Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CCAK Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following should be an assurance requirement when an organization is migrating to a Software as a Service (SaaS) provider?

Options:
A.

Location of data

B.

Amount of server storage

C.

Access controls

D.

Type of network technology

Isaca CCAK Premium Access
Questions 32

Which of the following is a good candidate for continuous auditing?

Options:
A.

Procedures

B.

Governance

C.

Cryptography and authentication

D.

Documentation quality

Questions 33

Which of the following is an example of financial business impact?

Options:
A.

A distributed denial of service (DDoS) attack renders the customer's cloud inaccessible for

24 hours, resulting in millions in lost sales.

B.

A hacker using a stolen administrator identity brings down the Software of a Service (SaaS)

sales and marketing systems, resulting in the inability to process customer orders or

manage customer relationships.

C.

While the breach was reported in a timely manner to the CEO, the CFO and CISO blamed

each other in public consulting in a loss of public confidence that led the board to replace all

three.

Questions 34

A cloud service customer is looking to subscribe to a finance solution provided by a cloud service provider. The provider has clarified that the audit logs cannot be taken out of the cloud environment by the customer to its security information and event management (SIEM) solution for monitoring purposes. Which of the following should be the GREATEST concern to the auditor?

Options:
A.

The audit logs are overwritten every 30 days, and all past audit trail is lost.

B.

The audit trails are backed up regularly, but the backup is not encrypted.

C.

The provider does not maintain audit logs in their environment.

D.

The customer cannot monitor its cloud subscription on its own and must rely on the provider for monitoring purposes.

Questions 35

Which of the following is the MOST significant difference between a cloud risk management program and a traditional risk management program?

Options:
A.

Virtualization of the IT landscape

B.

Shared responsibility model

C.

Risk management practices adopted by the cloud service provider

D.

Hosting sensitive information in the cloud environment

Questions 36

Which of the following processes should be performed FIRST to properly implement the NIST SP 800-53 r4 control framework in an organization?

Options:
A.

A selection of the security objectives the organization wants to improve

B.

A security categorization of the information systems

C.

A comprehensive business impact analysis (BIA)

D.

A comprehensive tailoring of the controls of the framework

Questions 37

When developing a cloud compliance program, what is the PRIMARY reason for a cloud customer

Options:
A.

To determine the total cost of the cloud services to be deployed

B.

To confirm whether the compensating controls implemented are sufficient for the cloud

services

C.

To determine how those services will fit within its policies and procedures

D.

To confirm which vendor will be selected based on compliance with security requirements

Questions 38

Regarding cloud service provider agreements and contracts, unless otherwise stated, the provider is:

Options:
A.

responsible to the cloud customer and its clients.

B.

responsible only to the cloud customer.

C.

not responsible at all to any external parties.

D.

responsible to the cloud customer and its end users

Questions 39

A cloud auditor should use statistical sampling rather than judgment (nonstatistical) sampling when:

Options:
A.

generalized audit software is unavailable.

B.

the auditor wants to avoid sampling risk.

C.

the probability of error must be objectively quantified.

D.

the tolerable error rate cannot be determined.

Questions 40

Which of the following is a KEY benefit of using the Cloud Controls Matrix (CCM)?

Options:
A.

CCM uses a specific control for Infrastructure as a Service (IaaS).

B.

CCM maps to existing security standards, best practices, and regulations.

C.

CCM V4 is an improved version from CCM V3.0.1.

D.

CCM utilizes an ITIL framework to define the capabilities needed to manage the IT services and security services.