ISACA CCAK Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: CCAK
- Prüfungsname: Certificate of Cloud Auditing Knowledge
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 26.04.2025
Which of the following is an example of availability technical impact?
- A . The cloud provider reports a breach of customer personal data from an unsecured server.
- B . A hacker using a stolen administrator identity alters the discount percentage in the product database.
- C . A distributed denial of service (DDoS) attack renders the customer’s cloud inaccessible for 24 hours.
- D . An administrator inadvertently clicked on phish bait, exposing the company to a ransomware attack
The PRIMARY objective for an auditor to understand the organization’s context for a cloud audit is to:
- A . determine whether the organization has carried out control self-assessment (CSA) and validated audit reports of the cloud service providers.
- B . validate an understanding of the organization’s current state and how the cloud audit plan fits into the existing audit approach.
- C . validate the organization’s performance effectiveness utilizing cloud service provider solutions.
- D . validate whether an organization has a cloud audit plan in place.
A certification target helps in the formation of a continuous certification framework by incorporating:
- A . the service level objective (SLO) and service qualitative objective (SQO).
- B . the scope description and security attributes to be tested.
- C . the frequency of evaluating security attributes.
- D . CSA STAR level 2 attestation.
A cloud service provider providing cloud services currently being used by the United States federal government should obtain which of the following to assure compliance to stringent government standards?
- A . CSA STAR Level Certificate
- B . Multi-Tier Cloud Security (MTCS) Attestation
- C . ISO/IEC 27001:2013 Certification
- D . FedRAMP Authorization
A cloud service customer is looking to subscribe to a finance solution provided by a cloud service provider. The provider has clarified that the audit logs cannot be taken out of the cloud environment by the customer to its security information and event management (SIEM) solution for monitoring purposes.
Which of the following should be the GREATEST concern to the auditor?
- A . The audit logs are overwritten every 30 days, and all past audit trail is lost.
- B . The audit trails are backed up regularly, but the backup is not encrypted.
- C . The provider does not maintain audit logs in their environment.
- D . The customer cannot monitor its cloud subscription on its own and must rely on the provider for monitoring purposes.
Which of the following is a cloud-native solution designed to counter threats that do not exist within the enterprise?
- A . Rule-based access control
- B . Attribute-based access control
- C . Policy-based access control
- D . Role-based access control
The BEST method to report continuous assessment of a cloud provider’s services to the Cloud Security Alliance (CSA) is through:
- A . Cloud Controls Matrix (CCM) assessment by a third-party auditor on a periodic basis.
- B . tools selected by the third-party auditor.
- C . SOC 2 Type 2 attestation.
- D . a set of dedicated application programming interfaces (APIs).
The effect of which of the following should have priority in planning the scope and objectives of a cloud audit?
- A . Applicable industry good practices
- B . Applicable statutory requirements
- C . Organizational policies and procedures
- D . Applicable corporate standards
Which of the following is MOST important to ensure effective cloud application controls are maintained in an organization?
- A . Control self-assessment (CSA)
- B . Third-party vendor involvement
- C . Exception reporting
- D . Application team internal review
Which of the following key stakeholders should be identified FIRST when an organization is designing a cloud compliance program?
- A . Cloud strategy owners
- B . Internal control function
- C . Cloud process owners
- D . Legal functions