Isaca CCAK Practice Test - Questions Answers, Page 3
List of questions
Question 21
Which of the following is the common cause of misconfiguration in a cloud environment?
Reference: https://businessinsights.bitdefender.com/the-top-5-cloud-threats-that-smbs-need-to-address
Question 22
Which of the following controls framework should the cloud customer use to assess the overall security risk of a cloud provider?
Reference: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-22/preventing-the-nextcybersecurity-attack-with-effective-cloud-security-audits
Question 23
The BEST method to report continuous assessment of a cloud provider's services to the CSA is through:
Reference: https://cloudsecurityalliance.org/press-releases/2019/03/04/csa-launches-star-continuous-complianceassessment-program-for-cloud-service-providers/
Question 24
Which of the following is the MOST important audit scope document when conducting a review of a cloud service provider?
Question 25
Which of the following is a cloud-native solution designed to counter threats that do not exist within the enterprise?
Question 26
Which of the following is the risk associated with storing data in a cloud that crosses jurisdictions?
Reference: http://webcache.googleusercontent.com/search?q=cache:9OK2cQSAR3oJ:www.aph.gov.au/DocumentStore.ashx%3Fid%3 D88403640-14b5-4c3e-8dd7-315bb5067ba4 +&cd=1&hl=en&ct=clnk&gl=pk
Question 27
Prioritizing assurance activities for an organization's cloud services portfolio depends PRIMARILY on an organization's ability to:
Question 28
Which of the following has the MOST substantial impact on how aggressive or conservative the cloud approach of an organization will be?
Question 29
Policies and procedures shall be established, and supporting business processes and technical measures implemented, for maintenance of several items ensuring continuity and availability of operations and support personnel. Which of the following controls BEST matches this control description?
Reference: https://www.sapidata.sm/img/cms/CAIQ_v3-1_2020-01-13.pdf (2)
Question 30
Which of the following is the BEST way for a client to enforce a policy violation committed by a cloud service provider (CSP)?
Reference: https://www.omg.org/cloud/deliverables/CSCC-Security-for-Cloud-Computing-10-Steps-to-Ensure-Success.pdf
Question