ISACA CCAK Certificate of Cloud Auditing Knowledge Online Training
ISACA CCAK Online Training
The questions for CCAK were last updated at Nov 26,2024.
- Exam Code: CCAK
- Exam Name: Certificate of Cloud Auditing Knowledge
- Certification Provider: ISACA
- Latest update: Nov 26,2024
In the context of Infrastructure as a Service (IaaS), a vulnerability assessment will scan virtual machines to identify vulnerabilities in:
- A . both operating system and application infrastructure contained within the CSP’s instances.
- B . both operating system and application infrastructure contained within the customer’s instances
- C . only application infrastructure contained within the CSP’s instances.
- D . only application infrastructure contained within the customer’s instances.
An independent contractor is assessing security maturity of a SaaS company against industry standards. The SaaS company has developed and hosted all their products using the cloud services provided by a third-party cloud service provider (CSP) .
What is the optimal and most efficient mechanism to assess the controls CSP is responsible for?
- A . Review third-party audit reports.
- B . Review CSP’s published questionnaires.
- C . Directly audit the CSP.
- D . Send supplier questionnaire to the CSP.
To ensure that cloud audit resources deliver the best value to the organization, the PRIMARY step would be to:
- A . develop a cloud audit plan on the basis of a detailed risk assessment.
- B . schedule the audits and monitor the time spent on each audit.
- C . train the cloud audit staff on current technology used in the organization.
- D . monitor progress of audits and initiate cost control measures.
After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data.
In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?
- A . As an integrity breach
- B . As control breach
- C . As an availability breach
- D . As a confidentiality breach
The MOST critical concept of managing the build and test of code in DevOps is:
- A . continuous build.
- B . continuous delivery.
- C . continuous deployment.
- D . continuous integration.