Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CCAK Topic 2 Question 46 Discussion

Actual exam question for Isaca's CCAK exam
Question #: 46
Topic #: 2
[All CCAK Questions]

Which of the following is the MOST significant difference between a cloud risk management program and a traditional risk management program?

Show Suggested Answer Hide Answer
Suggested Answer: D

A detective control is a type of internal control that seeks to uncover problems in a company's processes once they have occurred1.Examples of detective controls include physical inventory checks, reviews of account reports and reconciliations, as well as assessments of current controls1.Detective controls use platform telemetry to detect misconfigurations, vulnerabilities, and potentially malicious activity in the cloud environment2.

In a Software as a Service (SaaS) service provider, privileged access monitoring is a detective control that can help identify unauthorized or suspicious activities by users who have elevated permissions to access or modify cloud resources, data, or configurations.Privileged access monitoring can involve logging, auditing, alerting, and reporting on the actions performed by privileged users3. This can help detect security incidents, compliance violations, or operational errors in a timely manner and enable appropriate responses.

Data encryption, incident management, and network segmentation are examples of preventive controls, which are designed to prevent problems from occurring in the first place.Data encryption protects the confidentiality and integrity of data by transforming it into an unreadable format that can only be decrypted with a valid key1.Incident management is a process that aims to restore normal service operations as quickly as possible after a disruption or an adverse event4.Network segmentation divides a network into smaller subnetworks that have different access levels and security policies, reducing the attack surface and limiting the impact of a breach1.


Detective controls - SaaS Lens - docs.aws.amazon.com3, section on Privileged access monitoring

Detective controls | Cloud Architecture Center | Google Cloud2, section on Detective controls

Internal control: how do preventive and detective controls work?4, section on SaaS Solutions to Support Internal Control

Detective Control: Definition, Examples, Vs.Preventive Control1, section on What Is a Detective Control?

Contribute your Thoughts:

Virgilio
1 months ago
I heard the cloud is so secure, they use cloudblock encryption. You know, to keep the data safe from the cloud monsters.
upvoted 0 times
Stephane
2 days ago
C) Risk management practices adopted by the cloud service provider
upvoted 0 times
...
Rolland
6 days ago
B) Shared responsibility model
upvoted 0 times
...
Georgeanna
12 days ago
A) Virtualization of the IT landscape
upvoted 0 times
...
...
Ma
2 months ago
Ah, the cloud - where the only thing raining is a deluge of risk management challenges! Time to brush up on those shared responsibility skills.
upvoted 0 times
...
Pura
2 months ago
Hosting sensitive information in the cloud is a game-changer. The risk profile is completely different, and you need to up your game to handle that.
upvoted 0 times
Virgie
4 days ago
C) Risk management practices adopted by the cloud service provider
upvoted 0 times
...
Truman
5 days ago
B) Shared responsibility model
upvoted 0 times
...
Allene
6 days ago
A) Virtualization of the IT landscape
upvoted 0 times
...
...
Tricia
2 months ago
Risk management practices adopted by the cloud provider are crucial. They have a lot more experience and resources to handle cloud-specific risks.
upvoted 0 times
Nenita
20 days ago
C) Risk management practices adopted by the cloud service provider
upvoted 0 times
...
Isabelle
28 days ago
B) Shared responsibility model
upvoted 0 times
...
Nell
1 months ago
A) Virtualization of the IT landscape
upvoted 0 times
...
...
Leota
2 months ago
I think the virtualization of the IT landscape is the most significant difference. The cloud abstraction changes how we approach risk management in fundamental ways.
upvoted 0 times
...
Noelia
2 months ago
The shared responsibility model is the key difference here. In the cloud, the provider takes on a lot of the risk management tasks, which is a major shift from traditional on-premises setups.
upvoted 0 times
Cathern
23 days ago
Definitely. It's a big shift from the traditional way of handling risk management.
upvoted 0 times
...
Lenita
27 days ago
That's interesting. The shared responsibility model really changes the game when it comes to risk management in the cloud.
upvoted 0 times
...
Erasmo
28 days ago
D) Hosting sensitive information in the cloud environment
upvoted 0 times
...
Serita
29 days ago
C) Risk management practices adopted by the cloud service provider
upvoted 0 times
...
Mattie
1 months ago
B) Shared responsibility model
upvoted 0 times
...
Izetta
2 months ago
A) Virtualization of the IT landscape
upvoted 0 times
...
...
Wei
2 months ago
I believe hosting sensitive information in the cloud environment is the key difference.
upvoted 0 times
...
An
2 months ago
I agree with Lili, the shared responsibility model changes the game in cloud risk management.
upvoted 0 times
...
Lili
3 months ago
I think the shared responsibility model is the most significant difference.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77