Isaca CCAK Practice Test - Questions Answers, Page 17
List of questions
Related questions
Which of the following provides the BEST evidence that a cloud service provider's continuous integration and continuous delivery (CI/CD) development pipeline includes checks for compliance as new features are added to its Software as a Service (SaaS) applications?
Compliance tests are automated and integrated within the Cl tool.
Developers keep credentials outside the code base and in a secure repository.
Frequent compliance checks are performed for development environments.
Third-party security libraries are continuously kept up to date.
An auditor is reviewing an organization's virtual machines (VMs) hosted in the cloud. The organization utilizes a configuration management (CM) tool to enforce password policies on its VMs. Which of the following is the BEST approach for the auditor to use to review the operating effectiveness of the password requirement?
The auditor should not rely on the CM tool and its settings, and for thoroughness should review the password configuration on the set of sample VMs.
Review the relevant configuration settings on the CM tool and check whether the CM tool agents are operating effectively on the sample VMs.
As it is an automated environment, reviewing the relevant configuration settings on the CM tool would be sufficient.
Review the incident records for any incidents relating to brute force attacks or password compromise in the last 12 months and investigate whether the root cause of the incidents was due to in appropriate password policy configured on the VMs.
Which of the following is the MOST important strategy and governance documents to provide to the auditor prior to a cloud service provider review?
Enterprise cloud strategy and policy, as well as inventory of third-party attestation reports
Policies and procedures established around third-party risk assessments, including questionnaires that are required to be completed to assess risk associated with use of third-party services
Enterprise cloud strategy and policy, as well as the enterprise cloud security strategy
Inventory of third-party attestation reports and enterprise cloud security strategy
What should be the control audit frequency for an organization's business continuity management and operational resilience strategy?
Annually
Biannually
Quarterly
Monthly
From the perspective of a senior cloud security audit practitioner in an organization with a mature security program and cloud adoption, which of the following statements BEST describes the DevSecOps concept?
Process of security integration using automation in software development
Operational framework that promotes software consistency through automation
Development standards for addressing integration, testing, and deployment issues
Making software development simpler, faster, and easier using automation
Which of the following BEST describes the difference between a Type 1 and a Type 2 SOC report?
A Type 2 SOC report validates the operating effectiveness of controls, whereas a Type 1 SOC report validates the suitability of the design of the controls.
A Type 1 SOC report provides an attestation, whereas a Type 2 SOC report offers a certification.
A Type 2 SOC report validates the suitability of the control design, whereas a Type 1 SOC report validates the operating effectiveness of controls.
There is no difference between a Type 2 and a Type 1 SOC report.
Which of the following is a KEY benefit of using the Cloud Controls Matrix (CCM)?
CCM uses a specific control for Infrastructure as a Service (IaaS).
CCM maps to existing security standards, best practices, and regulations.
CCM V4 is an improved version from CCM V3.0.1.
CCM utilizes an ITIL framework to define the capabilities needed to manage the IT services and security services.
A cloud service customer is looking to subscribe to a finance solution provided by a cloud service provider. The provider has clarified that the audit logs cannot be taken out of the cloud environment by the customer to its security information and event management (SIEM) solution for monitoring purposes. Which of the following should be the GREATEST concern to the auditor?
The audit logs are overwritten every 30 days, and all past audit trail is lost.
The audit trails are backed up regularly, but the backup is not encrypted.
The provider does not maintain audit logs in their environment.
The customer cannot monitor its cloud subscription on its own and must rely on the provider for monitoring purposes.
As Infrastructure as a Service (laaS) cloud service providers often do not allow the cloud service customers to perform on-premise audits, the BEST approach for the auditor should be to:
use other sources of available data for evaluating the customer's controls.
recommend that the customer not use the services provided by the provider.
refrain from auditing the provider's security controls due to lack of cooperation.
escalate the lack of support from the provider to the regulatory authority.
Which of the following is MOST important to ensure effective cloud application controls are maintained in an organization?
Control self-assessment (CSA)
Third-party vendor involvement
Exception reporting
Application team internal review
Question