ISC2 Governance, Risk and Compliance (CGRC) Practice Question

While completing security documentation for a federal information system, you find control AC-2 (Account Management) is only partially implemented until a directory service upgrade next quarter. To ensure the gap is tracked, in which document should you record the weakness, planned corrective actions, required resources, responsible parties, and target completion dates before submitting the authorization package?

  • System Security Plan (SSP)

  • Plan of Action and Milestones (POA&M)

  • Configuration Management Plan (CMP)

  • Continuous Monitoring Strategy

ISC2 Governance, Risk and Compliance (CGRC)
Implementation of Security and Privacy Controls
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot