ISACA CCAK Exam Questions
Certificate of Cloud Auditing Knowledge (Page 4 )

Updated On: 2-Mar-2026

The PRIMARY objective of an audit initiation meeting with a cloud audit client is to:

  1. select the methodology of the audit.
  2. review requested evidence provided by the audit client.
  3. discuss the scope of the cloud audit.
  4. identify resource requirements of the cloud audit.

Answer(s): C



Policies and procedures shall be established, and supporting business processes and technical measures implemented, for maintenance of several items ensuring continuity and availability of operations and support personnel. Which of the following controls BEST matches this control description?

  1. Operations Maintenance
  2. System Development Maintenance
  3. Equipment Maintenance
  4. System Maintenance

Answer(s): A


Reference:

https://www.sapidata.sm/img/cms/CAIQ_v3-1_2020-01-13.pdf (2)



An auditor identifies that a CSP received multiple customer inquiries and RFPs during the last month. Which of the following should be the BEST recommendation to reduce the CSP burden?

  1. CSP can share all security reports with customers to streamline the process.
  2. CSP can schedule a call with each customer.
  3. CSP can answer each customer individually.
  4. CSP can direct all customers’ inquiries to the information in the CSA STAR registry.

Answer(s): D

Explanation:


Reference:

https://cloudsecurityalliance.org/star/registry/



Which of the following approaches encompasses social engineering of staff, bypassing of physical access controls and penetration testing?

  1. Blue team
  2. White box
  3. Gray box
  4. Red team

Answer(s): B


Reference:

https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/planning-for-informationsecurity-testinga-practical-approach



When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?

  1. Determine the impact on the controls that were selected by the organization to respond to identified risks.
  2. Determine the impact on confidentiality, integrity and availability of the information system.
  3. Determine the impact on the financial, operational, compliance and reputation of the organization.
  4. Determine the impact on the physical and environmental security of the organization, excluding informational assets.

Answer(s): D



Viewing page 4 of 63
Viewing questions 16 - 20 out of 334 questions



Post your Comments and Discuss ISACA CCAK exam dumps with other Community members:

CCAK Exam Discussions & Posts

AI Tutor