ISC2 Governance, Risk and Compliance (CGRC) Practice Question

A federal agency deploying a legacy application discovers the software cannot support the FIPS-validated encryption required by SC-13 (Cryptographic Protection) in the NIST SP 800-53 moderate baseline. Which action would serve as an effective compensating control to meet the intent of SC-13 while allowing the system to operate?

  • Place a reverse proxy that terminates all client connections using a FIPS 140-validated TLS module, then forwards traffic to the legacy application on an isolated internal network.

  • Increase vulnerability scanning of the legacy server from quarterly to monthly to identify unencrypted traffic more quickly.

  • Depend on existing badge-controlled physical access to the data center to prevent unauthorized interception of network traffic.

  • Postpone the system's Authorization to Operate until the vendor releases a FIPS-compliant version and document the delay in the POA&M.

ISC2 Governance, Risk and Compliance (CGRC)
Implementation of Security and Privacy Controls
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot