Isaca CCAK Practice Test - Questions Answers, Page 2
List of questions
Question 11
Which of the following is the BEST tool to perform cloud security control audits?
Reference: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-22/preventing-the-nextcybersecurity-attack-with-effective-cloud-security-audits
Question 12
Which of the following is an example of a corrective control?
Question 13
When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer to review which cloud services will be deployed?
Reference: https://www.isaca.org/credentialing/certificate-of-cloud-auditing-knowledge
Question 14
The Cloud Computing Compliance Controls Catalogue (C5) framework is maintained by which of the following agencies?
Reference: https://docs.microsoft.com/en-us/compliance/regulatory/offering-c5-germany
Question 15
Which of the following is the MOST feasible way to validate the performance of CSPs for the delivery of technology resources?
Question 16
Which of the following would be the MOST critical finding of an application security and DevOps audit?
Question 17
During an audit it was identified that a critical application hosted in an off-premises cloud is not part of the organization's DRP (Disaster Recovery Plan).
Management stated that it is responsible for ensuring that the cloud service provider (CSP) has a plan that is tested annually. What should be the auditor's NEXT course of action?
Question 18
Organizations maintain mappings between the different control frameworks they adopt to:
Reference: https://www.isaca.org/resources/news-and-trends/industry-news/2019/employing-cobit-2019-for-enterprisegovernance-strategy
Question 19
Which of the following defines the criteria designed by the American Institute of Certified Public Accountants (AICPA) to specify trusted services?
Reference:
https://us.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-servicescriteria.pdf
Question 20
While performing the audit, the auditor found that an object storage bucket containing PII could be accessed by anyone on the Internet. Given this discovery, what should be the most appropriate action for the auditor to perform?
Reference: https://www.isaca.org/resources/isaca-journal/issues/2020/volume-1/is-audit-basics-the-components-of-the-itaudit-report
Question