ISACA CCAK Übungsprüfungen
Zuletzt aktualisiert am 25.04.2025- Prüfungscode: CCAK
- Prüfungsname: Certificate of Cloud Auditing Knowledge
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 25.04.2025
What should be the control audit frequency for an organization’s business continuity management and operational resilience strategy?
- A . Annually
- B . Biannually
- C . Quarterly
- D . Monthly
An auditor is auditing the services provided by a cloud service provider.
When evaluating the security of the cloud customer’s data in the cloud, which of the following should be of GREATEST concern to the auditor?
- A . Personally identifiable information (Pll) is pseudonymized but not fully encrypted.
- B . The cloud customer has encrypted the confidential data in the cloud using its own encryption keys.
- C . The confidential data stored in the cloud is encrypted using encryption keys that are managed by the provider.
- D . According to the cloud customer’s data handling policy, all confidential data should be encrypted, but the confidential data stored in the cloud is well segmented but not encrypted.
Which of the following aspects of risk management involves identifying the potential reputational and financial harm when an incident occurs?
- A . Impact analysis
- B . Likelihood
- C . Mitigation
- D . Residual risk
The CSA STAR Certification is based on criteria outlined the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) in addition to:
- A . GDPR CoC certification.
- B . GB/T 22080-2008.
- C . SOC 2 Type 1 or 2 reports.
- D . ISO/IEC 27001 implementation.
An auditor identifies that a cloud service provider received multiple customer inquiries and requests for proposal (RFPs) during the last month.
Which of the following should be the BEST recommendation to reduce the provider’s burden?
- A . The provider can schedule a call with each customer.
- B . The provider can share all security reports with customers to streamline the process.
- C . The provider can answer each customer individually.
- D . The provider can direct all customer inquiries to the information in the CSA STAR registry
From a compliance perspective, which of the following artifacts should an assessor review when evaluating the effectiveness of Infrastructure as Code deployments?
- A . Evaluation summaries
- B . logs
- C . SOC reports
- D . Interviews
A cloud auditor should use statistical sampling rather than judgment (nonstatistical) sampling when:
- A . generalized audit software is unavailable.
- B . the auditor wants to avoid sampling risk.
- C . the probability of error must be objectively quantified.
- D . the tolerable error rate cannot be determined.
When mapping controls to architectural implementations, requirements define:
- A . control objectives.
- B . control activities.
- C . guidelines.
- D . policies.
An auditor examining a cloud service provider’s service level agreement (SLA) should be MOST concerned about whether:
- A . the agreement includes any operational matters that are material to the service operations.
- B . the agreement excludes any sourcing and financial matters that are material in meeting the service level agreement (SLA).
- C . the agreement includes any service availability matters that are material to the service operations.
- D . the agreement excludes any operational matters that are material to the service operations
Which of the following methods can be used by a cloud service provider with a cloud customer that does not want to share security and control information?
- A . Nondisclosure agreements (NDAs)
- B . Independent auditor report
- C . First-party audit
- D . Industry certifications