ISACA CCAK Exam Practice Questions (P. 3)
- Full Access (325 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which of the following is MOST important to consider when developing an effective threat model during the introduction of a new SaaS service into a customer organization’s architecture? The threat model:
- Arecognizes the shared responsibility for risk management between the customer and the CSP.
- Bleverages SaaS threat models developed by peer organizations.
- Cis developed by an independent third-party with expertise in the organization’s industry sector.
- Dconsiders the loss of visibility and control from transitioning to the cloud.
Correct Answer:
A
A
send
light_mode
delete
Question #22
While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?
- AHighlighting the gap to the audit sponsor at the sponsor’s earliest possible availability
- BAsking the organization’s cloud administrator to immediately close the gap by updating the configuration settings and making the object storage bucket private and hence inaccessible from the Internet
- CDocumenting the finding in the audit report and sharing the gap with the relevant stakeholders
- DInforming the organization’s internal audit manager immediately about the gap
Correct Answer:
C
C
send
light_mode
delete
Question #23
To qualify for CSA STAR attestation for a particular cloud system, the SOC 2 report must cover:
- AISO/IЕС 27001: 2013 controls.
- Bmaturity model criteria.
- Call Cloud Control Matrix (CCM) controls and TSPC security principles.Most Voted
- DCloud Control Matrix (CCM) and ISO/IEC 27001:2013 controls.
Correct Answer:
C
C
send
light_mode
delete
Question #24
Which of the following is MOST important to consider when an organization is building a compliance program for the cloud?
- AThe rapidly changing service portfolio and architecture of the cloud.Most Voted
- BCloud providers should not be part of the compliance program.
- CThe fairly static nature of the service portfolio and architecture of the cloud.
- DThe cloud is similar to the on-premise environment in terms of compliance.
Correct Answer:
A
A
send
light_mode
delete
Question #25
When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer to review which cloud services will be deployed?
- ATo determine how those services will fit within its policies and proceduresMost Voted
- BTo determine the total cost of the cloud services to be deployed
- CTo confirm which vendor will be selected based on the compliance with security requirements
- DTo confirm if the compensating controls implemented are sufficient for the cloud
Correct Answer:
A
A
send
light_mode
delete
Question #26
Which of the following attestation allows for immediate adoption of the Cloud Control Matrix (CCM) as additional criteria to AICPA Trust Service Criteria and provides the flexibility to update the criteria as technology and market requirements change?
send
light_mode
delete
Question #27
To ensure that cloud audit resources deliver the best value to the organization, the PRIMARY step would be to:
- Adevelop a cloud audit plan on the basis of a detailed risk assessment.
- Bschedule the audits and monitor the time spent on each audit.
- Ctrain the cloud audit staff on current technology used in the organization.
- Dmonitor progress of audits and initiate cost control measures.
Correct Answer:
A
A
send
light_mode
delete
Question #28
Which of the following is an example of integrity technical impact?
- AThe cloud provider reports a breach of customer personal data from an unsecured server.
- BA hacker using a stolen administrator identity alerts the discount percentage in the product database.Most Voted
- CA DDoS attack renders the customer’s cloud inaccessible for 24 hours.
- DAn administrator inadvertently clicked on Phish bait exposing his company to a ransomware attack.
send
light_mode
delete
Question #29
What is a sign of an organization that has adopted a shift-left concept of code release cycles?
- AA waterfall model to move resources through the development to release phases
- BIncorporation of automation to identify and address software code problems early
- CMaturity of start-up entities with high-iteration to low-volume code commits
- DLarge entities with slower release cadences and geographical dispersed systems
Correct Answer:
B
B
send
light_mode
delete
Question #30
Cloud Control Matrix (CCM) controls can be used by cloud customers to:
- Adevelop new security baselines for the industry.
- Bdefine different control frameworks for different cloud service providers.
- Cfacilitate communication with their legal department.
- Dbuild an operational cloud risk management program.Most Voted
send
light_mode
delete
All Pages