The PRIMARY objective of an audit initiation meeting with a cloud audit client is to:
Answer(s): C
Policies and procedures shall be established, and supporting business processes and technical measures implemented, for maintenance of several items ensuring continuity and availability of operations and support personnel. Which of the following controls BEST matches this control description?
Answer(s): A
https://www.sapidata.sm/img/cms/CAIQ_v3-1_2020-01-13.pdf (2)
An auditor identifies that a CSP received multiple customer inquiries and RFPs during the last month. Which of the following should be the BEST recommendation to reduce the CSP burden?
Answer(s): D
https://cloudsecurityalliance.org/star/registry/
Which of the following approaches encompasses social engineering of staff, bypassing of physical access controls and penetration testing?
Answer(s): B
https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/planning-for-informationsecurity-testinga-practical-approach
When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?
Post your Comments and Discuss ISACA CCAK exam dumps with other Community members:
Anonymous Commented on June 01, 2025 Question 7 is A. Integrity breach page. 237 of CCAK study guide UNITED STATES
anonymous Commented on June 01, 2025 question 8 is B avoid duplication of work when assessing compliance. check page 142 of CCAK study guide UNITED STATES
anonymous Commented on June 01, 2025 answer in 20 is A check page 346 in CCAK study guide UNITED STATES
anonymous Commented on June 01, 2025 question 15 answer should be B. CIA UNITED STATES
anonymous Commented on June 01, 2025 answer on number 17 should be D. SaaS. check page 163 of CCAK study guide UNITED STATES
chuchay Commented on May 27, 2025 very useful and helpful! UNITED STATES
chuchay Commented on May 26, 2025 CCAK IS HARD UNITED STATES
ccak Commented on June 08, 2023 ccak is hard Anonymous