ExamGecko
Question list
Search
Search

Question 619 - CISM discussion

Report
Export

Which of the following is the PRIMARY purpose of an acceptable use policy?

A.
To provide steps for carrying out security-related procedures
Answers
A.
To provide steps for carrying out security-related procedures
B.
To facilitate enforcement of security process workflows
Answers
B.
To facilitate enforcement of security process workflows
C.
To protect the organization from misuse of information assets
Answers
C.
To protect the organization from misuse of information assets
D.
To provide minimum security baselines for information assets
Answers
D.
To provide minimum security baselines for information assets
Suggested answer: C

Explanation:

The PRIMARY purpose of an acceptable use policy is to protect the organization from misuse of information assets, such as data, hardware, software, and network resources, by defining the rules and expectations for the authorized and appropriate use of these assets by the users. An acceptable use policy helps to prevent or reduce the risks of security breaches, legal liabilities, reputational damage, or loss of productivity that may result from unauthorized, inappropriate, or unethical use of information assets.

Reference=

CISM Review Manual, 16th Edition, ISACA, 2020, p. 74: ''An acceptable use policy is a policy that establishes an agreement between users and the enterprise that defines, for all parties, the ranges of use that are approved before gaining access to a network or the Internet.''

The essentials of an acceptable use policy - Infosec Resources: ''An Acceptable Use Policy (henceforward mentioned as 'AUP') is agreement between two or more parties to a computer network community, expressing in writing their intent to adhere to certain standards of behaviour with respect to the proper usage of specific hardware & software services.''

Acceptable use policy template - Workable: ''This Acceptable Use Policy sets the minimum requirements for the use of our company's IT resources, including computers, networks, devices, software, and internet. It aims to protect our company and our employees from harm and liability, and to ensure that our IT resources are used appropriately, productively, and securely.''

asked 01/10/2024
Calvin Bolico
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first