Page 1 of 2

Quiz: Cyber-risk through 3rd party vendors

1. Which of the following is not considered a third party?

1. Which of the following is not considered a third party?
A
B
C
D

2. Which of the following is not a typical vendor security question?

2. Which of the following is not a typical vendor security question?
A
B
C
D

3. Why is third party cyber risk important?

3. Why is third party cyber risk important?
A
B
C
D

4. You have narrowed down to 2 choices of a third party vendor to work with. How would you make the selection if you are concerned about security?

4. You have narrowed down to 2 choices of a third party vendor to work with. How would you make the selection if you are concerned about security?
A
B
C
D

5. What should you do if your third party vendor informs you of a breach that has occurred in their systems?

5. What should you do if your third party vendor informs you of a breach that has occurred in their systems?
A
B
C
D

6. You have shortlisted 3 third party vendors to help with a scope of work that involves critical customer data and shared your company’s Technology & Risk Management (TRM) documentation with them. The vendors are requesting over 3 weeks of time to answer whether or not they comply with everything in your TRM but your project is urgent and you need to select a vendor and get them to start work by this week. What should you do?

6. You have shortlisted 3 third party vendors to help with a scope of work that involves critical customer data and shared your company’s Technology & Risk Management (TRM) documentation with them. The vendors are requesting over 3 weeks of time to answer whether or not they comply with everything in your TRM but your project is urgent and you need to select a vendor and get them to start work by this week. What should you do?
A
B
C
D

7. What are the most common reasons for third party breaches?

7. What are the most common reasons for third party breaches?
A
B
C
D

8. What is an example of privilege misuse?

8. What is an example of privilege misuse?
A
B
C
D

9. What are the main components of costs in a data breach?

9. What are the main components of costs in a data breach?
A
B
C
D

10. Which of the following specify a way of calculating the costs of a data breach?

10. Which of the following specify a way of calculating the costs of a data breach?
A
B
C
D