ExamGecko
Home Home / Isaca / CCAK

Isaca CCAK Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Which of the following provides the BEST evidence that a cloud service provider's continuous integration and continuous delivery (CI/CD) development pipeline includes checks for compliance as new features are added to its Software as a Service (SaaS) applications?

A.

Compliance tests are automated and integrated within the Cl tool.

A.

Compliance tests are automated and integrated within the Cl tool.

Answers
B.

Developers keep credentials outside the code base and in a secure repository.

B.

Developers keep credentials outside the code base and in a secure repository.

Answers
C.

Frequent compliance checks are performed for development environments.

C.

Frequent compliance checks are performed for development environments.

Answers
D.

Third-party security libraries are continuously kept up to date.

D.

Third-party security libraries are continuously kept up to date.

Answers
Suggested answer: A

Explanation:

A centralized risk and controls dashboard is the best option for ensuring a coordinated approach to risk and control processes when duties are split between an organization and its cloud service providers. This dashboard provides a unified view of risk and control status across the organization and the cloud services it utilizes. It enables both parties to monitor and manage risks effectively and ensures that control activities are aligned and consistent. This approach supports proactive risk management and facilitates communication and collaboration between the organization and the cloud service provider.

Reference The concept of a centralized risk and controls dashboard is supported by the Cloud Security Alliance (CSA) and ISACA, which emphasize the importance of visibility and coordination in cloud risk management.The CCAK materials and the Cloud Controls Matrix (CCM) provide guidance on establishing such dashboards as a means to manage and mitigate risks in a cloud environment12.

An auditor is reviewing an organization's virtual machines (VMs) hosted in the cloud. The organization utilizes a configuration management (CM) tool to enforce password policies on its VMs. Which of the following is the BEST approach for the auditor to use to review the operating effectiveness of the password requirement?

A.

The auditor should not rely on the CM tool and its settings, and for thoroughness should review the password configuration on the set of sample VMs.

A.

The auditor should not rely on the CM tool and its settings, and for thoroughness should review the password configuration on the set of sample VMs.

Answers
B.

Review the relevant configuration settings on the CM tool and check whether the CM tool agents are operating effectively on the sample VMs.

B.

Review the relevant configuration settings on the CM tool and check whether the CM tool agents are operating effectively on the sample VMs.

Answers
C.

As it is an automated environment, reviewing the relevant configuration settings on the CM tool would be sufficient.

C.

As it is an automated environment, reviewing the relevant configuration settings on the CM tool would be sufficient.

Answers
D.

Review the incident records for any incidents relating to brute force attacks or password compromise in the last 12 months and investigate whether the root cause of the incidents was due to in appropriate password policy configured on the VMs.

D.

Review the incident records for any incidents relating to brute force attacks or password compromise in the last 12 months and investigate whether the root cause of the incidents was due to in appropriate password policy configured on the VMs.

Answers
Suggested answer: B

Explanation:

The best approach for an auditor to review the operating effectiveness of the password requirement is to review the configuration settings on the Configuration Management (CM) tool and verify that the CM tool agents are functioning correctly on the VMs. This method ensures that the password policies are being enforced as intended and that the CM tool is effectively managing the configurations across the organization's virtual machines. It provides a balance between relying solely on automated tools and manual verification processes.

Reference This approach is supported by best practices in cloud security and auditing, which recommend a combination of automated tools and manual checks to ensure the effectiveness of security controls123. The use of CM tools for enforcing password policies is a common practice, and their effectiveness must be regularly verified to maintain the security posture of cloud services.

Which of the following is the MOST important strategy and governance documents to provide to the auditor prior to a cloud service provider review?

A.

Enterprise cloud strategy and policy, as well as inventory of third-party attestation reports

A.

Enterprise cloud strategy and policy, as well as inventory of third-party attestation reports

Answers
B.

Policies and procedures established around third-party risk assessments, including questionnaires that are required to be completed to assess risk associated with use of third-party services

B.

Policies and procedures established around third-party risk assessments, including questionnaires that are required to be completed to assess risk associated with use of third-party services

Answers
C.

Enterprise cloud strategy and policy, as well as the enterprise cloud security strategy

C.

Enterprise cloud strategy and policy, as well as the enterprise cloud security strategy

Answers
D.

Inventory of third-party attestation reports and enterprise cloud security strategy

D.

Inventory of third-party attestation reports and enterprise cloud security strategy

Answers
Suggested answer: C

Explanation:

The best approach for an auditor to review the operating effectiveness of the password requirement is to review the configuration settings on the Configuration Management (CM) tool and verify that the CM tool agents are functioning correctly on the VMs. This method ensures that the password policies are being enforced as intended and that the CM tool is effectively managing the configurations across the organization's virtual machines. It provides a balance between relying solely on automated tools and manual verification processes.

