Common information security questionnaire shortcomings, best practices in properly deploying one, when to use one and information security questionnaire suggestions.