ISACA CCAK Practice Exams
Last updated on Apr 02,2025- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Apr 02,2025
Which of the following would be the MOST critical finding of an application security and DevOps audit?
- A . Certifications with global security standards specific to cloud are not reviewed, and the impact of noted findings are not assessed.
- B . Application architecture and configurations did not consider security measures.
- C . Outsourced cloud service interruption, breach, or loss of stored data occurred at the cloud service
provider. - D . The organization is not using a unified framework to integrate cloud compliance with regulatory requirements
Which of the following is the MOST relevant question in the cloud compliance program design phase?
- A . Who owns the cloud services strategy?
- B . Who owns the cloud strategy?
- C . Who owns the cloud governance strategy?
- D . Who owns the cloud portfolio strategy?
Organizations maintain mappings between the different control frameworks they adopt to:
- A . help identify controls with common assessment status.
- B . avoid duplication of work when assessing compliance,
- C . help identify controls with different assessment status.
- D . start a compliance assessment using the latest assessment.
The MAIN difference between the Cloud Controls Matrix (CCM) and the Consensus Assessment Initiative Questionnaire (CAIQ) is that:
- A . CCM assesses the presence of controls, whereas CAIQ assesses the overall security of a service.
- B . CCM has 14 domains, whereas CAIQ has 16 domains.
- C . CCM provides a controls framework, whereas CAIQ provides industry-accepted ways to document which security controls exist in Infrastructure as a Service (laaS), Platform as a Service (PaaS), and Software as a Service (SaaS) offerings.
- D . CCM has a set of security questions, whereas CAIQ has a set of security controls.
Which of the following BEST ensures adequate restriction on the number of people who can access the pipeline production environment?
- A . Ensuring segregation of duties in the production and development pipelines
- B . Periodic review of the continuous integration and continuous delivery (CI/CD) pipeline audit logs to identify any access violations
- C . Role-based access controls in the production and development pipelines
- D . Separation of production and development pipelines
Which of the following is MOST important to consider when an organization is building a compliance program for the cloud?
- A . The similarity of the cloud to the on-premise environment in terms of compliance
- B . The fairly static nature of the service portfolio and architecture of the cloud
- C . The rapidly changing service portfolio and architecture of the cloud
- D . That cloud providers should not be part of the compliance program
Which of the following is an example of availability technical impact?
- A . A distributed denial of service (DDoS) attack renders the customer’s cloud inaccessible for 24 hours.
- B . The cloud provider reports a breach of customer personal data from an unsecured server.
- C . An administrator inadvertently clicked on phish bait, exposing the company to a ransomware attack.
- D . A hacker using a stolen administrator identity alters the discount percentage in the product database
An organization employing the Cloud Controls Matrix (CCM) to perform a compliance assessment leverages the Scope Applicability direct mapping to:
- A . obtain the ISO/IEC 27001 certification from an accredited certification body (CB) following the ISO/IEC 17021-1 standard.
- B . determine whether the organization can be considered fully compliant with the mapped standards because of the implementation of every CCM Control Specification.
- C . understand which controls encompassed by the CCM may already be partially or fully implemented because of the compliance with other standards.
Which of the following is a direct benefit of mapping the Cloud Controls Matrix (CCM) to other international standards and regulations?
- A . CCM mapping enables cloud service providers and customers alike to streamline their own compliance and security efforts.
- B . CCM mapping entitles cloud service providers to be listed as an approved supplier for tenders and government contracts.
- C . CCM mapping entitles cloud service providers to be certified under the CSA STAR program.
- D . CCM mapping enables an uninterrupted data flow and in particular the export of personal data across different jurisdictions.
To ensure that compliance obligations for data residency in the cloud are aligned with an organization’s risk appetite, which of the following activities is MOST important to perform?
- A . Manage compliance obligations through a structured risk management process.
- B . Communicate the organization’s risk appetite across cloud service providers.
- C . Perform a cloud vendor assessment every time there is a change to data flows.
- D . Develop risk metrics to show how the organization is meeting the obligations.