed 62) In the event that one of your company’s third parties suffers a catastrophic failure, which course of action is often the least feasible? A) Take over the third party’s operations B) Contract with an alternative third party C) Rely on the third party’s insurer to fund resumption of operations 63) Spyware is not used to: A) Spread computer viruses B) Monitor activity on infected computers while users are on line C) Make it appear that the user clicked an advertising link on a site to fraudulently generate payment from the advertiser 64) The COSO Internal Control – Integrated Framework is used to: A) Manage risk and control to accomplish objectives B) Set the organization's objectives C) Design the organizational structure to execute risk and control duties 65) A third party relationship of such importance that a serious incident or failure would affect most or all of company operations and customers is typically referred to as: A) Enterprise/Mission critical B) High residual risk C) SOX reportable 66) Privacy laws are enacted to: A) Protect corporations from class action lawsuits B) codify the reasonable expectation that their customers’ confidential, proprietary information is safeguarded C) reinforce board members’ accountability to the company’s customers and shareholders 67) A client-specific business continuity or disaster recovery plan is: A) Included within the scope and pricing of most third party contracts B) A legal and regulatory requirement for critical services in most jurisdictions C) A special service that results in incremental pricing/costs 68) A structured, consistent and continuous framework across the whole organization for identifying, assessing and deciding on responses to and reporting on opportunities and threats that affect the achievement of its objectives is: A) Enterprise Risk Management (ERM) B) Operational Risk Management (ORM) C) Third Party Risk Management (3PRM) 69) Business line should not approve their ______? A) Exceptions to approved Risk Tolerances B) Third party Service Level Agreements C) Risk reporting to senior management 70) What was the most likely cause for Johnson + Johnson to observe possible damage to their reputation or loss of public trust? A) Change to key technologies B) Change to consumer spending habits C) Change to the nature of products sold 71) Which Line of Defense is the domain of a company’s risk specialists? A) 1st Line of defense B) 2nd Line of defense C) 3rd Line of defense 72) Effective risk management, and therefore effective third-party risk management, is strongest in which type of corporate culture? A) Hierarchical B) Risk-centric C) Aligned 73) Your company and its third parties by formally defining expectations and agreeing on specific requirements is which type of agreement? A) Service Level Agreement B) Operating Level Agreement C) Controls Level Agreement 74) In which stage of a third-party’s lifecycle do manufacturers typically excel? A) Managing and monitoring operational inputs and performance B) Getting to contract C) Orderly termination and exit 75) Which one of the following is used to control third party risks? A) A sound contract B) Due diligence C) Site visit 76) Which of the following is an indicator of strong incident management practices? A) A process for conducting root cause analysis post-incident B) Operational risk management policies C) A process for orderly termination and exit 77) The primary responsibility of Internal Audit in disaster recovery planning is to A) Participate in developing an enterprise-wide Disaster Recovery Plan B) Ensure the company’s Disaster Recovery Plan has been approved by senior management C) Include the Disaster Recovery Plan within the scope of business unit’s audit 78) Which function owns the third-party relationship and the risks? A) The business unit in the 1st Line of Defense B) Procurement C) Senior management 79) The most challenging “pane” to address in Johari’s Window is: A) You don’t know what you know B) You know what you don’t know C) You don’t know what you don’t know 80) If it was permissible to record a critical third party relationship as an asset, what type of asset would it be? A) Tangible B) Intangible C) Contingent 81) Due Diligence is which type of third party risk management tool? A) Productivity B) Financial assessment C) Verification and analysis 82) Management adopts and implements policies and procedures designed to promote both legal compliance and appropriate standards of honesty, integrity and ethics that are established by: A) Regulators B) The board C) Laws 83) The most effective cyber and information security due diligence is: A) Standardized with automated controls evaluation and risk ratings processes, delivering consistent information and risk ratings across the portfolio of third parties B) Outsourced to a third party with specialized expertise C) Standardized, with quantitative and qualitative controls evaluation processes that leverage expertise and judgement while improving consistency across your portfolio of third parties 84) An important contribution to third party risk management made by Internal Audit is to: A) Develop methodologies and define required controls B) Conduct independent evaluation of controls effectiveness for critical third parties C) Assess the effectiveness of the third party risk management program 85) The risk thresholds that are aligned with each KRI should be clearly aligned with your company’s: A) Risk Management Framework B) Risk