ISACA CCAK Certificate of Cloud Auditing Knowledge Online Training
ISACA CCAK Online Training
The questions for CCAK were last updated at Jul 18,2025.
- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Jul 18,2025
The BEST method to report continuous assessment of a cloud provider’s services to the Cloud Security Alliance (CSA) is through:
- A . Cloud Controls Matrix (CCM) assessment by a third-party auditor on a periodic basis.
- B . tools selected by the third-party auditor.
- C . SOC 2 Type 2 attestation.
- D . a set of dedicated application programming interfaces (APIs).
To support a customer’s verification of the cloud service provider claims regarding its responsibilities according to the shared responsibility model, which of the following tools and techniques is appropriate?
- A . External audit
- B . Internal audit
- C . Contractual agreement
- D . Security assessment
Which of the following is a category of trust in cloud computing?
- A . Loyalty-based trust
- B . Background-based trust
- C . Reputation-based trust
- D . Transparency-based trust
When establishing cloud governance, an organization should FIRST test by migrating:
- A . legacy applications to the cloud.
- B . a few applications to the cloud.
- C . all applications at once to the cloud.
- D . complex applications to the cloud
Which of the following methods can be used by a cloud service provider with a cloud customer that does not want to share security and control information?
- A . Nondisclosure agreements (NDAs)
- B . Independent auditor report
- C . First-party audit
- D . Industry certifications
Application programming interfaces (APIs) are likely to be attacked continuously by bad actors because they:
- A . are the asset with private IP addresses.
- B . are generally the most exposed part.
- C . could be poorly designed.
- D . act as a very effective backdoor.
In a multi-level supply chain structure where cloud service provider A relies on other sub cloud services, the provider should ensure that any compliance requirements relevant to the provider are:
- A . treated as confidential information and withheld from all sub cloud service providers.
- B . treated as sensitive information and withheld from certain sub cloud service providers.
- C . passed to the sub cloud service providers.
- D . passed to the sub cloud service providers based on the sub cloud service providers’ geographic location.
Which of the following cloud service provider activities MUST obtain a client’s approval?
- A . Destroying test data
- B . Deleting subscription owner accounts
- C . Deleting test accounts
- D . Deleting guest accounts
A contract containing the phrase "You automatically consent to these terms by using or logging into the service to which they pertain" is establishing a contract of:
- A . exclusivity.
- B . adhesion.
- C . execution.
- D . exclusion.
Regarding cloud service provider agreements and contracts, unless otherwise stated, the provider is:
- A . responsible to the cloud customer and its clients.
- B . responsible only to the cloud customer.
- C . not responsible at all to any external parties.
- D . responsible to the cloud customer and its end users