Which of the following would be a logical starting point for an auditor who has been engaged to assess the security of an organization’s DevOps pipeline?
Answer(s): C
https://cntemngwa.medium.com/how-to-assess-and-audit-devops-security-to-improve- businessvalue-10e81a2a6fd5
Which of the following are the three MAIN phases of the cloud controls matrix (CCM) mapping methodology?
Answer(s): D
https://docplayer.net/153476370-Methodology-for-the-mapping-of-the-cloud-controls-matrixccm.html (page 5)
A large organization with subsidiaries in multiple locations has a business requirement to organize IT systems to have identified resources reside in particular locations with organizational personnel. Which access control method will allow IT personnel to be segregated across the various locations?
Answer(s): A
Which of the following is the MOST feasible way to validate the performance of CSPs for the delivery of technology resources?
Post your Comments and Discuss ISACA CCAK exam with other Community members:
ccak commented on June 08, 2023 ccak is hard Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the CCAK content, but please register or login to continue.