Tolerance C) Risk Appetite 86) To assess the potential impact a third party has on your company’s business resilience you should periodically review A) The third party’s business continuity plan testing activities B) The third party’s management information systems (MIS) reports C) Both A and B 87) What is the primary cause of privacy breaches? A) Human error B) Hackers C) Failure to store data appropriately 88) What does a company’s “Risk Tolerance” define? A) How much risk the company is comfortable taking on B) How much risk the third party presents to the company C) How the risk the company is actually willing to take on 89) An important characteristic of any critical third party relationship is: A) Could cause significant customer impacts if the third party fails to meet expectations B) Cost to replace/switch is in excess of $100,000. USD C) Annual contract value is in excess of $1,000,000. USD 90) If a third-party has access to your network or information assets, or if your company accesses a third-party’s services via their web-portal, consider negotiating contractual obligations that: A) require two-factor authentication and strong passwords with pre-scheduled changes B) limit access to your company’s data to a “need to know” basis C) require annual security training for employees 91) The simplest way to aggregate third party risks is to: A) Report them by business unit B) Align them with Risk Appetite C) Organize them according to a hierarchy 92) Tying compensation to the actions of employees and senior management should promote: A) The company’s reputation B) The company’s risk culture and accountability for results C) Compliance to the Code of Conduct 93) The nature and depth of third party due diligence should be proportional with: A) Criticality and inherent risks B) Criticality and residual risks C) Key risk indicators 94) At a minimum, well written information and cyber security policies should address: A) Data classification; offsite storage; change management processes B) Data classification; asset inventory and device management; access controls and identity management C) Access controls and identity management; security awareness training; incident response plan 95) How is a strong risk culture most effectively expressed within any company? A) A clear Risk Appetite Statement on the company’s website B) The decisions, actions and behaviors of senior leadership C) A requirement for employees’ to annually attest to their compliance with the company’s Code of Conduct 96) The inter-related set of ISO standards for cyber and information security are specifically designed to: A) Specify the requirements for establishing, implementing, maintaining and continually improving an information security management system B) Ensure your company meets or exceeds national and international regulations and laws C) Enable collaboration on best practices between cyber and information security experts 97) The third party risk management framework should align with the corporate: A) Operational risk management framework B) Enterprise risk management framework C) Both A and B 98) A key indicator of third party information and cyber security risk is: A) Transaction processing in the third party’s offshore data center B) Access to your company’s confidential data, regardless of whether the data is in transit or at rest (stored) C) The third party’s use of material 4th parties (subcontractors) to deliver contracted services 99) Site visits are recommended for A) All third parties with access to systems and networks B) All offshore third parties C) The most critical and/or high-risk relationships 100) “IoT” The Internet of Things are: A) portal-enabled devices that interact with one another via internet-based applications B) devices with RFID tags or embedded chips that intentionally interact with one another, and with people as required, via internet-based applications. C) devices with RFID tags or embedded chips that can only interact with one another via networked systems 101) Collectively, the risk management responsibilities of senior management and the board are referred to as? A) Fiduciary B) Risk-centric C) Compliance-related 102) Another name for a “risk map” is a A) Key risk indicator B) Heat map C) Risk model 103) What is a significant and recent change in practices related to oversight of third-party risk? A) Risk committees of the board B) Creation of third-party risk oversight committees C) Risk acceptance by the business unit 104) In-depth risk business continuity management risk assessments should be conducted for: A) The third-party “finalist” – the one you want to engage B) All third parties that responded to your “go to market” process (RFP, invitation to bid, etc.) C) Third and fourth parties 105) A Risk and Control Self-Assessment (RCSA) is: A) A process through which third party risks are identified and assessed B) A process through which operational risks and the effectiveness of controls are assessed and examined. C) A process through which senior management and the board establish the risk culture of the organization 106) All companies need to define the goals and objectives related to Strategic, Financial, Reputational and Operational risk management. What is a common approach for accomplishing this? A) Developing an Enterprise Risk Management framework B) Developing an Operational Risk Management framework C) Developing an Independent Challenge framework 107) The third party relationship is “critical” to