Reference This approach is supported by best practices in cloud security and auditing, which recommend a combination of automated tools and manual checks to ensure the effectiveness of security controls123. The use of CM tools for enforcing password policies is a common practice, and their effectiveness must be regularly verified to maintain the security posture of cloud services.

What should be the control audit frequency for an organization's business continuity management and operational resilience strategy?

A.

Annually

A.

Annually

Answers
B.

Biannually

B.

Biannually

Answers
C.

Quarterly

C.

Quarterly

Answers
D.

Monthly

D.

Monthly

Answers
Suggested answer: A

Explanation:

The control audit frequency for an organization's business continuity management and operational resilience strategy should be conducted annually. This frequency is considered appropriate for most organizations to ensure that their business continuity plans and operational resilience strategies remain effective and up-to-date with the current risk landscape. Conducting these audits annually aligns with the best practices of reviewing and updating business continuity plans to adapt to new threats, changes in the business environment, and lessons learned from past incidents.Reference The annual audit frequency is supported by industry standards and guidelines that emphasize the importance of regular reviews to maintain operational resilience.These include resources from professional bodies and industry groups that outline the need for periodic assessments to ensure the effectiveness of business continuity and resilience strategies

From the perspective of a senior cloud security audit practitioner in an organization with a mature security program and cloud adoption, which of the following statements BEST describes the DevSecOps concept?

A.

Process of security integration using automation in software development

A.

Process of security integration using automation in software development

Answers
B.

Operational framework that promotes software consistency through automation

B.

Operational framework that promotes software consistency through automation

Answers
C.

Development standards for addressing integration, testing, and deployment issues

C.

Development standards for addressing integration, testing, and deployment issues

Answers
D.

Making software development simpler, faster, and easier using automation

D.

Making software development simpler, faster, and easier using automation

Answers
Suggested answer: A

Explanation:

DevSecOps is an approach that integrates security practices into every phase of the software development lifecycle. It emphasizes the incorporation of security from the beginning, rather than as an afterthought, and utilizes automation to ensure security measures are consistently applied throughout the development process. This method allows for early detection and resolution of security issues, making it an essential practice for organizations with mature security programs and cloud adoption.

Reference The definition and best practices of DevSecOps are well-documented in resources provided by leading industry authorities such as Microsoft1and IBM2, which describe DevSecOps as a framework that automates the integration of security into the software development lifecycle.

Which of the following BEST describes the difference between a Type 1 and a Type 2 SOC report?

A.

A Type 2 SOC report validates the operating effectiveness of controls, whereas a Type 1 SOC report validates the suitability of the design of the controls.

A.

A Type 2 SOC report validates the operating effectiveness of controls, whereas a Type 1 SOC report validates the suitability of the design of the controls.

Answers
B.

A Type 1 SOC report provides an attestation, whereas a Type 2 SOC report offers a certification.

B.

A Type 1 SOC report provides an attestation, whereas a Type 2 SOC report offers a certification.

Answers
C.

A Type 2 SOC report validates the suitability of the control design, whereas a Type 1 SOC report validates the operating effectiveness of controls.

C.

A Type 2 SOC report validates the suitability of the control design, whereas a Type 1 SOC report validates the operating effectiveness of controls.

Answers
D.

There is no difference between a Type 2 and a Type 1 SOC report.

D.

There is no difference between a Type 2 and a Type 1 SOC report.

Answers
Suggested answer: A

Explanation:

A Type 1 SOC report assesses whether controls are appropriately designed at a specific point in time, while a Type 2 SOC report tests the operating effectiveness of these controls over a period. For cloud auditing, Type 2 is often preferred for its comprehensive approach to both design and effectiveness over time. The CCAK curriculum emphasizes understanding these reports as critical tools in auditing cloud service providers (referenced in the CCAK content on Assurance and Transparency and the CSA STAR framework).

Which of the following is a KEY benefit of using the Cloud Controls Matrix (CCM)?

A.

CCM uses a specific control for Infrastructure as a Service (IaaS).

A.

CCM uses a specific control for Infrastructure as a Service (IaaS).

Answers
B.

CCM maps to existing security standards, best practices, and regulations.

B.

CCM maps to existing security standards, best practices, and regulations.

Answers
C.

CCM V4 is an improved version from CCM V3.0.1.

C.

CCM V4 is an improved version from CCM V3.0.1.

Answers
D.

