exam questions

Exam CCAK All Questions

View all questions & answers for the CCAK exam

Exam CCAK topic 1 question 226 discussion

Actual exam question from Isaca's CCAK
Question #: 226
Topic #: 1
[All CCAK Questions]

Which of the following can be used to determine whether access keys are stored in the source code or any other configuration files during development?

  • A. Static code review
  • B. Dynamic code review
  • C. Credential scanning
  • D. Vulnerability scanning
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Auditor2020
1 month, 2 weeks ago
Selected Answer: C
C. Credential scanning Credential scanning is a process used to automatically detect sensitive information, such as access keys, passwords, and other credentials, in source code, configuration files, and other artifacts during development. These tools are specifically designed to identify and flag instances where credentials may have been inadvertently included in files that should not contain them, helping to prevent security breaches and unauthorized access. While static code review (A) involves analyzing source code without executing it and can sometimes identify hardcoded credentials, credential scanning (C) is more specialized for this specific task. Dynamic code review (B) is not typically used for identifying stored credentials, as it involves analyzing the behavior of code during execution. Vulnerability scanning (D) is generally focused on identifying security vulnerabilities in deployed applications rather than checking for credentials in source code.
upvoted 1 times
...
339dfab
6 months, 3 weeks ago
It is C.
upvoted 1 times
...
4f2a581
9 months, 2 weeks ago
Selected Answer: C
CCAK Pg:353 Stored Credentials/Secrets Scanning
upvoted 1 times
...
Apsw2015
1 year ago
Its C, credential Scanning . A frequently occurring problem in security is the storage of credentials such as passwords and access keys in source code, or configuration or other files. This creates the risk that those credentials—which should never be shared—are exposed to people who do not have permission to access them. This could lead to the organization’s application or data being vulnerable. Credential scanning tools search source code for credentials to make sure they are not inadvertently checked in with code.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago