Isaca CCAK Practice Test - Questions Answers, Page 10
List of questions
Related questions
Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?
Which of the following is a direct benefit of mapping the Cloud Control Matrix (CCM) to other international standards and regulations?
An auditor is performing an audit on behalf of a cloud customer. For assessing security awareness, the auditor should:
Which of the following would give an auditor the BEST view of design and implementation decisions when an organization uses programmatic automation for
Infrastructure as a Service (IaaS) deployments? The visibility of:
If the degree of verification for information shared with the auditor during an audit is low, the auditor should:
What should be an organization's control audit schedule of a cloud service provider's business continuity plan and operational resilience policy?
Which of the following would be a logical starting point for an auditor who has been engaged to assess the security of an organization's DevOps pipeline?
Which of the following CSP activities requires a client's approval?
An organization has an ISMS implemented, following ISO 27001 and Annex A controls. The CIO would like to migrate some of the infrastructure to the cloud.
Which of the following standards would BEST assist in identifying controls to consider for this migration?
SAST testing is performed by:
Question