ISACA CCAK Practice Exams
Last updated on Apr 05,2025- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Apr 05,2025
Which of the following is the BEST tool to perform cloud security control audits?
- A . General Data Protection Regulation (GDPR)
- B . Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)
- C . Federal Information Processing Standard (FIPS) 140-2
- D . ISO 27001
Which of the following BEST ensures adequate restriction on the number of people who can access the pipeline production environment?
- A . Separation of production and development pipelines
- B . Ensuring segregation of duties in the production and development pipelines
- C . Role-based access controls in the production and development pipelines
- D . Periodic review of the continuous integration and continuous delivery (CI/CD) pipeline audit logs to identify any access violations
Which of the following is the MOST important audit scope document when conducting a review of a cloud service provider?
- A . Documentation criteria for the audit evidence
- B . Testing procedure to be performed
- C . Processes and systems to be audited
- D . Updated audit work program
DevSecOps aims to integrate security tools and processes directly into the software development life cycle and should be done:
- A . at the end of the development cycle.
- B . after go-live.
- C . in all development steps.
- D . at the beginning of the development cycle.
Which of the following aspects of risk management involves identifying the potential reputational and financial harm when an incident occurs?
- A . Impact analysis
- B . Likelihood
- C . Mitigation
- D . Residual risk
The Cloud Octagon Model was developed to support organizations’:
- A . risk treatment methodology.
- B . incident detection methodology.
- C . incident response methodology.
- D . risk assessment methodology.
Which of the following is the reason for designing the Consensus Assessments Initiative Questionnaire (CAIQ)?
- A . Cloud service providers need the CAIQ to improve quality of customer service.
- B . Cloud service providers can document their security and compliance controls.
- C . Cloud service providers can document roles and responsibilities for cloud security.
- D . Cloud users can use CAIQ to sign statement of work (SOW) with cloud access security
Which of the following would be considered as a factor to trust in a cloud service provider?
- A . The level of willingness to cooperate
- B . The level of exposure for public information
- C . The level of open source evidence available
- D . The level of proven technical skills
Management planes deployed in cloud environments may pose a risk of potentially allowing access to the entire environment.
Which of the following controls is MOST appropriate for mitigating this risk?
- A . Change management
- B . Regular audits
- C . Access restriction
- D . Increased monitoring
While using Software as a Service (SaaS) to store secret customer information, an organization identifies a risk of disclosure to unauthorized parties. Although the SaaS service continues to be used, secret customer data is not processed.
Which of the following risk treatment methods is being practiced?
- A . Risk acceptance
- B . Risk transfer
- C . Risk mitigation
- D . Risk reduction