the company and/or the business if: A) The contract requires senior management and board approval B) There would be a significant impact to day-to-day business operations and/or customers should the third party be unable to perform C) The third party relationship delivers innovation and untried technologies 108) A process/tool that focuses on specific events or processes, compares measures and results using common metrics, and identifies improvement opportunities is: A) Benchmarking B) Controls evaluation C) Risk rating 109) The most effective way to eliminate third party risks is to: A) Outsource the risks to the third party B) Comply with regulations and laws C) You can never eliminate third party risk 110) Trend analysis can identify opportunities: A) to improve the third-party risk management B) to determine whether third party risk is increasing, decreasing or stable C) both A and B 111) The findings from a completed Risk Control Self-Assessment (RCSA) can be used: A) As input to third party trend analysis and senior management reporting B) To assess the business unit’s knowledge of third party controls C) To formulate appropriate action plans to address identified control gaps 112) A standard of comparison of third party risks that is comprised of definitions and rating levels that enable consistent interpretation by different constituencies is: A) Tiering B) A defined scale for rating risks C) Criticality 113) Cyber risk management is how precious assets such as financial assets, and re-saleable information and intellectual property are protected from: A) accidental destruction or loss B) duplication or inaccuracy C) unauthorized electronic access, use, changes, or destruction 114) If the third party is unable to meet your company’s expectations and/or control requirements, possible next steps include: A) Contractually binding the third party to make appropriate changes within a specific time frame B) Sourcing an alternate third party that can meet your control requirements C) Both A and B 115) A risk management strategy where your company contracts with more than one third party to spread the risk may: A) Increase your pricing B) Increase your lifecycle management, governance and oversight costs C) A and B 116) A Disaster Recovery Plan is a detailed description of: A) How services will be restored, timing and order in which they’ll be restored B) Whether services can be restored in an orderly manner C) A list of critical third party relationships and the services/products contracted for 117) Actionable service-level agreements are primarily used to manage the third party’s: A) Compliance with regulations and laws B) Performance C) Implementation plan 118) Which Line of Defense owns the third party relationship and its risks? A) 1st Line of defense B) 2nd Line of defense C) 3rd Line of defense 119) Open and candid communications throughout the organization, clear lines of authority and responsibility and transparency are key elements of: A) A strong risk culture B) A Risk Appetite Statement C) Key Risk Indicators (KRIs) 120) A Metric that determines which third party risks will be measured, how they will be measured, and the frequency of measurement is a: A) Key Risk Indicator B) Risk Appetite C) Risk tolerance 121) A best practice for business continuity management is: A) Negotiating SLAs for availability of services, including RTOs and order in which services are restored B) Negotiating a “change of control” clause into the contract C) Negotiating participation in the third party’s annual BIA 122) Which of the following are particularly important for effective risk reporting for senior management? A) Policies and procedures B) Overseeing all revenue generating businesses C) Actual, emerging and potential risks 123) The majority of companies that paid a ransom as a result of a Malware attack did not report the incident to law enforcement due to: A) Inability to recover the ransom paid to the hacker because the funds are untraceable (Bitcoin, cash) B) Did not want to publicize the incident C) Fear of reprisal by the hacker in the form of another attack 124) Which is one of the most important responsibilities that senior management has to create and maintain a strong risk culture? A) Approving policies and procedures B) Establishing and modeling “tone at the top” C) Auditing the effectiveness of third party risk management capabilities 125) Which of the following is an example of a separation of duties? A) Requiring a relationship management plan B) Requiring a 2nd signature on financial transactions C) Requiring a reporting structure 126) Risk assessment is often performed as a two-stage process. An initial screening of the risks and opportunities is performed using qualitative techniques followed by: A) An onsite review B) Quantitative treatment of the most important risks C) Identification of key performance indicators 127) What is one of the most serious outcomes of a serious third party cyber security breach? A) Fines B) Legal action C) Damage to your company’s reputation 128) After implementing a third party risk management program, cycle time - the time it takes to complete third party due diligence, controls evaluation and contracting – is typically: A) Longer, due to more comprehensive risk assessments B) Shorter, due to more efficient processes C) Unchanged 129) Systemic issues are: A) An unmanaged opportunity to reduce risk across an industry sector B) A serious deficiency in third party controls