Curious about Actual Isaca Certificate of Cloud Auditing Knowledge Exam Questions?
Here are sample Isaca Certificate of Cloud Auditing Knowledge (CCAK) Exam questions from real exam. You can get more Isaca Certificate of Cloud Auditing Knowledge (CCAK) Exam premium practice questions at TestInsights.
Which of the following would be the MOST critical finding of an application security and DevOps audit?
Correct : D
Outsourced cloud service interruption, breach, or loss of stored data occurred at the cloud service provider (B) would be a serious finding of an application security and DevOps audit, but not the most critical one. This finding would indicate that the cloud service provider failed to ensure the availability, confidentiality, and integrity of the cloud services and data that they provide to the organization. This finding would require investigation and resolution of the root cause and impact of the incident, as well as the implementation of preventive and corrective measures to avoid recurrence. This finding would also require review and verification of the contractual terms and conditions between the organization and the cloud service provider, as well as the service level agreements (SLAs) and recovery time objectives (RTOs) for the cloud services.
The organization is not using a unified framework to integrate cloud compliance with regulatory requirements would be an important finding of an application security and DevOps audit, but not the most critical one. This finding would indicate that the organization is not following a consistent and systematic approach to manage and monitor its cloud compliance with regulatory requirements, such as GDPR, HIPAA, PCI DSS, etc. This finding would require adoption and implementation of a unified framework to integrate cloud compliance with regulatory requirements, such as COBIT, NIST Cybersecurity Framework, or CIS Controls, as well as the alignment and integration of these frameworks with the DevOps process.
Start a Discussions
Which of the following aspects of risk management involves identifying the potential reputational and financial harm when an incident occurs?
Start a Discussions
Which of the following is the FIRST step of the Cloud Risk Evaluation Framework?
Start a Discussions
When performing audits in relation to business continuity management and operational resilience strategy, what would be the MOST critical aspect to audit in relation to the strategy of the cloud customer that should be formulated jointly with the cloud service provider?
Correct : A
Start a Discussions
During the cloud service provider evaluation process, which of the following BEST helps identify baseline configuration requirements?
Correct : C
Some examples of benchmark controls lists are:
Evaluation Criteria for Cloud Infrastructure as a Service - Gartner2, section on Security Controls
Checklist: Cloud Services Provider Evaluation Criteria | Synoptek3, section on Security
Cloud Controls Matrix | CSA4, section on Overview
NIST Special Publication 800-53 - NIST Pages5, section on Abstract
ISO/IEC 27017:2015(en), Information technology --- Security techniques ...6, section on Scope
What is vendor management?Definition from WhatIs.com7, section on Vendor management
What is Benchmarking?Definition from WhatIs.com8, section on Benchmarking
What is Terms and Conditions?Definition from WhatIs.com9, section on Terms and Conditions
Start a Discussions
Total 182 questions