ISC2 Governance, Risk and Compliance (CGRC) Practice Question

While implementing controls for a new cloud-based financial reporting system (RMF Step 3), the team finds the hosting provider's hypervisor cannot support the mandated FIPS 140-3 validated encryption module. To keep the project on schedule and remain compliant, what is the MOST appropriate next action?

  • Suspend the implementation project entirely until the provider upgrades the platform to support the required FIPS-validated module.

  • Select and deploy a compensating control-such as establishing a host-based IPSec tunnel that uses a FIPS-validated module-and document the rationale in the system security plan and POA&M.

  • Request that the Authorizing Official grant a risk acceptance so the system can operate without any encryption control until hardware is replaced.

  • Proceed with deployment using the hypervisor's native (non-validated) encryption and note the issue for future consideration in the next upgrade cycle.

ISC2 Governance, Risk and Compliance (CGRC)
Implementation of Security and Privacy Controls
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot