ISACA CCAK Practice Exams
Last updated on Apr 02,2025- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Apr 02,2025
Which of the following activities are part of the implementation phase of a cloud assurance program during a cloud migration?
- A . Development of the monitoring goals and requirements
- B . Identification of processes, functions, and systems
- C . Identification of roles and responsibilities
- D . Identification of the relevant laws, regulations, and standards
What type of termination occurs at the initiative of one party and without the fault of the other party?
- A . Termination without the fault
- B . Termination at the end of the term
- C . Termination for cause
- D . Termination for convenience
Which of the following is the BEST control framework for a European manufacturing corporation that is migrating to the cloud?
- A . CSA’sGDPRCoC
- B . EUGDPR
- C . NIST SP 800-53
- D . PCI-DSS
The PRIMARY purpose of Open Certification Framework (OCF) for the CSA STAR program is to:
- A . facilitate an effective relationship between the cloud service provider and cloud client.
- B . ensure understanding of true risk and perceived risk by the cloud service users.
- C . provide global, accredited, and trusted certification of the cloud service provider.
- D . enable the cloud service provider to prioritize resources to meet its own requirements.
The Cloud Computing Compliance Controls Catalogue (C5) framework is maintained by which of the following agencies?
- A . National Institute of Standards and Technology (NIST)
- B . National Cybersecurity Agency of France (ANSSI) / Agency national de la securite des systems information (ANSSI)
- C . Federal Office for Information Security in Germany (BSI) / Bundesamt fur Sicherheit in der Informationstechnik (BSI)
- D . National Security Agency (NSA)
From the perspective of a senior cloud security audit practitioner in an organization with a mature security program and cloud adoption, which of the following statements BEST describes the DevSecOps concept?
- A . Process of security integration using automation in software development
- B . Operational framework that promotes software consistency through automation
- C . Development standards for addressing integration, testing, and deployment issues
- D . Making software development simpler, faster, and easier using automation
Which of the following cloud service provider activities MUST obtain a client’s approval?
- A . Destroying test data
- B . Deleting subscription owner accounts
- C . Deleting test accounts
- D . Deleting guest accounts
To ensure integration of security testing is implemented on large code sets in environments where time to completion is critical, what form of validation should an auditor expect?
- A . Parallel testing
- B . Full application stack unit testing
- C . Functional verification
- D . Regression testing
With regard to the Cloud Controls Matrix (CCM), the Architectural Relevance is a feature that enables the filtering of security controls by:
- A . relevant architecture frameworks such as the NIST Enterprise Architecture Model, the Federal Enterprise Architecture Framework (FEAF), The Open Group Architecture Framework (TOGAF). and the Zachman Framework for Enterprise Architecture.
- B . relevant architectural paradigms such as Client-Server, Mainframe, Peer-to-Peer, and SmartClient-Backend.
- C . relevant architectural components such as Physical, Network, Compute, Storage, Application, and Data.
- D . relevant delivery models such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (laaS).
To BEST prevent a data breach from happening, cryptographic keys should be:
- A . distributed in public-facing repositories.
- B . embedded in source code.
- C . rotated regularly.
- D . transmitted in clear text.