Isaca CCAK Practice Test - Questions Answers, Page 3

List of questions
Question 21

Which of the following is the common cause of misconfiguration in a cloud environment?
Reference: https://businessinsights.bitdefender.com/the-top-5-cloud-threats-that-smbs-need-to-address
Question 22

Which of the following controls framework should the cloud customer use to assess the overall security risk of a cloud provider?
Reference: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-22/preventing-the-nextcybersecurity-attack-with-effective-cloud-security-audits
Question 23

The BEST method to report continuous assessment of a cloud provider's services to the CSA is through:
Reference: https://cloudsecurityalliance.org/press-releases/2019/03/04/csa-launches-star-continuous-complianceassessment-program-for-cloud-service-providers/
Question 24

Which of the following is the MOST important audit scope document when conducting a review of a cloud service provider?
Question 25

Which of the following is a cloud-native solution designed to counter threats that do not exist within the enterprise?
Question 26

Which of the following is the risk associated with storing data in a cloud that crosses jurisdictions?
Reference: http://webcache.googleusercontent.com/search?q=cache:9OK2cQSAR3oJ:www.aph.gov.au/DocumentStore.ashx%3Fid%3 D88403640-14b5-4c3e-8dd7-315bb5067ba4 +&cd=1&hl=en&ct=clnk&gl=pk
Question 27

Prioritizing assurance activities for an organization's cloud services portfolio depends PRIMARILY on an organization's ability to:
Question 28

Which of the following has the MOST substantial impact on how aggressive or conservative the cloud approach of an organization will be?
Question 29

Policies and procedures shall be established, and supporting business processes and technical measures implemented, for maintenance of several items ensuring continuity and availability of operations and support personnel. Which of the following controls BEST matches this control description?
Reference: https://www.sapidata.sm/img/cms/CAIQ_v3-1_2020-01-13.pdf (2)
Question 30

Which of the following is the BEST way for a client to enforce a policy violation committed by a cloud service provider (CSP)?
Reference: https://www.omg.org/cloud/deliverables/CSCC-Security-for-Cloud-Computing-10-Steps-to-Ensure-Success.pdf
Question