Isaca CCAK Practice Test - Questions Answers, Page 2

List of questions
Question 11

Which of the following is the BEST tool to perform cloud security control audits?
Reference: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-22/preventing-the-nextcybersecurity-attack-with-effective-cloud-security-audits
Question 12

Which of the following is an example of a corrective control?
Question 13

When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer to review which cloud services will be deployed?
Reference: https://www.isaca.org/credentialing/certificate-of-cloud-auditing-knowledge
Question 14

The Cloud Computing Compliance Controls Catalogue (C5) framework is maintained by which of the following agencies?
Reference: https://docs.microsoft.com/en-us/compliance/regulatory/offering-c5-germany
Question 15

Which of the following is the MOST feasible way to validate the performance of CSPs for the delivery of technology resources?
Question 16

Which of the following would be the MOST critical finding of an application security and DevOps audit?
Question 17

During an audit it was identified that a critical application hosted in an off-premises cloud is not part of the organization's DRP (Disaster Recovery Plan).
Management stated that it is responsible for ensuring that the cloud service provider (CSP) has a plan that is tested annually. What should be the auditor's NEXT course of action?
Question 18

Organizations maintain mappings between the different control frameworks they adopt to:
Reference: https://www.isaca.org/resources/news-and-trends/industry-news/2019/employing-cobit-2019-for-enterprisegovernance-strategy
Question 19

Which of the following defines the criteria designed by the American Institute of Certified Public Accountants (AICPA) to specify trusted services?
Reference:
https://us.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-servicescriteria.pdf
Question 20

While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?
Reference: https://www.isaca.org/resources/isaca-journal/issues/2020/volume-1/is-audit-basics-the-components-of-the-itaudit-report
Question