ISACA CCAK Übungsprüfungen
Zuletzt aktualisiert am 25.04.2025- Prüfungscode: CCAK
- Prüfungsname: Certificate of Cloud Auditing Knowledge
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 25.04.2025
Which of the following types of SOC reports BEST helps to ensure operating effectiveness of controls in a cloud service provider offering?
- A . SOC 3 Type 2
- B . SOC 2 Type 2
- C . SOC 1 Type 1
- D . SOC 2 Type 1
Which of the following would be the MOST critical finding of an application security and DevOps audit?
- A . Certifications with global security standards specific to cloud are not reviewed, and the impact of noted findings are not assessed.
- B . Application architecture and configurations did not consider security measures.
- C . Outsourced cloud service interruption, breach, or loss of stored data occurred at the cloud service
provider. - D . The organization is not using a unified framework to integrate cloud compliance with regulatory requirements
From the perspective of a senior cloud security audit practitioner in an organization with a mature security program and cloud adoption, which of the following statements BEST describes the DevSecOps concept?
- A . Process of security integration using automation in software development
- B . Operational framework that promotes software consistency through automation
- C . Development standards for addressing integration, testing, and deployment issues
- D . Making software development simpler, faster, and easier using automation
Transparent data encryption is used for:
- A . data across communication channels.
- B . data currently being processed.
- C . data in random access memory (RAM).
- D . data and log files at rest
Regarding suppliers of a cloud service provider, it is MOST important for the auditor to be aware that the:
- A . client organization has a clear understanding of the provider s suppliers.
- B . suppliers are accountable for the provider’s service that they are providing.
- C . client organization does not need to worry about the provider’s suppliers, as this is the provider’s responsibility.
- D . client organization and provider are both responsible for the provider’s suppliers.
Which of the following BEST ensures adequate restriction on the number of people who can access the pipeline production environment?
- A . Separation of production and development pipelines
- B . Ensuring segregation of duties in the production and development pipelines
- C . Role-based access controls in the production and development pipelines
- D . Periodic review of the continuous integration and continuous delivery (CI/CD) pipeline audit logs to identify any access violations
When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?
- A . Determine the impact on confidentiality, integrity, and availability of the information system.
- B . Determine the impact on the physical and environmental security of the organization, excluding informational assets.
- C . Determine the impact on the controls that were selected by the organization to respond to identified risks.
- D . Determine the impact on the financial, operational, compliance, and reputation of the organization.
During the cloud service provider evaluation process, which of the following BEST helps identify baseline configuration requirements?
- A . Vendor requirements
- B . Product benchmarks
- C . Benchmark controls lists
- D . Contract terms and conditions
Which of the following cloud service models creates a cloud version of a contract template?
- A . Platform as a Service (PaaS)
- B . Infrastructure as a Service (laaS)
- C . Software as a Service (SaaS)
- D . Security as a Service (SecaaS)
The control domain feature within a Cloud Controls Matrix (CCM) represents:
- A . CCM’s ability to scan and check Active Directory, LDAP, and x.500 directories for suspicious and/or privileged user accounts.
- B . a logical grouping of security controls addressing the same category of IT risks or information security concerns.
- C . a set of application programming interfaces (APIs) that allows a cloud consumer to restrict the replication area within a well-defined jurisdictional perimeter.
- D . CCM’s ability to scan for anomalies in DNS zones in order to detect DNS spoofing, DNS hijacking, DNS cache poisoning, and similar threats.