Isaca CCAK Practice Test - Questions Answers, Page 10
List of questions
Question 91
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?
Explanation:
Reference: https://csf.tools/reference/cloud-controls-matrix/version-3-0-1/ivs/
Question 92
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following is a direct benefit of mapping the Cloud Control Matrix (CCM) to other international standards and regulations?
Explanation:
Reference: https://cloudsecurityalliance.org/press-releases/2021/03/15/cloud-security-alliance-releases-additional-mappingsupdate-to-cloud-controls-matrix-ccm-v4/
Question 93
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An auditor is performing an audit on behalf of a cloud customer. For assessing security awareness, the auditor should:
Question 94
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following would give an auditor the BEST view of design and implementation decisions when an organization uses programmatic automation for
Infrastructure as a Service (IaaS) deployments? The visibility of:
Question 95
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
If the degree of verification for information shared with the auditor during an audit is low, the auditor should:
Question 96
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What should be an organization's control audit schedule of a cloud service provider's business continuity plan and operational resilience policy?
Explanation:
Reference: https://www.isaca.org/why-isaca/about-us/newsroom/press-releases/2021/isaca-provides-guidance-around-euproposed-digital-operational-resilience-act
Question 97
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following would be a logical starting point for an auditor who has been engaged to assess the security of an organization's DevOps pipeline?
Explanation:
Reference: https://cntemngwa.medium.com/how-to-assess-and-audit-devops-security-to-improve-business-value-10e81a2a6fd5
Question 98
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following CSP activities requires a client's approval?
Question 99
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An organization has an ISMS implemented, following ISO 27001 and Annex A controls. The CIO would like to migrate some of the infrastructure to the cloud.
Which of the following standards would BEST assist in identifying controls to consider for this migration?
Explanation:
ISO/IEC 27017 standard defines the requirements for an information security management system (ISMS). Note that the entire organization is not necessarily affected by the standard, because it all depends on the scope of the ISMS. The scope could be limited by the provider to one group within an organization, and there is no guarantee that any group outside of the scope has appropriate ISMSs in place. It is up to the auditor to verify that the scope of the engagement is "fit for purpose." As the customer, you are responsible for determining whether the scope of the certification is relevant for your purposes.
Question 100
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
SAST testing is performed by:
Explanation:
SAST analyzes application code offline. SAST is generally a rules-based test that will scan software code for items such as credentials embedded into application code and a test of input validation, both of which are major concerns for application security.
Question