CCAK Exam Question 16

Your company is purchasing an application from a vendor. They do not allow you to perform an on-site audit on their information system. However, they say, they will provide the third-party audit attestation on the adequate control design within their environment. Which report is the vendor providing you?
  • CCAK Exam Question 17

    How should controls be designed by an organization?
  • CCAK Exam Question 18

    CCM: In the CCM tool, "Encryption and Key Management" is an example of which of the following?
  • CCAK Exam Question 19

    Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?
  • CCAK Exam Question 20

    When performing audits in relation to Business Continuity Management and Operational Resilience strategy, what would be the MOST critical aspect to audit in relation to the strategy of the cloud customer that should be formulated jointly with the cloud service provider?