New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 5 Question 44 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 44
Topic #: 5
[All ISSEP Questions]

A security policy is an overall general statement produced by senior management that dictates what

role security plays within the organization. Which of the following are required to be addressed in a

well designed policy? Each correct answer represents a part of the solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

A security policy is an overall general statement produced by senior management (or a selected

policy board or committee) that dictates what

role security plays within the organization.

A well designed policy addresses the following:

What is being secured? - Typically an asset.

Who is expected to comply with the policy? - Typically employees.

Where is the vulnerability, threat, or risk? - Typically an issue of integrity or responsibility.


Contribute your Thoughts:

0/2000 characters
Rikki
4 months ago
Isn't it obvious that we need to address vulnerabilities?
upvoted 0 times
...
Lajuana
4 months ago
I think identifying threats is super important too.
upvoted 0 times
...
Jackie
4 months ago
Compliance is key! Everyone should know the rules.
upvoted 0 times
...
Daniel
4 months ago
Wait, who would exploit the vulnerability? That seems off.
upvoted 0 times
...
Huey
5 months ago
Definitely need to know what is being secured!
upvoted 0 times
...
Belen
5 months ago
I’m a bit confused about option D. I don’t think the policy should focus on who exploits vulnerabilities, right? That seems off.
upvoted 0 times
...
Kattie
5 months ago
I feel like we covered the importance of identifying vulnerabilities and risks in our last practice exam. So, option C might be a key part of the policy.
upvoted 0 times
...
Bernardo
5 months ago
I’m not entirely sure, but I remember something about compliance being important too. Maybe option B is correct?
upvoted 0 times
...
Kimberlie
5 months ago
I think we discussed that a security policy should definitely address what is being secured. That seems fundamental.
upvoted 0 times
...
Georgiana
5 months ago
Hmm, I'm a bit unsure about this one. I'll have to think it through carefully. Maybe I can visualize how the projection changes as the latitude of origin shifts.
upvoted 0 times
...
Kirk
5 months ago
Hmm, this one seems straightforward. I think I'll go with option A - entering the MAC address in the correct Endpoint Identity Group.
upvoted 0 times
...

Save Cancel