over their network security C) Ineffective third party controls over employee access to confidential data 130) An analytical method that consists of an expert opinion of the likelihood of a risk event occurring based on a set of known variables that can be used to determine the probability of each risk event occurring is called: A) Qualitative analysis B) Quantitative analysis C) Risk segmentation 131) The Financial Accounting Standards Board (FASB) recognizes the long-term value of intangible assets that have indefinite useful lives. How frequently should their value be tested for impairment? A) Annually B) Every six months C) Every five years 132) In a weighted risk rating methodology, an important benefit of isolating criticality of the third party relationship is to: A) Implement targeted controls B) Free up more “points” to allocate to risk C) Weight residual risks 133) The best defense against a successful Ransomware attack, one where the company has no feasible alternative to paying the hacker’s ransom, is: A) Employee education, designed to prevent “insider” threats B) A complete and current backup of the targeted records C) Multi-factor authentication for all users 134) Designating a high proportion of your company’s critical third party relationships as “high risk” results in A) Stronger risk-informed decisions B) Too much “noise”, interfering with risk insight C) A low Risk Appetite 135) In which of the following scenarios is it not advisable to proceed with the third party relationship? A) There is high criticality and low residual risk B) There is moderate criticality and a high value proposition C) There is high residual risk and a low value proposition 136) Which function(s) is responsible for establishing Tone at Top? A) Third Party Risk Management program office B) Senior management and the board C) 2nd Line of Defense 137) Specific and measurable Service Level Agreements benefit: A) Your company B) The third party C) Both parties 138) A documented plan that defines the preferred course of action in the event of a serious business interruption or failure, where recovery by the third party is in serious doubt or not expected, is a A) Business Continuity Plan B) Contingency Plan C) Business Continuity Management System 139) Value from any third party relationship is a function of: A) Risk Appetite B) Risk and return C) Control 140) What defines a company’s tolerance for accepting third party risks to ensure it is aligned with their Risk Appetite? A) Risk Tolerance B) Risk Thresholds C) Risk Management Framework 141) The primary role of the board is to: A) Directly manage risks B) Oversee management and corporate issues that affect risk C) Approve Key Risk Indicators 142) A third party information security risk event is is more likely to occur and has a higher impact than insurance risk, so would be given ____________ in a risk evaluation model. A) A lower value B) A higher value C) A critical value 143) Contract provisions should clearly state that the primary third party has accountability for: A) all services that the third party provides, including business continuity capabilities B) all services that the third party and its subcontractors provide, including business continuity capabilities C) providing a copy of the results of business continuity resiliency testing 144) A common challenge that companies face when creating methodologies that enable consistent interpretation of third party risk by different constituencies is A) Finding the right balance between simplicity and comprehensiveness B) Reporting to senior management and the board C) Complying with regulations and laws 145) The use of a cloud service provider typically means that: A) Senior management must approve the contract prior to implementation B) The relationship is critical to the company and/or the business unit C) The relationship is within the scope of the third party risk management program 146) An effective tool for providing assurance of compliance with policies, plans, procedures, laws, regulations and contracts is a: A) RACI B) RCSA C) SMART 147) Which of these is often the weakest link in a company’s defenses? A) The firewall B) Inadequate controls C) Risk culture 148) The nature and amount of residual risk in a third party relationship can only be determined when: A) Risks are segmented, and the relationship has been tiered B) Due diligence is complete, contractual terms finalized, and internal controls established C) Inherent risks have been mitigated 149) Cyber criminals were most likely to unleash ransomware using: A) insecure websites B) phishing C) A and B: phishing and insecure websites 150) During third party due diligence, risk control experts should request A) SOC 2 reports B) Only information that’s needed and can be evaluated C) Copies of in-scope policies 151) Third party risk that your company accepts after analyzing the third party’s controls over those risks is called: A) Inherent risk B) Risk Appetite C) Residual risk 152) What is the best course of action to determine the effectiveness of third party due diligence, evaluation, controls, processes and tools? A) Conducting root cause analysis on third party issues and incidents B) Conducting root cause analysis on deficiencies in third party controls C) By monitoring third party compliance 153) Requiring the third-party to outsource deficient services to another company A) Decreases your risk B) Improves risk visibility C) Increases your risk 154) What is the