ExamGecko
Home / Isaca / CCAK / List of questions
Ask Question

Isaca CCAK Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

When migrating to a cloud environment, which of the following should be the PRIMARY driver for the use of encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 72

Report Export Collapse

What type of termination occurs at the initiative of one party, and without the fault of the other party?

Become a Premium Member for full access
  Unlock Premium Member

Question 73

Report Export Collapse

Which of the following is the BEST control framework for a European manufacturing corporation that is migrating to the cloud?

Become a Premium Member for full access
  Unlock Premium Member

Question 74

Report Export Collapse

Under GDPR, an organization should report a data breach within what time frame?

Become a Premium Member for full access
  Unlock Premium Member

Question 75

Report Export Collapse

Which plan will guide an organization on how to react to a security incident that might occur on the organization's systems, or that might be affecting one of their service providers?

Become a Premium Member for full access
  Unlock Premium Member

Question 76

Report Export Collapse

In an organization, how are policy violations MOST likely to occur?

Become a Premium Member for full access
  Unlock Premium Member

Question 77

Report Export Collapse

What is a sign of an organization that has adopted a shift-left concept of code release cycles?

Become a Premium Member for full access
  Unlock Premium Member

Question 78

Report Export Collapse

An organization that is utilizing a community cloud is contracting an auditor to conduct a review on behalf of the group of organizations within the cloud community. From the following, to whom should the auditor report the findings?

Become a Premium Member for full access
  Unlock Premium Member

Question 79

Report Export Collapse

After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data. In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 80

Report Export Collapse

Which of the following configuration change controls is acceptable to a cloud auditor?

Become a Premium Member for full access
  Unlock Premium Member
Total 195 questions
Go to page: of 20