Free CCAK Exam Braindumps (page: 25)

Page 25 of 78

To ensure that integration of security testing is implemented on large code sets in environments where time to completion is critical, what form of validation should an auditor expect?

  1. Parallel testing
  2. Full application stack unit testing
  3. Regression testing
  4. Functional verification

Answer(s): B


Reference:

https://www.sciencedirect.com/topics/computer-science/black-box-testing



One of the Cloud Control Matrix’s (CCM?s) control specifications states that ?Independent reviews and assessments shall be performed at least annually to ensure that the organization addresses nonconformities of established policies, standards, procedures, and compliance obligations.? Which of the following controls under the Audit Assurance and Compliance domain does this match to?

  1. Audit planning
  2. Information system and regulatory mapping
  3. GDPR auditing
  4. Independent audits

Answer(s): B



In the context of Infrastructure as a Service (IaaS), a vulnerability assessment will scan virtual machines to identify vulnerabilities in:

  1. both operating system and application infrastructure contained within the CSP’s instances.
  2. both operating system and application infrastructure contained within the customer’s instances
  3. only application infrastructure contained within the CSP’s instances.
  4. only application infrastructure contained within the customer’s instances.

Answer(s): C



When building a cloud governance model, which of the following requirements will focus more on the cloud service provider’s evaluation and control checklist?

  1. Security requirements
  2. Legal requirements
  3. Compliance requirements
  4. Operational requirements

Answer(s): D



Page 25 of 78



Post your Comments and Discuss ISACA CCAK exam with other Community members:

ccak commented on June 08, 2023
ccak is hard
Anonymous
upvote