CCM utilizes an ITIL framework to define the capabilities needed to manage the IT services and security services.

D.

CCM utilizes an ITIL framework to define the capabilities needed to manage the IT services and security services.

Answers
Suggested answer: B

Explanation:

The Cloud Controls Matrix (CCM) by the Cloud Security Alliance provides a comprehensive control framework that aligns with industry standards, regulations, and best practices, offering a structured approach for cloud security and compliance management. This mapping capability makes it highly valuable in cloud audits as noted in the CCAK, which relies on CCM for its comprehensive applicability in regulatory compliance and security (referenced in CSA CCM V4 documentation and ISACA CCAK content).


A cloud service customer is looking to subscribe to a finance solution provided by a cloud service provider. The provider has clarified that the audit logs cannot be taken out of the cloud environment by the customer to its security information and event management (SIEM) solution for monitoring purposes. Which of the following should be the GREATEST concern to the auditor?

A.

The audit logs are overwritten every 30 days, and all past audit trail is lost.

A.

The audit logs are overwritten every 30 days, and all past audit trail is lost.

Answers
B.

The audit trails are backed up regularly, but the backup is not encrypted.

B.

The audit trails are backed up regularly, but the backup is not encrypted.

Answers
C.

The provider does not maintain audit logs in their environment.

C.

The provider does not maintain audit logs in their environment.

Answers
D.

The customer cannot monitor its cloud subscription on its own and must rely on the provider for monitoring purposes.

D.

The customer cannot monitor its cloud subscription on its own and must rely on the provider for monitoring purposes.

Answers
Suggested answer: D

Explanation:

The greatest concern to the auditor should be that the customer cannot monitor its cloud subscription on its own and must rely on the provider for monitoring purposes. This situation can lead to a lack of transparency and control over the security and compliance posture of the cloud services being used. It is crucial for customers to have the ability to independently monitor their systems to ensure that they are secure and compliant with relevant regulations and standards.

Reference This concern is highlighted in the Cloud Security Alliance's (CSA) Cloud Controls Matrix (CCM) and the Certificate of Cloud Auditing Knowledge (CCAK) materials, which emphasize the importance of continuous monitoring and the customer's ability to audit and ensure the security of their cloud services1.

As Infrastructure as a Service (laaS) cloud service providers often do not allow the cloud service customers to perform on-premise audits, the BEST approach for the auditor should be to:

A.

use other sources of available data for evaluating the customer's controls.

A.

use other sources of available data for evaluating the customer's controls.

Answers
B.

recommend that the customer not use the services provided by the provider.

B.

recommend that the customer not use the services provided by the provider.

Answers
C.

refrain from auditing the provider's security controls due to lack of cooperation.

C.

refrain from auditing the provider's security controls due to lack of cooperation.

Answers
D.

escalate the lack of support from the provider to the regulatory authority.

D.

escalate the lack of support from the provider to the regulatory authority.

Answers
Suggested answer: A

Explanation:

In situations where Infrastructure as a Service (IaaS) cloud service providers do not permit on-premise audits, auditors must adapt by utilizing alternative sources of data to evaluate the customer's controls. This can include using automated tools, third-party certifications, and other forms of assurance provided by the service provider. This approach ensures that the auditor can still assess the security posture and compliance of the cloud services without direct physical access to the provider's infrastructure.

Reference The Cloud Security Alliance (CSA) provides guidelines on effective cloud auditing practices, including the use of alternative data sources when on-premise audits are not feasible1.Additionally, discussions on the Certificate of Cloud Auditing Knowledge (CCAK) highlight the importance of adapting audit strategies to the cloud environment2.

Which of the following is MOST important to ensure effective cloud application controls are maintained in an organization?

A.

Control self-assessment (CSA)

A.

Control self-assessment (CSA)

Answers
B.

Third-party vendor involvement

B.

Third-party vendor involvement

Answers
C.

Exception reporting

C.

Exception reporting

Answers
D.

Application team internal review

D.

Application team internal review

Answers
Suggested answer: C

Explanation:

Exception reporting is crucial for maintaining effective cloud application controls within an organization. It involves monitoring and reporting deviations from standard operating procedures, which can indicate potential security issues. This proactive approach allows organizations to address vulnerabilities promptly before they can be exploited. Exception reporting is a key component of a robust security posture, as it provides real-time insights into the operational effectiveness of controls and helps maintain compliance with security policies.

Reference The importance of exception reporting is highlighted in best practices for cloud security, which emphasize the need for continuous monitoring and immediate response to any anomalies detected in cloud applications

Total 170 questions
Go to page: of 17