ISACA CCAK Practice Exams
Last updated on Apr 02,2025- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Apr 02,2025
In the context of Infrastructure as a Service (laaS), a vulnerability assessment will scan virtual machines to identify vulnerabilities in:
- A . both operating system and application infrastructure contained within the cloud service
provider’s instances. - B . both operating system and application infrastructure contained within the customer’s instances.
- C . only application infrastructure contained within the cloud service provider’s instances.
- D . only application infrastructure contained within the customer’s instance
Which of the following is the reason for designing the Consensus Assessments Initiative Questionnaire (CAIQ)?
- A . Cloud users can use CAIQ to sign statement of work (SOW) with cloud access security brokers (CASBs).
- B . Cloud service providers can document roles and responsibilities for cloud security.
- C . Cloud service providers can document their security and compliance controls.
- D . Cloud service providers need the CAIQ to improve quality of customer service
During an audit, it was identified that a critical application hosted in an off-premises cloud is not part of the organization’s disaster recovery plan (DRP). Management stated that it is responsible for ensuring the cloud service provider has a plan that is tested annually.
What should be the auditor’s NEXT course of action?
- A . Review the security white paper of the provider.
- B . Review the provider’s audit reports.
- C . Review the contract and DR capability.
- D . Plan an audit of the provider
When mapping controls to architectural implementations, requirements define:
- A . control objectives.
- B . control activities.
- C . guidelines.
- D . policies.
The MOST critical concept for managing the building and testing of code in DevOps is:
- A . continuous build.
- B . continuous delivery.
- C . continuous integration.
- D . continuous deployment.
Which of the following is a category of trust in cloud computing?
- A . Loyalty-based trust
- B . Background-based trust
- C . Reputation-based trust
- D . Transparency-based trust
To promote the adoption of secure cloud services across the federal government by
- A . To providing a standardized approach to security and risk assessment
- B . To provide agencies of the federal government a dedicated tool to certify Authority to Operate (ATO)
- C . To enable 3PAOs to perform independent security assessments of cloud service providers
- D . To publish a comprehensive and official framework for the secure implementation of controls for cloud security
An auditor examining a cloud service provider’s service level agreement (SLA) should be MOST concerned about whether:
- A . the agreement includes any operational matters that are material to the service operations.
- B . the agreement excludes any sourcing and financial matters that are material in meeting the service level agreement (SLA).
- C . the agreement includes any service availability matters that are material to the service operations.
- D . the agreement excludes any operational matters that are material to the service operations
The control domain feature within a Cloud Controls Matrix (CCM) represents:
- A . CCM’s ability to scan and check Active Directory, LDAP, and x.500 directories for suspicious and/or privileged user accounts.
- B . a logical grouping of security controls addressing the same category of IT risks or information security concerns.
- C . a set of application programming interfaces (APIs) that allows a cloud consumer to restrict the replication area within a well-defined jurisdictional perimeter.
- D . CCM’s ability to scan for anomalies in DNS zones in order to detect DNS spoofing, DNS hijacking, DNS cache poisoning, and similar threats.
An organization is using the Cloud Controls Matrix (CCM) to extend its IT governance in the cloud.
Which of the following is the BEST way for the organization to take advantage of the supplier relationship feature?
- A . Filter out only those controls directly influenced by contractual agreements.
- B . Leverage this feature to enable the adoption of the Shared Responsibility Model.
- C . Filter out only those controls having a direct impact on current terms of service (TOS) and
service level agreement (SLA). - D . Leverage this feature to enable a smarter selection of the next cloud provider.