Pass the Isaca Cloud Security Alliance CCAK Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

In the context of Infrastructure as a Service (laaS), a vulnerability assessment will scan virtual machines to identify vulnerabilities in:

Options:

A.

both operating system and application infrastructure contained within the cloud service

provider’s instances.


B.

both operating system and application infrastructure contained within the customer’s

instances.


C.

only application infrastructure contained within the cloud service provider’s instances.


D.

only application infrastructure contained within the customer's instance


Questions # 22:

is it important for the individuals in charge of cloud compliance to understand the organization's past?

Options:

A.

To determine the current state of the organization's compliance


B.

To determine the risk profile of the organization


C.

To address any open findings from previous external audits


D.

To verify whether the measures implemented from the lessons learned are effective


Questions # 23:

The effect of which of the following should have priority in planning the scope and objectives of a cloud audit?

Options:

A.

Applicable industry good practices


B.

Applicable statutory requirements


C.

Organizational policies and procedures


D.

Applicable corporate standards


Questions # 24:

As part of continuous auditing, which of the following should a third-party auditor verify on a regular basis?

Options:

A.

Reporting tools are reliable and based on defined objectives.


B.

The cloud service provider is compliant.


C.

Assessment tools are configured based on cloud security best practices.


D.

Application programming interfaces (APIs) implemented are appropriate.


Questions # 25:

Which of the following standards is designed to be used by organizations for cloud services that intend to select controls within the process of implementing an information security management system based on ISO/IEC 27001?

Options:

A.

ISO/IEC 27017:2015


B.

ISO/IEC 27002


C.

NIST SP 800-146


D.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)


Questions # 26:

Which of the following is an example of availability technical impact?

Options:

A.

A distributed denial of service (DDoS) attack renders the customer's cloud inaccessible for 24 hours.


B.

The cloud provider reports a breach of customer personal data from an unsecured server.


C.

An administrator inadvertently clicked on phish bait, exposing the company to a ransomware attack.


D.

A hacker using a stolen administrator identity alters the discount percentage in the product database


Questions # 27:

Which of the following is the MOST important strategy and governance documents to provide to the auditor prior to a cloud service provider review?

Options:

A.

Enterprise cloud strategy and policy, as well as inventory of third-party attestation reports


B.

Policies and procedures established around third-party risk assessments, including questionnaires that are required to be completed to assess risk associated with use of third-party services


C.

Enterprise cloud strategy and policy, as well as the enterprise cloud security strategy


D.

Inventory of third-party attestation reports and enterprise cloud security strategy


Questions # 28:

Which of the following enables auditors to conduct gap analyses of what a cloud service provider offers versus what the customer requires?

Options:

A.

Using a standardized control framework


B.

The experience gained over the years


C.

Understanding the customer risk profile


D.

The as-is and to-be enterprise architecture (EA


Questions # 29:

Which of the following has the MOST substantial impact on how aggressive or conservative the cloud approach of an organization will be?

Options:

A.

Applicable laws and regulations


B.

Internal policies and technical standards


C.

Risk scoring criteria


D.

Risk appetite and budget constraints


Questions # 30:

What areas should be reviewed when auditing a public cloud?

Options:

A.

Identity and access management (IAM) and data protection


B.

Source code reviews and hypervisor


C.

Patching and configuration


D.

Vulnerability management and cyber security reviews


Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions