Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CCAK All Questions

View all questions & answers for the CCAK exam

Exam CCAK topic 1 question 226 discussion

Actual exam question from Isaca's CCAK
Question #: 226
Topic #: 1
[All CCAK Questions]

Which of the following can be used to determine whether access keys are stored in the source code or any other configuration files during development?

  • A. Static code review
  • B. Dynamic code review
  • C. Credential scanning
  • D. Vulnerability scanning
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
339dfab
4 weeks, 1 day ago
It is C.
upvoted 1 times
...
4f2a581
3 months, 2 weeks ago
Selected Answer: C
CCAK Pg:353 Stored Credentials/Secrets Scanning
upvoted 1 times
...
Apsw2015
6 months, 3 weeks ago
Its C, credential Scanning . A frequently occurring problem in security is the storage of credentials such as passwords and access keys in source code, or configuration or other files. This creates the risk that those credentials—which should never be shared—are exposed to people who do not have permission to access them. This could lead to the organization’s application or data being vulnerable. Credential scanning tools search source code for credentials to make sure they are not inadvertently checked in with code.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...