ISC2 Governance, Risk and Compliance (CGRC) Practice Question

While drafting the System Security Plan (SSP) for a new cloud-hosted customer relationship management (CRM) platform, the security team has to show exactly which hardware, software, data stores, and network connections are inside the system's authorization boundary so that assessors will not expand the scope later. Which single artifact will most clearly communicate that in-scope versus out-of-scope separation?

  • A table mapping the platform's planned security controls to NIST SP 800-53 control families

  • A comprehensive data-flow diagram that traces each transaction between the CRM and external services

  • A catalog of potential future CRM modules planned for post-authorization deployment

  • An authorization boundary diagram that shows every CRM component and all internal and external interfaces

ISC2 Governance, Risk and Compliance (CGRC)
Scope of the System
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot