최신 CTPRP 무료덤프 - Shared Assessments Certified Third-Party Risk Professional (CTPRP)
During an audit, it is found that an employee has breached the end-user device policy by installing unauthorized software. What is the most likely consequence according to standard policy?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Scenario: An organization is conducting an audit of its IT assets. During the audit, it's discovered that several assets are not in compliance with the latest security standards. What should the asset owner's first action be?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
The RPO is defined as the maximum ________ in which data loss is acceptable during a disaster recovery.
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A company implements strict procedures for wiping disk drives before disposal. What asset management practice does this represent?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Who is primarily responsible for ensuring a third-party meets their contractual obligations?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Effective security and privacy training programs for service provider employees focus on preventing ________.
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Scenario: An organization experiences a malware attack that disrupts its services. According to the Information Security Incident Management Program, what actions should be taken to manage this incident?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
In the context of a Business Impact Analysis (BIA), why would an organization not require vendor participation in the impact analysis phase?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which regulatory standard requires the use of multi-factor authentication to protect data?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Imagine a scenario where a company conducts a BIA following a significant disruption due to a natural disaster. The analysis focuses on identifying the effects on operations and customer service, and determining the financial consequences, including lost sales and increased expenses. What does this scenario primarily highlight about the BIA?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Who should data privacy policies identify as responsible for data protection oversight?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
How does escorting visitors throughout their visit enhance facility security?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)