ISACA CCAK Practice Exams
Last updated on Apr 02,2025- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Apr 02,2025
The BEST method to report continuous assessment of a cloud provider’s services to the Cloud Security Alliance (CSA) is through:
- A . Cloud Controls Matrix (CCM) assessment by a third-party auditor on a periodic basis.
- B . tools selected by the third-party auditor.
- C . SOC 2 Type 2 attestation.
- D . a set of dedicated application programming interfaces (APIs).
Which of the following is an example of reputational business impact?
- A . While the breach was reported in a timely manner to the CEO, the CFO and CISO blamed each other in public, resulting in a loss of public confidence that led the board to replace all three.
- B . The cloud provider fails to report a breach of customer personal data from an unsecured server, resulting in GDPR fines of 10 million euros.
- C . A distributed denial of service (DDoS) attack renders the customer’s cloud inaccessible for 24 hours, resulting in millions in lost sales.
- D . A hacker using a stolen administrator identity brings down the Software as a Service (SaaS) sales and marketing systems, resulting in the inability to process customer orders or manage customer relationships.
What is the MOST effective way to ensure a vendor is compliant with the agreed-upon cloud service?
- A . Examine the cloud provider’s certifications and ensure the scope is appropriate.
- B . Document the requirements and responsibilities within the customer contract
- C . Interview the cloud security team and ensure compliance.
- D . Pen test the cloud service provider to ensure compliance.
From an auditor perspective, which of the following BEST describes shadow IT?
- A . An opportunity to diversify the cloud control approach
- B . A weakness in the cloud compliance posture
- C . A strength of disaster recovery (DR) planning
- D . A risk that jeopardizes business continuity planning
What is below the waterline in the context of cloud operationalization?
- A . The controls operated by the customer
- B . The controls operated by both
- C . The controls operated by the cloud access security broker (CASB)
- D . The controls operated by the cloud service provider
Which of the following cloud environments should be a concern to an organization s cloud auditor?
- A . The cloud service provider s data center is more than 100 miles away.
- B . The technical team is trained on only one vendor Infrastructure as a Service (laaS) platform, but the organization has subscribed to another vendor’s laaS platform as an alternative.
- C . The organization entirely depends on several proprietary Software as a Service (SaaS) applications.
- D . The failover region of the cloud service provider is on another continent
Which of the following BEST describes the difference between a Type 1 and a Type 2 SOC report?
- A . A Type 2 SOC report validates the operating effectiveness of controls, whereas a Type 1 SOC report validates the suitability of the design of the controls.
- B . A Type 1 SOC report provides an attestation, whereas a Type 2 SOC report offers a certification.
- C . A Type 2 SOC report validates the suitability of the control design, whereas a Type 1 SOC report validates the operating effectiveness of controls.
- D . There is no difference between a Type 2 and a Type 1 SOC report.
A cloud service provider utilizes services of other service providers for its cloud service.
Which of the following is the BEST approach for the auditor while performing the audit for the cloud service?
- A . The auditor should review the service providers’ security controls even more strictly, as they are further separated from the cloud customer.
- B . The auditor should review the relationship between the cloud service provider and its service provider to help direct and estimate the level of effort and analysis the auditor should apply.
- C . As the contract for the cloud service is between the cloud customer and the cloud service provider, there is no need for the auditor to review the services provided by the service providers.
- D . As the relationship between the cloud service provider and its service providers is governed by separate contracts between them, there is no need for the auditor to review the services
Which of the following cloud service models creates a cloud version of a contract template?
- A . Platform as a Service (PaaS)
- B . Infrastructure as a Service (laaS)
- C . Software as a Service (SaaS)
- D . Security as a Service (SecaaS)
Which of the following methods can be used by a cloud service provider with a cloud customer that does not want to share security and control information?
- A . Nondisclosure agreements (NDAs)
- B . Independent auditor report
- C . First-party audit
- D . Industry certifications