New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 5 Question 51 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 51
Topic #: 5
[All ISSMP Questions]

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Show Suggested Answer Hide Answer
Suggested Answer: C

Monitoring the computer hard disks or e-mails of employees pertains to the privacy policy of an organization.

Answer option B is incorrect. The backup policy of a company is related to the backup of its data.

Answer option A is incorrect. The network security policy is related to the security of a company's network.

Answer option D is incorrect. The user password policy is related to passwords that users provide to log on to the network.


Contribute your Thoughts:

0/2000 characters
Wade
4 months ago
Not sure, could it be a backup policy too?
upvoted 0 times
...
Alpha
4 months ago
Totally agree, privacy policy makes the most sense here.
upvoted 0 times
...
Precious
4 months ago
Wait, they can really monitor our hard disks?
upvoted 0 times
...
Hannah
4 months ago
I think it's more about network security.
upvoted 0 times
...
Tyisha
4 months ago
This is definitely related to the privacy policy.
upvoted 0 times
...
Melina
5 months ago
User password policy doesn't fit at all, so I guess it has to be either privacy or network security. I'm leaning towards privacy.
upvoted 0 times
...
Kerrie
5 months ago
I feel like this could also touch on the backup policy, but that doesn't seem quite right for monitoring hard disks.
upvoted 0 times
...
Skye
5 months ago
I remember a practice question about monitoring systems, and it was linked to network security policy. That could be relevant here too.
upvoted 0 times
...
Brock
5 months ago
I think this might relate to the privacy policy since it involves monitoring employee data, but I'm not entirely sure.
upvoted 0 times
...
Heidy
5 months ago
I'm a little confused by the wording of some of these options. I'll need to make sure I understand the key concepts of Strict Priority before selecting my answers.
upvoted 0 times
...
Donte
5 months ago
This seems straightforward to me. The two key considerations are choosing the appropriate monitoring tools and understanding the customer's priorities. If I can nail those, I should be able to simplify the development process and meet the requirements.
upvoted 0 times
...
Harris
5 months ago
I'm not entirely sure, but clicks on the pop-up could also tell us if people find it useful or just annoying.
upvoted 0 times
...
Geraldine
5 months ago
Okay, I've got this. A VPN encrypts and tunnels traffic, but it doesn't actually monitor the traffic at the network's edge. I'll select the correct answer.
upvoted 0 times
...

Save Cancel