Isaca CCAK Practice Test - Questions Answers, Page 14
List of questions
Related questions
In cloud computing, which KEY subject area relies on measurement results and metrics?
Software as a Service (SaaS) application services
Infrastructure as a Service (IaaS) storage and network
Platform as a Service (PaaS) development environment
Service level agreements (SLAs)
A certification target helps in the formation of a continuous certification framework by incorporating:
the service level objective (SLO) and service qualitative objective (SQO).
the scope description and security attributes to be tested.
the frequency of evaluating security attributes.
CSA STAR level 2 attestation.
Why should the results of third-party audits and certification be relied on when analyzing and assessing the cybersecurity risks in the cloud?
To establish an audit mindset within the organization
To contrast the risk generated by the loss of control
To reinforce the role of the internal audit function
To establish an accountability culture within the organization
If a customer management interface is compromised over the public Internet, it can lead to:
incomplete wiping of the data.
computing and data compromise for customers.
ease of acquisition of cloud services.
access to the RAM of neighboring cloud computers.
Which of the following is a detective control that may be identified in a Software as a Service (SaaS) service provider?
Data encryption
Incident management
Network segmentation
Privileged access monitoring
Which of the following is an example of a corrective control?
A central antivirus system installing the latest signature files before allowing a connection to the network
All new employees having standard access rights until their manager approves privileged rights
Unsuccessful access attempts being automatically logged for investigation
Privileged access to critical information systems requiring a second factor of authentication using a soft token
When mapping controls to architectural implementations, requirements define:
control objectives.
control activities.
guidelines.
policies.
During the cloud service provider evaluation process, which of the following BEST helps identify baseline configuration requirements?
Vendor requirements
Product benchmarks
Benchmark controls lists
Contract terms and conditions
What is the MOST effective way to ensure a vendor is compliant with the agreed-upon cloud service?
Examine the cloud provider's certifications and ensure the scope is appropriate.
Document the requirements and responsibilities within the customer contract
Interview the cloud security team and ensure compliance.
Pen test the cloud service provider to ensure compliance.
Which of the following is MOST useful for an auditor to review when seeking visibility into the cloud supply chain for a newly acquired Software as a Service (SaaS) solution?
SaaS provider contract
Payments made by the service owner
SaaS vendor white papers
Cloud compliance obligations register
Question