ISC2 Governance, Risk and Compliance (CGRC) Practice Question

During a security control assessment, you discover that system administrators produce configuration screenshots while you simultaneously export the device's running configuration file. To ensure the evidence can support audit findings, which action should you take next before closing the evidence collection activity?

  • Request additional artifacts from administrators to strengthen the body of evidence for the same control.

  • Log the screenshots and configuration file in the assessment evidence register, noting the related control identifiers and collection details.

  • Generate a cryptographic hash of each artifact to prove they were not altered after collection.

  • Encrypt both artifacts and upload them to the secure audit repository for long-term retention.

ISC2 Governance, Risk and Compliance (CGRC)
Assessment/Audit of Security and Privacy Controls
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot