ISACA CCAK Certificate of Cloud Auditing Knowledge Online Training
ISACA CCAK Online Training
The questions for CCAK were last updated at Jul 16,2025.
- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Jul 16,2025
Supply chain agreements between a cloud service provider and cloud customers should, at a minimum, include:
- A . regulatory guidelines impacting the cloud customer.
- B . audits, assessments, and independent verification of compliance certifications with agreement terms.
- C . the organizational chart of the provider.
- D . policies and procedures of the cloud customer
Which of the following is the reason for designing the Consensus Assessments Initiative Questionnaire (CAIQ)?
- A . Cloud service providers need the CAIQ to improve quality of customer service.
- B . Cloud service providers can document their security and compliance controls.
- C . Cloud service providers can document roles and responsibilities for cloud security.
- D . Cloud users can use CAIQ to sign statement of work (SOW) with cloud access security
An organization employing the Cloud Controls Matrix (CCM) to perform a compliance assessment leverages the Scope Applicability direct mapping to:
- A . obtain the ISO/IEC 27001 certification from an accredited certification body (CB) following the ISO/IEC 17021-1 standard.
- B . determine whether the organization can be considered fully compliant with the mapped standards because of the implementation of every CCM Control Specification.
- C . understand which controls encompassed by the CCM may already be partially or fully implemented because of the compliance with other standards.
Which of the following are the three MAIN phases of the Cloud Controls Matrix (CCM) mapping methodology?
- A . Initiation ― Execution ― Monitoring and Controlling
- B . Plan – Develop – Release
- C . Preparation ― Execution – Peer Review and Publication
When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?
- A . Determine the impact on confidentiality, integrity, and availability of the information system.
- B . Determine the impact on the physical and environmental security of the organization, excluding informational assets.
- C . Determine the impact on the controls that were selected by the organization to respond to identified risks.
- D . Determine the impact on the financial, operational, compliance, and reputation of the
Which of the following is an example of availability technical impact?
- A . The cloud provider reports a breach of customer personal data from an unsecured server.
- B . A hacker using a stolen administrator identity alters the discount percentage in the product database.
- C . A distributed denial of service (DDoS) attack renders the customer’s cloud inaccessible for 24 hours.
- D . An administrator inadvertently clicked on phish bait, exposing the company to a ransomware attack
Which of the following is an example of financial business impact?
- A . A distributed denial of service (DDoS) attack renders the customer’s cloud inaccessible for 24 hours, resulting in millions in lost sales.
- B . A hacker using a stolen administrator identity brings down the Software of a Service (SaaS) sales and marketing systems, resulting in the inability to process customer orders or manage customer relationships.
- C . While the breach was reported in a timely manner to the CEO, the CFO and CISO blamed each other in public, resulting in a loss of public confidence that led the board to replace all
After finding a vulnerability in an Internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite parts of some files with random data.
In reference to the Top Threats Analysis methodology, how would the technical impact of this incident be categorized?
- A . As an availability breach
- B . As a control breach
- C . As a confidentiality breach
- D . As an integrity breach
Which of the following is the GREATEST risk associated with hidden interdependencies between cloud services?
- A . The IT department does not clearly articulate the cloud to the organization.
- B . There is a lack of visibility over the cloud service providers’ supply chain.
- C . Customers do not understand cloud technologies in enough detail.
- D . Cloud services are very complicated.
It is MOST important for an auditor to be aware that an inventory of assets within a cloud environment:
- A . should be mapped only if discovered during the audit.
- B . is not fundamental for the security management program, as this is a cloud service.
- C . can be a misleading source of data.
- D . is fundamental for the security management program