ISC2 Governance, Risk and Compliance (CGRC) Practice Question

While reviewing the initial security assessment report, you learn that the organization's on-premises payroll application runs on an obsolete operating system that is no longer supported by the vendor and cannot be adequately isolated from the internal network. Which risk response most closely reflects an "avoid" strategy in this situation?

  • Record the vulnerability in the risk register and continue operating the application until budget becomes available.

  • Purchase a cyber-liability insurance policy to cover potential losses if the legacy system is compromised.

  • Keep the application but implement strict network segmentation and weekly vulnerability scans as compensating controls.

  • Decommission the legacy system and migrate payroll processing to a supported, vendor-managed SaaS platform.

ISC2 Governance, Risk and Compliance (CGRC)
Assessment/Audit of Security and Privacy Controls
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot