ISC2 Governance, Risk and Compliance (CGRC) Practice Question

Your team is implementing NIST SP 800-53 controls on a legacy SCADA network. The security baseline calls for FIPS-validated full-disk encryption to satisfy control SC-28 (Protection of Information at Rest), but the controllers cannot support that capability. Which compensating measure best preserves confidentiality of stored data while remaining feasible on the platform?

  • Install an endpoint detection and response agent on each SCADA server to identify malware and anomalous behavior.

  • Implement role-based access control and file-level encryption of sensitive data using an approved algorithm, with keys protected in a hardware security module.

  • Mirror all SCADA traffic to a central SIEM for real-time alerting and long-term log retention.

  • Conduct quarterly penetration tests and vulnerability scans against the SCADA segment to uncover exploitable weaknesses.

ISC2 Governance, Risk and Compliance (CGRC)
Implementation of Security and Privacy Controls
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot