Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Cloud Security Alliance CCAK Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following would be considered as a factor to trust in a cloud service provider?

Options:

A.

The level of willingness to cooperate


B.

The level of exposure for public information


C.

The level of open source evidence available


D.

The level of proven technical skills


Expert Solution
Questions # 32:

Which of the following is MOST important to ensure effective cloud application controls are maintained in an organization?

Options:

A.

Control self-assessment (CSA)


B.

Third-party vendor involvement


C.

Exception reporting


D.

Application team internal review


Expert Solution
Questions # 33:

Which objective is MOST appropriate to measure the effectiveness of password policy?

Options:

A.

The number of related incidents decreases.


B.

Attempts to log with weak credentials increases.


C.

The number of related incidents increases.


D.

Newly created account credentials satisfy requirements.


Expert Solution
Questions # 34:

After finding a vulnerability in an Internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite parts of some files with random data. In reference to the Top Threats Analysis methodology, how would the technical impact of this incident be categorized?

Options:

A.

As an availability breach


B.

As a control breach


C.

As a confidentiality breach


D.

As an integrity breach


Expert Solution
Questions # 35:

Which of the following are the three MAIN phases of the Cloud Controls Matrix (CCM) mapping methodology?

Options:

A.

Initiation — Execution — Monitoring and Controlling


B.

Plan - Develop - Release


C.

Preparation — Execution - Peer Review and Publication


Expert Solution
Questions # 36:

From an auditor perspective, which of the following BEST describes shadow IT?

Options:

A.

An opportunity to diversify the cloud control approach


B.

A weakness in the cloud compliance posture


C.

A strength of disaster recovery (DR) planning


D.

A risk that jeopardizes business continuity planning


Expert Solution
Questions # 37:

Which of the following activities is performed outside information security monitoring?

Options:

A.

Management review of the information security framework


B.

Monitoring the effectiveness of implemented controls


C.

Collection and review of security events before escalation


D.

Periodic review of risks, vulnerabilities, likelihoods, and threats


Expert Solution
Questions # 38:

Which of the following should a cloud auditor recommend regarding controls for application interfaces and databases to prevent manual or systematic processing errors, corruption of data, or misuse?

Options:

A.

Assessment of contractual and regulatory requirements for customer access


B.

Establishment of policies and procedures across multiple system interfaces, jurisdictions,

and business functions to prevent improper disclosure, alteration, or destruction


C.

Data input and output integrity routines


D.

Testing in accordance with leading industry standards such as OWASP


Expert Solution
Questions # 39:

When an organization is moving to the cloud, responsibilities are shared based upon the cloud service provider's model and accountability is:

Options:

A.

shared.


B.

avoided.


C.

transferred.


D.

maintained.


Expert Solution
Questions # 40:

To ensure integration of security testing is implemented on large code sets in environments where time to completion is critical, what form of validation should an auditor expect?

Options:

A.

Parallel testing


B.

Full application stack unit testing


C.

Functional verification


D.

Regression testing


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions