ExamGecko
Home Home / Isaca / CCAK

Isaca CCAK Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which of the following is the BEST tool to perform cloud security control audits?

A.
General Data Protection Regulation (GDPR)
A.
General Data Protection Regulation (GDPR)
Answers
B.
ISO 27001
B.
ISO 27001
Answers
C.
Federal Information Processing Standard (FIPS) 140-2
C.
Federal Information Processing Standard (FIPS) 140-2
Answers
D.
CSA Cloud Control Matrix (CCM)
D.
CSA Cloud Control Matrix (CCM)
Answers
Suggested answer: D

Explanation:

Reference: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-22/preventing-the-nextcybersecurity-attack-with-effective-cloud-security-audits

Which of the following is an example of a corrective control?

A.
A central anti-virus system installing the latest signature files before allowing a connection to the network
A.
A central anti-virus system installing the latest signature files before allowing a connection to the network
Answers
B.
Unsuccessful access attempts being automatically logged for investigation
B.
Unsuccessful access attempts being automatically logged for investigation
Answers
C.
Privileged access to critical information systems requiring a second factor of authentication using soft token
C.
Privileged access to critical information systems requiring a second factor of authentication using soft token
Answers
D.
All new employees having standard access rights until their manager approves privileged rights
D.
All new employees having standard access rights until their manager approves privileged rights
Answers
Suggested answer: C

When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer to review which cloud services will be deployed?

A.
To determine how those services will fit within its policies and procedures
A.
To determine how those services will fit within its policies and procedures
Answers
B.
To determine the total cost of the cloud services to be deployed
B.
To determine the total cost of the cloud services to be deployed
Answers
C.
To confirm which vendor will be selected based on the compliance with security requirements
C.
To confirm which vendor will be selected based on the compliance with security requirements
Answers
D.
To confirm if the compensating controls implemented are sufficient for the cloud
D.
To confirm if the compensating controls implemented are sufficient for the cloud
Answers
Suggested answer: A

Explanation:

Reference: https://www.isaca.org/credentialing/certificate-of-cloud-auditing-knowledge

The Cloud Computing Compliance Controls Catalogue (C5) framework is maintained by which of the following agencies?

A.
Agence nationale de la sécurité des systèmes d'information (ANSSI)
A.
Agence nationale de la sécurité des systèmes d'information (ANSSI)
Answers
B.
National Institute of Standards and Technology (NIST)
B.
National Institute of Standards and Technology (NIST)
Answers
C.
National Security Agency (NSA)
C.
National Security Agency (NSA)
Answers
D.
Bundesamt für Sicherheit in der Informationstechnik (BSI)
D.
Bundesamt für Sicherheit in der Informationstechnik (BSI)
Answers
Suggested answer: D

Explanation:

Reference: https://docs.microsoft.com/en-us/compliance/regulatory/offering-c5-germany

Which of the following is the MOST feasible way to validate the performance of CSPs for the delivery of technology resources?

A.
Cloud compliance program
A.
Cloud compliance program
Answers
B.
Legacy IT compliance program
B.
Legacy IT compliance program
Answers
C.
Internal audit program
C.
Internal audit program
Answers
D.
Service organization controls report
D.
Service organization controls report
Answers
Suggested answer: D

Which of the following would be the MOST critical finding of an application security and DevOps audit?

A.
The organization is not using a unified framework to integrate cloud compliance with regulatory requirements.
A.
The organization is not using a unified framework to integrate cloud compliance with regulatory requirements.
Answers
B.
Application architecture and configurations did not consider security measures.
B.
Application architecture and configurations did not consider security measures.
Answers
C.
Outsourced cloud service interruption, breach or loss of data stored at the cloud service provider.
C.
Outsourced cloud service interruption, breach or loss of data stored at the cloud service provider.
Answers
D.
Certifications with global security standards specific to cloud are not reviewed and the impact of noted findings are not assessed.
D.
Certifications with global security standards specific to cloud are not reviewed and the impact of noted findings are not assessed.
Answers
Suggested answer: B

During an audit it was identified that a critical application hosted in an off-premises cloud is not part of the organization's DRP (Disaster Recovery Plan).

Management stated that it is responsible for ensuring that the cloud service provider (CSP) has a plan that is tested annually. What should be the auditor's NEXT course of action?

A.
Review the CSP audit reports.
A.
Review the CSP audit reports.
Answers
B.
Review the security white paper of the CSP.
B.
Review the security white paper of the CSP.
Answers
C.
Review the contract and DR capability.
C.
Review the contract and DR capability.
Answers
D.
Plan an audit of the CSP.
D.
Plan an audit of the CSP.
Answers
Suggested answer: B

Organizations maintain mappings between the different control frameworks they adopt to:

A.
help identify controls with common assessment status.
A.
help identify controls with common assessment status.
Answers
B.
avoid duplication of work when assessing compliance.
B.
avoid duplication of work when assessing compliance.
Answers
C.
help identify controls with different assessment status.
C.
help identify controls with different assessment status.
Answers
D.
start a compliance assessment using latest assessment.
D.
start a compliance assessment using latest assessment.
Answers
Suggested answer: C

Explanation:

Reference: https://www.isaca.org/resources/news-and-trends/industry-news/2019/employing-cobit-2019-for-enterprisegovernance-strategy

Which of the following defines the criteria designed by the American Institute of Certified Public Accountants (AICPA) to specify trusted services?

A.
Security, confidentiality, availability, privacy and processing integrity
A.
Security, confidentiality, availability, privacy and processing integrity
Answers
B.
Security, applicability, availability, privacy and processing integrity
B.
Security, applicability, availability, privacy and processing integrity
Answers
C.
Security, confidentiality, availability, privacy and trustworthiness
C.
Security, confidentiality, availability, privacy and trustworthiness
Answers
D.
Security, data integrity, availability, privacy and processing integrity
D.
Security, data integrity, availability, privacy and processing integrity
Answers
Suggested answer: A

Explanation:

Reference:

https://us.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-servicescriteria.pdf

While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?

A.
Highlighting the gap to the audit sponsor at the sponsor's earliest possible availability
A.
Highlighting the gap to the audit sponsor at the sponsor's earliest possible availability
Answers
B.
Asking the organization's cloud administrator to immediately close the gap by updating the configuration settings and making the object storage bucket private and hence inaccessible from the Internet
B.
Asking the organization's cloud administrator to immediately close the gap by updating the configuration settings and making the object storage bucket private and hence inaccessible from the Internet
Answers
C.
Documenting the finding in the audit report and sharing the gap with the relevant stakeholders
C.
Documenting the finding in the audit report and sharing the gap with the relevant stakeholders
Answers
D.
Informing the organization's internal audit manager immediately about the gap
D.
Informing the organization's internal audit manager immediately about the gap
Answers
Suggested answer: C

Explanation:

Reference: https://www.isaca.org/resources/isaca-journal/issues/2020/volume-1/is-audit-basics-the-components-of-the-itaudit-report

Total 170 questions
Go to page: of 17