Pass the Isaca Cloud Security Alliance CCAK Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following would be considered as a factor to trust in a cloud service provider?

Options:

A.

The level of willingness to cooperate


B.

The level of exposure for public information


C.

The level of open source evidence available


D.

The level of proven technical skills


Questions # 32:

Which of the following is MOST important to ensure effective cloud application controls are maintained in an organization?

Options:

A.

Control self-assessment (CSA)


B.

Third-party vendor involvement


C.

Exception reporting


D.

Application team internal review


Questions # 33:

Which objective is MOST appropriate to measure the effectiveness of password policy?

Options:

A.

The number of related incidents decreases.


B.

Attempts to log with weak credentials increases.


C.

The number of related incidents increases.


D.

Newly created account credentials satisfy requirements.


Questions # 34:

After finding a vulnerability in an Internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite parts of some files with random data. In reference to the Top Threats Analysis methodology, how would the technical impact of this incident be categorized?

Options:

A.

As an availability breach


B.

As a control breach


C.

As a confidentiality breach


D.

As an integrity breach


Questions # 35:

Which of the following are the three MAIN phases of the Cloud Controls Matrix (CCM) mapping methodology?

Options:

A.

Initiation — Execution — Monitoring and Controlling


B.

Plan - Develop - Release


C.

Preparation — Execution - Peer Review and Publication


Questions # 36:

From an auditor perspective, which of the following BEST describes shadow IT?

Options:

A.

An opportunity to diversify the cloud control approach


B.

A weakness in the cloud compliance posture


C.

A strength of disaster recovery (DR) planning


D.

A risk that jeopardizes business continuity planning


Questions # 37:

Which of the following activities is performed outside information security monitoring?

Options:

A.

Management review of the information security framework


B.

Monitoring the effectiveness of implemented controls


C.

Collection and review of security events before escalation


D.

Periodic review of risks, vulnerabilities, likelihoods, and threats


Questions # 38:

Which of the following should a cloud auditor recommend regarding controls for application interfaces and databases to prevent manual or systematic processing errors, corruption of data, or misuse?

Options:

A.

Assessment of contractual and regulatory requirements for customer access


B.

Establishment of policies and procedures across multiple system interfaces, jurisdictions,

and business functions to prevent improper disclosure, alteration, or destruction


C.

Data input and output integrity routines


D.

Testing in accordance with leading industry standards such as OWASP


Questions # 39:

When an organization is moving to the cloud, responsibilities are shared based upon the cloud service provider's model and accountability is:

Options:

A.

shared.


B.

avoided.


C.

transferred.


D.

maintained.


Questions # 40:

To ensure integration of security testing is implemented on large code sets in environments where time to completion is critical, what form of validation should an auditor expect?

Options:

A.

Parallel testing


B.

Full application stack unit testing


C.

Functional verification


D.

Regression testing


Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions