The PRIMARY objective of an audit initiation meeting with a cloud audit client is to:
Answer(s): C
Policies and procedures shall be established, and supporting business processes and technical measures implemented, for maintenance of several items ensuring continuity and availability of operations and support personnel. Which of the following controls BEST matches this control description?
Answer(s): A
https://www.sapidata.sm/img/cms/CAIQ_v3-1_2020-01-13.pdf (2)
An auditor identifies that a CSP received multiple customer inquiries and RFPs during the last month. Which of the following should be the BEST recommendation to reduce the CSP burden?
Answer(s): D
https://cloudsecurityalliance.org/star/registry/
Which of the following approaches encompasses social engineering of staff, bypassing of physical access controls and penetration testing?
Answer(s): B
https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/planning-for-informationsecurity-testinga-practical-approach
When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?
Post your Comments and Discuss ISACA CCAK exam dumps with other Community members: