New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CCAK Exam Dumps - Certificate of Cloud Auditing Knowledge

Go to page:
Question # 9

Which of the following is an example of financial business impact?

A.

A distributed denial of service (DDoS) attack renders the customer's cloud inaccessible for

24 hours, resulting in millions in lost sales.

B.

A hacker using a stolen administrator identity brings down the Software of a Service (SaaS)

sales and marketing systems, resulting in the inability to process customer orders or

manage customer relationships.

C.

While the breach was reported in a timely manner to the CEO, the CFO and CISO blamed

each other in public consulting in a loss of public confidence that led the board to replace all

three.

Full Access
Question # 10

Market share and geolocation are aspects PRIMARILY related to:

A.

business perspective.

B.

cloud perspective.

C.

risk perspective.

D.

governance perspective.

Full Access
Question # 11

What is the MOST effective way to ensure a vendor is compliant with the agreed-upon cloud service?

A.

Examine the cloud provider's certifications and ensure the scope is appropriate.

B.

Document the requirements and responsibilities within the customer contract

C.

Interview the cloud security team and ensure compliance.

D.

Pen test the cloud service provider to ensure compliance.

Full Access
Question # 12

Regarding cloud service provider agreements and contracts, unless otherwise stated, the provider is:

A.

responsible to the cloud customer and its clients.

B.

responsible only to the cloud customer.

C.

not responsible at all to any external parties.

D.

responsible to the cloud customer and its end users

Full Access
Question # 13

Which of the following is the BEST method to demonstrate assurance in the cloud services to multiple cloud customers?

A.

Provider’s financial stability report and market value

B.

Reputation of the service provider in the industry

C.

Provider self-assessment and technical documents

D.

External attestation and certification audit reports

Full Access
Question # 14

Which of the following activities is performed outside information security monitoring?

A.

Management review of the information security framework

B.

Monitoring the effectiveness of implemented controls

C.

Collection and review of security events before escalation

D.

Periodic review of risks, vulnerabilities, likelihoods, and threats

Full Access
Question # 15

The MOST critical concept for managing the building and testing of code in DevOps is:

A.

continuous build.

B.

continuous delivery.

C.

continuous integration.

D.

continuous deployment.

Full Access
Question # 16

Under GDPR, an organization should report a data breach within what time frame?

A.

48 hours

B.

72 hours

C.

1 week

D.

2 weeks

Full Access
Go to page: