New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM ISO-IEC-LI Exam - Topic 1 Question 51 Discussion

Actual exam question for GAQM's ISO-IEC-LI exam
Question #: 51
Topic #: 1
[All ISO-IEC-LI Questions]

What is the greatest risk for an organization if no information security policy has been defined?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Peggie
4 months ago
I disagree, A is not the main issue, it's all about D for me.
upvoted 0 times
...
Javier
4 months ago
Surprised that people think C is a risk, too many measures can be a good thing!
upvoted 0 times
...
Francesco
4 months ago
B sounds right, security can't just be a few people's job.
upvoted 0 times
...
Veda
4 months ago
I think D is the biggest risk, consistency is key!
upvoted 0 times
...
Tiara
4 months ago
Definitely A, no accountability means chaos.
upvoted 0 times
...
Jesus
5 months ago
I think the answer might be that it leads to chaos in security implementation, but I could be mixing it up with another topic we covered.
upvoted 0 times
...
Dominque
5 months ago
I feel like this question is similar to one we practiced about accountability in security. If there's no policy, tracking actions becomes a nightmare.
upvoted 0 times
...
Graham
5 months ago
I’m not entirely sure, but I think the biggest risk is that without a policy, security measures might not be applied uniformly.
upvoted 0 times
...
Lashandra
5 months ago
I remember discussing how a lack of a security policy can lead to inconsistent practices across the organization.
upvoted 0 times
...
Xuan
5 months ago
Customer Group seems like the best answer, but I'm a bit unsure since the other option mentions "Dynamic Block Type" which also sounds relevant.
upvoted 0 times
...
Kaitlyn
5 months ago
Hmm, I'm not sure about the "remove the option to display alias" one. That seems like it might impact the functionality of the form rather than just performance.
upvoted 0 times
...
Myra
5 months ago
Hmm, I'm a bit confused by the different options here. I'm not sure I fully understand how some of these techniques work to disguise a buffer overflow attack. I'll need to review my notes on network security before attempting this.
upvoted 0 times
...

Save Cancel