Free CCAK Exam Braindumps (page: 28)

Page 27 of 78

As a developer building codes into a container in a DevSecOps environment, which of the following is the appropriate place(s) to perform security tests?

  1. Within developer’s laptop
  2. Within the CI/CD server
  3. Within version repositories
  4. Within the CI/CD pipeline

Answer(s): D



An organization that is utilizing a community cloud is contracting an auditor to conduct a review on behalf of the group of organizations within the cloud community. From the following, to whom should the auditor report the findings?

  1. Public
  2. Management of organization being audited
  3. Shareholders/interested parties
  4. Cloud service provider

Answer(s): D



Which of the following parties should have accountability for cloud compliance requirements?

  1. Customer
  2. Equally shared between customer and provider
  3. Provider
  4. Either customer or provider, depending on requirements

Answer(s): B



Which of the following data destruction methods is the MOST effective and efficient?

  1. Crypto-shredding
  2. Degaussing
  3. Multi-pass wipes
  4. Physical destruction

Answer(s): B


Reference:

https://man.fas.org/dod-101/sys/ship/weaps/degaussing.htm






Post your Comments and Discuss ISACA CCAK exam with other Community members:

CCAK Discussions & Posts