Pass the Isaca Cloud Security Alliance CCAK Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following activities are part of the implementation phase of a cloud assurance program during a cloud migration?

Options:

A.

Development of the monitoring goals and requirements


B.

Identification of processes, functions, and systems


C.

Identification of roles and responsibilities


D.

Identification of the relevant laws, regulations, and standards


Questions # 2:

What aspect of Software as a Service (SaaS) functionality and operations would the cloud customer be responsible for and should be audited?

Options:

A.

Source code reviews


B.

Patching


C.

Access controls


D.

Vulnerability management


Questions # 3:

Which of the following would be the MOST critical finding of an application security and DevOps audit?

Options:

A.

Certifications with global security standards specific to cloud are not reviewed, and the impact of noted findings are not assessed.


B.

Application architecture and configurations did not consider security measures.


C.

Outsourced cloud service interruption, breach, or loss of stored data occurred at the cloud service provider.


D.

The organization is not using a unified framework to integrate cloud compliance with regulatory requirements


Questions # 4:

When reviewing a third-party agreement with a cloud service provider, which of the following should be the GREATEST concern regarding customer data privacy?

Options:

A.

Return or destruction of information


B.

Data retention, backup, and recovery


C.

Patch management process


D.

Network intrusion detection


Questions # 5:

Which of the following is the MOST relevant question in the cloud compliance program design phase?

Options:

A.

Who owns the cloud services strategy?


B.

Who owns the cloud strategy?


C.

Who owns the cloud governance strategy?


D.

Who owns the cloud portfolio strategy?


Questions # 6:

To promote the adoption of secure cloud services across the federal government by

Options:

A.

To providing a standardized approach to security and risk assessment


B.

To provide agencies of the federal government a dedicated tool to certify Authority to

Operate (ATO)


C.

To enable 3PAOs to perform independent security assessments of cloud service providers


D.

To publish a comprehensive and official framework for the secure implementation of

controls for cloud security


Questions # 7:

A cloud service provider utilizes services of other service providers for its cloud service. Which of the following is the BEST approach for the auditor while performing the audit for the cloud service?

Options:

A.

The auditor should review the service providers' security controls even more strictly, as they are further separated from the cloud customer.


B.

The auditor should review the relationship between the cloud service provider and its service provider to help direct and estimate the level of effort and analysis the auditor should apply.


C.

As the contract for the cloud service is between the cloud customer and the cloud service provider, there is no need for the auditor to review the services provided by the service providers.


D.

As the relationship between the cloud service provider and its service providers is governed by separate contracts between them, there is no need for the auditor to review the services


Questions # 8:

Which of the following is an example of availability technical impact?

Options:

A.

The cloud provider reports a breach of customer personal data from an unsecured server.


B.

A hacker using a stolen administrator identity alters the discount percentage in the product database.


C.

A distributed denial of service (DDoS) attack renders the customer’s cloud inaccessible for 24 hours.


D.

An administrator inadvertently clicked on phish bait, exposing the company to a ransomware attack


Questions # 9:

A large healthcare provider within the United States is seeking a cloud service provider offering Software as a Service (SaaS) for core business systems. The selected provider MUST comply with which of the following regulations?

Options:

A.

GDPR


B.

HIPAA


C.

GLBA


D.

FISMA


Questions # 10:

For an auditor auditing an organization's cloud resources, which of the following should be of GREATEST concern?

Options:

A.

The organization does not have separate policies for governing its cloud environment.


B.

The organization's IT team does not include resources with cloud certifications.


C.

The organization does not perform periodic reviews or control monitoring for its cloud environment, but it has a documented audit plan and performs an audit for its cloud environment every alternate year.


D.

The risk management team reports to the head of audit.


Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions