ISACA CCAK Practice Exams
Last updated on Apr 14,2025- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Apr 14,2025
An auditor is assessing a European organization’s compliance.
Which regulation is suitable if health information needs to be protected?
- A . GDPR
- B . DPIA
- C . DPA
- D . HIPAA
From a compliance perspective, which of the following artifacts should an assessor review when evaluating the effectiveness of Infrastructure as Code deployments?
- A . Evaluation summaries
- B . logs
- C . SOC reports
- D . Interviews
What should be the control audit frequency for an organization’s business continuity management and operational resilience strategy?
- A . Annually
- B . Biannually
- C . Quarterly
- D . Monthly
The MAIN limitation of relying on traditional cloud compliance assurance approaches such as SOC2 attestations is that:
- A . they can only be performed by skilled cloud audit service providers.
- B . they are subject to change when the regulatory climate changes.
- C . they provide a point-in-time snapshot of an organization’s compliance posture.
- D . they place responsibility for demonstrating compliance on the vendor organization.
Which of the following configuration change controls is acceptable to a cloud auditor?
- A . Programmers have permanent access to production software.
- B . Programmers cannot make uncontrolled changes to the source code production version.
- C . Development, test, and production are hosted in the same network environment.
- D . The head of development approves changes requested to production.
Which of the following is MOST important to ensure effective cloud application controls are maintained in an organization?
- A . Control self-assessment (CSA)
- B . Third-party vendor involvement
- C . Exception reporting
- D . Application team internal review
The CSA STAR Certification is based on criteria outlined the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) in addition to:
- A . GDPR CoC certification.
- B . GB/T 22080-2008.
- C . SOC 2 Type 1 or 2 reports.
- D . ISO/IEC 27001 implementation.
What aspect of Software as a Service (SaaS) functionality and operations would the cloud customer be responsible for and should be audited?
- A . Source code reviews
- B . Patching
- C . Access controls
- D . Vulnerability management
Which of the following is a cloud-native solution designed to counter threats that do not exist within the enterprise?
- A . Rule-based access control
- B . Attribute-based access control
- C . Policy-based access control
- D . Role-based access control
What areas should be reviewed when auditing a public cloud?
- A . Identity and access management (IAM) and data protection
- B . Source code reviews and hypervisor
- C . Patching and configuration
- D . Vulnerability management and cyber security reviews