ISC2 Governance, Risk and Compliance (CGRC) Practice Question
While drafting the audit plan for a cloud-hosted payroll application, you must determine whether employees' salary data will be protected by encryption as it moves between the web front end, application programming interface (API) layer, and backend database. Which system document will give the clearest view of these data transfer paths and trust boundaries?
Data flow diagram depicting the application's processes and data stores
Physical rack elevation diagram for the data center equipment
Standard operating procedure for incident response escalation
Server build and hardening checklist for the Linux images
A data flow diagram illustrates how information moves among processes, data stores, and external entities. Because it highlights where data is created, transmitted, and stored, auditors can pinpoint trust boundaries and identify where encryption or other controls must be applied. Rack elevation diagrams show physical equipment placement, not logical data movement. Incident-response procedures describe steps after an event, not normal data flows. Server build or hardening checklists focus on configuration details for a single host, offering little insight into inter-component data exchanges.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a data flow diagram (DFD) and why is it important for auditing?
Open an interactive chat with Bash
What are trust boundaries in the context of a data flow diagram?
Open an interactive chat with Bash
How does encryption ensure security during data transfers in a cloud application?
Open an interactive chat with Bash
What is a data flow diagram (DFD) and why is it useful?
Open an interactive chat with Bash
What are trust boundaries in a system, and why are they important?
Open an interactive chat with Bash
How does encryption help secure data in a cloud-hosted application?
Open an interactive chat with Bash
What is a data flow diagram (DFD) and why is it important?
Open an interactive chat with Bash
What are trust boundaries in a system, and why are they significant in a DFD?
Open an interactive chat with Bash
How does encryption work in securing data across trust boundaries?
Open an interactive chat with Bash
ISC2 Governance, Risk and Compliance (CGRC)
Assessment/Audit of Security and Privacy Controls
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .