ISACA CCAK Exam
Certificate of Cloud Auditing Knowledge (Page 10 )

Updated On: 1-Feb-2026

When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?

  1. Determine the impact on the controls that were selected by the organization to respond to identified risks.
  2. Determine the impact on confidentiality, integrity and availability of the information system.
  3. Determine the impact on the financial, operational, compliance and reputation of the organization.
  4. Determine the impact on the physical and environmental security of the organization, excluding informational assets.

Answer(s): D



Which of the following approaches encompasses social engineering of staff, bypassing of physical access controls and penetration testing?

  1. Blue team
  2. White box
  3. Gray box
  4. Red team

Answer(s): B


Reference:

https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/planning-for-informationsecurity-testinga-practical-approach



An auditor identifies that a CSP received multiple customer inquiries and RFPs during the last month. Which of the following should be the BEST recommendation to reduce the CSP burden?

  1. CSP can share all security reports with customers to streamline the process.
  2. CSP can schedule a call with each customer.
  3. CSP can answer each customer individually.
  4. CSP can direct all customers’ inquiries to the information in the CSA STAR registry.

Answer(s): D

Explanation:


Reference:

https://cloudsecurityalliance.org/star/registry/



Policies and procedures shall be established, and supporting business processes and technical measures implemented, for maintenance of several items ensuring continuity and availability of operations and support personnel. Which of the following controls BEST matches this control description?

  1. Operations Maintenance
  2. System Development Maintenance
  3. Equipment Maintenance
  4. System Maintenance

Answer(s): A


Reference:

https://www.sapidata.sm/img/cms/CAIQ_v3-1_2020-01-13.pdf (2)



The PRIMARY objective of an audit initiation meeting with a cloud audit client is to:

  1. select the methodology of the audit.
  2. review requested evidence provided by the audit client.
  3. discuss the scope of the cloud audit.
  4. identify resource requirements of the cloud audit.

Answer(s): C



Viewing page 10 of 63
Viewing questions 46 - 50 out of 334 questions



Post your Comments and Discuss ISACA CCAK exam prep with other Community members:

Join the CCAK Discussion