ExamGecko
Home Home / Isaca / CCAK

Isaca CCAK Practice Test - Questions Answers, Page 11

Question list
Search
Search

A large organization with subsidiaries in multiple locations has a business requirement to organize IT systems to have identified resources reside in particular locations with organizational personnel. Which access control method will allow IT personnel to be segregated across the various locations?

A.
Role Based Access Control
A.
Role Based Access Control
Answers
B.
Attribute Based Access Control
B.
Attribute Based Access Control
Answers
C.
Policy Based Access Control
C.
Policy Based Access Control
Answers
D.
Rule Based Access Control
D.
Rule Based Access Control
Answers
Suggested answer: A

When reviewing a third-party agreement with a cloud service provider, which of the following should be the GREATEST concern regarding customer data privacy?

A.
Data retention, backup, and recovery
A.
Data retention, backup, and recovery
Answers
B.
Patch management process
B.
Patch management process
Answers
C.
Return or destruction of information
C.
Return or destruction of information
Answers
D.
Network intrusion detection
D.
Network intrusion detection
Answers
Suggested answer: A

Explanation:

Reference: https://arxiv.org/pdf/1303.4814.pdf

The MAIN difference between Cloud Control Matrix (CCM) and Consensus Assessment Initiative Questionnaire (CAIQ) is that:

A.
CCM assesses the presence of controls, whereas CAIQ assesses overall security of a service.
A.
CCM assesses the presence of controls, whereas CAIQ assesses overall security of a service.
Answers
B.
CCM has a set of security questions, whereas CAIQ has a set of security controls.
B.
CCM has a set of security questions, whereas CAIQ has a set of security controls.
Answers
C.
CCM has 14 domains and CAIQ has 16 domains.
C.
CCM has 14 domains and CAIQ has 16 domains.
Answers
D.
CCM provides a controls framework, whereas CAIQ provides industry-accepted ways to document which security controls exist in IaaS, PaaS, and SaaS offerings.
D.
CCM provides a controls framework, whereas CAIQ provides industry-accepted ways to document which security controls exist in IaaS, PaaS, and SaaS offerings.
Answers
Suggested answer: D

Explanation:

Reference: https://sdtimes.com/cloud-security-alliance-unveils-governance-risk-management-and-compliance-grc-stack/

Which objective is MOST appropriate to measure the effectiveness of password policy?

A.
The number of related incidents increases.
A.
The number of related incidents increases.
Answers
B.
Attempts to log with weak credentials increases.
B.
Attempts to log with weak credentials increases.
Answers
C.
Newly created account credentials satisfy requirements.
C.
Newly created account credentials satisfy requirements.
Answers
D.
The number of related incidents decreases.
D.
The number of related incidents decreases.
Answers
Suggested answer: D

Supply chain agreements between CSP and cloud customers should, at minimum, include:

A.
Organization chart of the CSP
A.
Organization chart of the CSP
Answers
B.
Policies and procedures of the cloud customer
B.
Policies and procedures of the cloud customer
Answers
C.
Audits, assessments and independent verification of compliance certifications with agreement terms
C.
Audits, assessments and independent verification of compliance certifications with agreement terms
Answers
D.
Regulatory guidelines impacting the cloud customer
D.
Regulatory guidelines impacting the cloud customer
Answers
Suggested answer: C

Explanation:

Reference: https://searchitchannel.techtarget.com/definition/cloud-service-provider-cloud-provider

Which of the following is an example of financial business impact?

A.
A hacker using a stolen administrator identity brings down the SaaS sales and marketing systems, resulting in the inability to process customer orders or manage customer relationships.
A.
A hacker using a stolen administrator identity brings down the SaaS sales and marketing systems, resulting in the inability to process customer orders or manage customer relationships.
Answers
B.
While the breach was reported in a timely manner to the CEO, the CFO and CISO blamed each other in public, resulting in a loss of public confidence that led the board to replace all three.
B.
While the breach was reported in a timely manner to the CEO, the CFO and CISO blamed each other in public, resulting in a loss of public confidence that led the board to replace all three.
Answers
C.
A DDoS attack renders the customer's cloud inaccessible for 24 hours resulting in millions in lost sales.
C.
A DDoS attack renders the customer's cloud inaccessible for 24 hours resulting in millions in lost sales.
Answers
D.
The cloud provider fails to report a breach of customer personal data from an unsecured server, resulting in GDPR fines of 10 million euro.
D.
The cloud provider fails to report a breach of customer personal data from an unsecured server, resulting in GDPR fines of 10 million euro.
Answers
Suggested answer: C

What should be the auditor's PRIMARY objective while examining a cloud service provider's (CSP's) SLA?

A.
Verifying whether commensurate compensation in the form of service credits is factored in if the CSC is unable to match its SLA obligations
A.
Verifying whether commensurate compensation in the form of service credits is factored in if the CSC is unable to match its SLA obligations
Answers
B.
Verifying whether the SLA includes all the operational matters which are material to the operation of the service
B.
Verifying whether the SLA includes all the operational matters which are material to the operation of the service
Answers
C.
Verifying whether the SLA caters to the availability requirements of the cloud service customer (CSC)
C.
Verifying whether the SLA caters to the availability requirements of the cloud service customer (CSC)
Answers
D.
Verifying whether the SLAs are well-defined and measurable
D.
Verifying whether the SLAs are well-defined and measurable
Answers
Suggested answer: C

The MOST critical concept of managing the build and test of code in DevOps is:

A.
continuous build.
A.
continuous build.
Answers
B.
continuous delivery.
B.
continuous delivery.
Answers
C.
continuous deployment.
C.
continuous deployment.
Answers
D.
continuous integration.
D.
continuous integration.
Answers
Suggested answer: B

Explanation:

Reference: https://smartbear.com/blog/devops-testing-strategy-best-practices-tools/

A CSP contracts for a penetration test to be conducted on its infrastructures. The auditor engages the target with no prior knowledge of its defenses, assets, or channels. The CSP's security operation center is not notified in advance of the scope of the audit and the test vectors. Which mode is selected by the CSP?

A.
Double gray box
A.
Double gray box
Answers
B.
Tandem
B.
Tandem
Answers
C.
Reversal
C.
Reversal
Answers
D.
Double blind
D.
Double blind
Answers
Suggested answer: D

Explanation:

Reference: https://business-iq.net/articles/4327-EN-these-are-the-different-types-of-penetration-testing

Which of the following contract terms is necessary to meet a company's requirement that needs to move data from one CSP to another?

A.
Drag and Drop
A.
Drag and Drop
Answers
B.
Lift and shift
B.
Lift and shift
Answers
C.
Flexibility to move
C.
Flexibility to move
Answers
D.
Transition and data portability
D.
Transition and data portability
Answers
Suggested answer: D

Explanation:

Reference: https://www.isaca.org/resources/isaca-journal/past-issues/2014/data-owners-responsibilities-when-migrating-tothe-cloud

Total 170 questions
Go to page: of 17