main lesson that can be learned from engaging with social media/traditional media? A) Privacy laws protect consumers when they are engaged with social/traditional media B) That anything spoken, actioned or written down could unexpectedly turn up in some form of social or traditional media C) With sound privacy controls negotiated into contracts, a third party’s use of social/traditional media presents minimal risk 155) What is a third-party risk management cost driver? A) A standard equation that translates third party risk into costs B) Fees for third party services C) Any activity or series of activities to identify, assess, manage and control risk throughout the lifetime of the relationship 156) U.S. Sarbanes-Oxley Act specifically stipulates that senior management has personal liability for: A) Third party issues and incidents B) The accuracy and completeness of financial statements C) Information and cyber security breaches 157) For core functions, a Disaster Recovery Readiness Assessment Audit should be conducted A) Annually B) Quarterly C) Monthly 158) Using Johari’s window, in which “pane” would your company’s business requirements reside in a Request for Proposal for a new third party relationship? A) 1st pane – You know what you know B) 2nd pane – You know what you don’t know C) 3rd pane – You don’t know what you know 159) During third party due diligence, requesting details of physical security controls, including for visitors and contractors, is: A) A best practice B) Not required C) Protected information 160) Which step(s) in the third party lifecycle must be completed before risk experts can confidently define controls that are required for a critical third party? A) Risk identification and analysis B) Monitoring C) Trend analysis 161) An example of systemic third party Concentration Risk is: A) Many companies offering the same services to the same target customers B) Many companies concurrently deploying the same or similar new third party technologies C) Many companies in the same industry using the same third party in the same location 162) Risk-Based Authentication: A) detects anomalies or changes in the normal use patterns of a person B) requires verification of the person’s identity when anomalies or changes are detected, such as “challenge” questions C) A and B: detects anomalies or changes in the normal use patterns of a person AND requires verification of the person’s identity when anomalies or changes are detected, such as “challenge” questions 163) Which type of third party risk is described in the following case study?“One of your critical third party’s employees secretly recorded one of their senior executives harassing one of your customers, and the video went viral” A) Operational B) Compliance C) Reputational 164) The best type of back-up site for critical services, those that would have a high impact if there is an outage or serious interruption is a: A) Cold site B) Hot site C) DR site 165) How are a company’s Risk Appetite and Risk Tolerances tied together? A) By setting key performance indicators based on the company’s strategic direction B) By setting risk thresholds or limits based on the company’s business and the impact of exposure to risk C) In the company’s Annual Report to shareholders 166) Which of the following is one of the most important benefits of a third-party risk management program? A) Accelerates response and resolution to a serious third party incident B) Minimizes insider threats C) Defined roles and responsibilities 167) A framework that helps define the role of the board and management, delineates duties and helps prevent duplicated efforts and the overlooking of critical issues is called a ____________ framework: A) Enterprise Risk Management B) Third Party Risk Management C) Governance 168) A disadvantage of qualitative assessments of third party risks is that it: A) Gives limited differentiation between levels of risk B) Is very time consuming C) Requires defined units of measure 169) Inherent risk is ________________ the critical services delivered by the third party. A) Separable from B) Inseparable from C) Incremental to 170) To increase monitoring effectiveness, management should periodically rank third party relationships according to risk to determine: A) which third parties require closer monitoring B) risk management capabilities within the 1st Line of Defense C) controls effectiveness 171) The BIA should identify: A) The potential impact of outsourcing a critical function to a third party B) The potential impact of inadequate third party due diligence C) The potential impact of uncontrolled, non-specific events on these business functions and processes 172) When Internal Audit’s role extends beyond its core role/purpose, it should be: A) In a consultative role B) As a decision maker C) As a risk domain expert 173) Which type of risk is your company exposed to in the following case study?“Your third party is left without electrical power as a result of a serious fire” A) Reputational B) Operational C) Strategic 174) An important responsibility of third party risk oversight committees is a willingness to: A) Challenge the company’s Risk Appetite B) Challenge their peers when they are prepared to accept undue third party risks C) Challenge the company’s KRI’s 175) A process that is useful for assessing third party risks and tying them back to strategic objectives is: A) Scenario analysis B) Contingency planning C) Risk modelling Your score is 0% Restart quiz