Pass the Isaca Cloud Security Alliance CCAK Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is a cloud-specific security standard?

Options:

A.

15027017


B.

15014001


C.

15022301


D.

15027701


Questions # 12:

When performing audits in relation to the organizational strategy and governance, what should be requested from the cloud service provider?

Options:

A.

Enterprise cloud security strategy


B.

Enterprise cloud strategy and policy


C.

Attestation reports


D.

Policies and procedures


Questions # 13:

After finding a vulnerability in an Internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite parts of some files with random data. In reference to the Top Threats Analysis methodology, how would the technical impact of this incident be categorized?

Options:

A.

As an integrity breach


B.

As an availability breach


C.

As a confidentiality breach


D.

As a control breach


Questions # 14:

Supply chain agreements between a cloud service provider and cloud customers should, at a minimum, include:

Options:

A.

regulatory guidelines impacting the cloud customer.


B.

audits, assessments, and independent verification of compliance certifications with agreement terms.


C.

policies and procedures of the cloud customer


D.

the organizational chart of the provider.


Questions # 15:

Which of the following should be an assurance requirement when an organization is migrating to a Software as a Service (SaaS) provider?

Options:

A.

Location of data


B.

Amount of server storage


C.

Access controls


D.

Type of network technology


Questions # 16:

To ensure a cloud service provider is complying with an organization's privacy requirements, a cloud auditor should FIRST review:

Options:

A.

organizational policies, standards, and procedures.


B.

adherence to organization policies, standards, and procedures.


C.

legal and regulatory requirements.


D.

the IT infrastructure.


Questions # 17:

Which of the following aspects of risk management involves identifying the potential reputational and financial harm when an incident occurs?

Options:

A.

Impact analysis


B.

Likelihood


C.

Mitigation


D.

Residual risk


Questions # 18:

During an audit, it was identified that a critical application hosted in an off-premises cloud is not part of the organization's disaster recovery plan (DRP). Management stated that it is responsible for ensuring the cloud service provider has a plan that is tested annually. What should be the auditor's NEXT course of action?

Options:

A.

Review the contract and DR capability.


B.

Plan an audit of the provider.


C.

Review the security white paper of the provider.


D.

Review the provider's audit reports.


Questions # 19:

Which of the following types of risk is associated specifically with the use of multi-cloud environments in an organization?

Options:

A.

Risk of supply chain visibility and validation


B.

Risk of reduced visibility and control


C.

Risk of service reliability and uptime


D.

Risk of unauthorized access to customer and business data


Questions # 20:

Which of the following is a category of trust in cloud computing?

Options:

A.

Loyalty-based trust


B.

Background-based trust


C.

Reputation-based trust


D.

Transparency-based trust


Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions