Quiz: Cyber-risk through 3rd party vendors
1. Which of the following is not considered a third party?
Untitled multiple choice field
2. Which of the following is not a typical vendor security question?
Untitled multiple choice field
3. Why is third party cyber risk important?
Untitled multiple choice field
4. You have narrowed down to 2 choices of a third party vendor to work with. How would you make the selection if you are concerned about security?
Untitled multiple choice field
5. What should you do if your third party vendor informs you of a breach that has occurred in their systems?
Untitled multiple choice field
6. You have shortlisted 3 third party vendors to help with a scope of work that involves critical customer data and shared your company’s Technology & Risk Management (TRM) documentation with them. The vendors are requesting over 3 weeks of time to answer whether or not they comply with everything in your TRM but your project is urgent and you need to select a vendor and get them to start work by this week. What should you do?
Untitled multiple choice field
7. What are the most common reasons for third party breaches?
Untitled multiple choice field
8. What is an example of privilege misuse?
Untitled multiple choice field
9. What are the main components of costs in a data breach?
Untitled multiple choice field
10. Which of the following specify a way of calculating the costs of a data breach?
Untitled multiple choice field