Which of the following is MOST important to consider when developing an effective threat model during the introduction of a new SaaS service into a customer organization’s architecture? The threat model:
Answer(s): A
While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?
Answer(s): C
https://www.isaca.org/resources/isaca-journal/issues/2020/volume-1/is-audit-basics-thecomponents-of-the-it-audit-report
To qualify for CSA STAR attestation for a particular cloud system, the SOC 2 report must cover:
https://downloads.cloudsecurityalliance.org/star/attestation/GuidelinesforCPAsv2.pdf (8)
Which of the following is MOST important to consider when an organization is building a compliance program for the cloud?
When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer to review which cloud services will be deployed?
https://www.isaca.org/credentialing/certificate-of-cloud-auditing-knowledge
Post your Comments and Discuss ISACA CCAK exam dumps with other Community members:
Anonymous Commented on June 01, 2025 Question 7 is A. Integrity breach page. 237 of CCAK study guide UNITED STATES
anonymous Commented on June 01, 2025 question 8 is B avoid duplication of work when assessing compliance. check page 142 of CCAK study guide UNITED STATES
anonymous Commented on June 01, 2025 answer in 20 is A check page 346 in CCAK study guide UNITED STATES
anonymous Commented on June 01, 2025 question 15 answer should be B. CIA UNITED STATES
anonymous Commented on June 01, 2025 answer on number 17 should be D. SaaS. check page 163 of CCAK study guide UNITED STATES
chuchay Commented on May 27, 2025 very useful and helpful! UNITED STATES
chuchay Commented on May 26, 2025 CCAK IS HARD UNITED STATES
ccak Commented on June 08, 2023 ccak is hard Anonymous