Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CCAK Topic 3 Question 61 Discussion

Actual exam question for Isaca's CCAK exam
Question #: 61
Topic #: 3
[All CCAK Questions]

A business unit introducing cloud technologies to the organization without the knowledge or approval of the appropriate governance function is an example of:

Show Suggested Answer Hide Answer
Suggested Answer: C

Shadow IT refers to the use of IT resources (hardware, software, or cloud services) within an organization without the explicit approval of the IT or governance team. This practice is often flagged in cloud audits due to potential risks of compliance violations and security threats. The CCAK documentation from ISACA highlights the need for visibility and governance over all IT assets, with specific controls listed in the CSA CCM for Cloud Governance (GOV-09). Shadow IT poses risks to data security, compliance, and can introduce vulnerabilities, as systems are not subject to organizational standards and oversight.


Contribute your Thoughts:

Maryann
7 months ago
Without a doubt, C) Shadow IT. This is the IT equivalent of a kid trying to sneak a cookie before dinner.
upvoted 0 times
...
Bernardine
7 months ago
I think it could also be considered a Threat, as it opens up the organization to potential security breaches.
upvoted 0 times
...
Lisbeth
7 months ago
I agree with Elbert. It's definitely Shadow IT because it's unauthorized and can pose risks to the organization.
upvoted 0 times
...
Vilma
7 months ago
C) Shadow IT, hands down. It's like they're playing IT hide and seek, but the IT team always loses.
upvoted 0 times
Dorcas
5 months ago
B) Threats from Shadow IT can undermine the organization's IT strategy.
upvoted 0 times
...
Stevie
5 months ago
C) Shadow IT can lead to data breaches and compliance issues.
upvoted 0 times
...
Darci
6 months ago
A) IT exception is important to prevent unauthorized technology implementations.
upvoted 0 times
...
Blair
6 months ago
C) Shadow IT is a big problem. It can create security risks for the organization.
upvoted 0 times
...
...
Elbert
7 months ago
C) Shadow IT
upvoted 0 times
...
Mona
7 months ago
Ah, good ol' Shadow IT. Gotta love how creative these employees can get when they want to bypass the system.
upvoted 0 times
...
Bok
7 months ago
Hmm, I was torn between C and D, but I think C is the better option. Shadow IT is the perfect term for this scenario.
upvoted 0 times
Herminia
6 months ago
User 3: It's important for businesses to have proper governance in place to avoid these situations.
upvoted 0 times
...
Allene
6 months ago
User 2: Yeah, introducing cloud technologies without approval is a classic example of Shadow IT.
upvoted 0 times
...
Hayley
6 months ago
User 1: I agree, Shadow IT is definitely the right choice.
upvoted 0 times
...
...
Jamal
7 months ago
C) Shadow IT - that's definitely the correct answer here. Sneaking in cloud tech without approval? That's a classic case of Shadow IT.
upvoted 0 times
Fallon
6 months ago
Organizations need to have clear policies in place to prevent unauthorized technology use.
upvoted 0 times
...
Jeff
6 months ago
Shadow IT can also lead to compliance issues if not properly managed.
upvoted 0 times
...
Sheridan
6 months ago
The IT department needs to be aware of all technology being used in the organization.
upvoted 0 times
...
In
6 months ago
It's important for all technology implementations to go through the proper channels for approval.
upvoted 0 times
...
Stephanie
6 months ago
Shadow IT can lead to security breaches and compliance issues.
upvoted 0 times
...
Dannie
6 months ago
It's important for all technology implementations to go through the proper channels.
upvoted 0 times
...
Levi
7 months ago
Yes, you're right. Shadow IT can create security risks for the organization.
upvoted 0 times
...
Lilli
7 months ago
Yes, you're right. Shadow IT can pose a lot of risks to the organization.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77