Isaca Certificate of Cloud Auditing Knowledge CCAK Exam Questions

Page: 1 / 14
Total 207 questions
Question 1

Which of the following is a good candidate for continuous auditing?



Answer : C

Cryptography and authentication are good candidates for continuous auditing, as they are critical aspects of cloud security that require constant monitoring and verification. Cryptography and authentication refer to the methods and techniques that ensure the confidentiality, integrity, and availability of data and communications in the cloud environment. Cryptography involves the use of encryption algorithms and keys to protect data from unauthorized access or modification. Authentication involves the use of credentials and tokens to verify the identity and access rights of users or devices. Continuous auditing can help to assess the effectiveness and compliance of cryptography and authentication controls, such as data encryption, key management, password policies, multifactor authentication, single sign-on, etc.Continuous auditing can also help to detect and alert any anomalies or issues that may compromise or affect cryptography and authentication, such as data breaches, key leakage, password cracking, unauthorized access, etc123.

Procedures (A) are not good candidates for continuous auditing, as they are not specific or measurable aspects of cloud security that can be easily automated or tested. Procedures refer to the steps or actions that are performed to achieve a certain objective or result in a specific domain or context. Procedures may vary depending on the type, nature, or complexity of the task or process involved. Continuous auditing requires a clear and consistent definition of the expected outcome or output, as well as the criteria or metrics to evaluate it.Procedures may not provide such a definition or criteria, and may require human judgment or interpretation to assess their effectiveness or compliance123.

Governance (B) is not a good candidate for continuous auditing, as it is not a specific or measurable aspect of cloud security that can be easily automated or tested. Governance refers to the framework or system that defines the roles, responsibilities, policies, standards, procedures, and practices for managing and overseeing an organization or a domain. Governance may involve multiple stakeholders, such as management, board of directors, regulators, auditors, customers, etc., who have different interests, expectations, or perspectives. Continuous auditing requires a clear and consistent definition of the expected outcome or output, as well as the criteria or metrics to evaluate it.Governance may not provide such a definition or criteria, and may require human judgment or interpretation to assess its effectiveness or compliance123.

Documentation quality (D) is not a good candidate for continuous auditing, as it is not a specific or measurable aspect of cloud security that can be easily automated or tested. Documentation quality refers to the degree to which the documents that describe or support an organization or a domain are accurate, complete, consistent, relevant, and understandable. Documentation quality may depend on various factors, such as the purpose, audience, format, style, language, structure, content, etc., of the documents involved. Continuous auditing requires a clear and consistent definition of the expected outcome or output, as well as the criteria or metrics to evaluate it.Documentation quality may not provide such a definition or criteria, and may require human judgment or interpretation to assess its effectiveness or compliance123.Reference:=

Cloud Audits: A Guide for Cloud Service Providers - Cloud Standards ...

Cloud Audits: A Guide for Cloud Service Customers - Cloud Standards ...

Cloud Auditing Knowledge: Preparing for the CCAK Certificate Exam


Question 2

Which of the following standards is designed to be used by organizations for cloud services that intend to select controls within the process of implementing an information security management system based on ISO/IEC 27001?



Answer : A

ISO/IEC 27017:2015 is a standard that provides guidelines for information security controls applicable to the provision and use of cloud services by providing additional implementation guidance for relevant controls specified in ISO/IEC 27002, as well as additional controls with implementation guidance that specifically relate to cloud services1.ISO/IEC 27017:2015 is designed to be used by organizations for cloud services that intend to select controls within the process of implementing an information security management system based on ISO/IEC 270011. ISO/IEC 27001 is a standard that specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization.

ISO/IEC 27002 is a standard that provides a code of practice for information security controls, but it does not provide specific guidance for cloud services. NIST SP 800-146 is a publication that provides an overview of cloud computing, its characteristics, service models, deployment models, and security considerations, but it does not provide a standard for selecting controls for cloud services. CSA CCM is a framework that provides detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains, but it is not a standard that is based on ISO/IEC 27001.Reference:

ISO/IEC 27017:2015

[ISO/IEC 27001:2013]

[ISO/IEC 27002:2013]

[NIST SP 800-146]

[CSA CCM]


Question 3

Which of the following is an example of reputational business impact?



Answer : A

Reputational business impact refers to the effect on a company's reputation and public perception following an incident or action. Option A is an example of reputational impact because the public dispute among high-level executives after a breach was reported reflects poorly on the company's governance and crisis management capabilities. This public display of discord can erode stakeholder trust and confidence, potentially leading to a decline in the company's market value, customer base, and ability to attract and retain talent.

Reference= The answer is derived from the understanding of reputational risk and its consequences on businesses, as discussed in various cloud auditing and security resources.Reputational impact is a key consideration in the governance of cloud operations, which is a topic covered in the CCAK curriculum1234.


Question 4

To ensure a cloud service provider is complying with an organization's privacy requirements, a cloud auditor should FIRST review:



Answer : A

To ensure a cloud service provider is complying with an organization's privacy requirements, a cloud auditor should first review the organizational policies, standards, and procedures that define the privacy objectives, expectations, and responsibilities of the organization. The organizational policies, standards, and procedures should also reflect the legal and regulatory requirements that apply to the organization and its cloud service provider, as well as the best practices and guidelines for cloud privacy. The organizational policies, standards, and procedures should provide the basis for evaluating the cloud service provider's privacy practices and controls, as well as the contractual terms and conditions that govern the cloud service agreement.The cloud auditor should compare the organizational policies, standards, and procedures with the cloud service provider's self-disclosure statements, third-party audit reports, certifications, attestations, or other evidence of compliance123.

Reviewing the adherence to organization policies, standards, and procedures (B) is a subsequent step that the cloud auditor should perform after reviewing the organizational policies, standards, and procedures themselves. The cloud auditor should assess whether the cloud service provider is following the organization's policies, standards, and procedures consistently and effectively, as well as whether the organization is monitoring and enforcing the compliance of the cloud service provider.The cloud auditor should also identify any gaps or deviations between the organization's policies, standards, and procedures and the actual practices and controls of the cloud service provider123.

Reviewing the legal and regulatory requirements is an important aspect of ensuring a cloud service provider is complying with an organization's privacy requirements, but it is not the first step that a cloud auditor should take. The legal and regulatory requirements may vary depending on the jurisdiction, industry, or sector of the organization and its cloud service provider. The legal and regulatory requirements may also change over time or be subject to interpretation or dispute.Therefore, the cloud auditor should first review the organizational policies, standards, and procedures that incorporate and translate the legal and regulatory requirements into specific and measurable privacy objectives, expectations, and responsibilities for both parties123.

Reviewing the IT infrastructure (D) is not a relevant or sufficient step for ensuring a cloud service provider is complying with an organization's privacy requirements. The IT infrastructure refers to the hardware, software, network, and other components that support the delivery of cloud services. The IT infrastructure is only one aspect of cloud security and privacy, and it may not be accessible or visible to the cloud auditor or the organization.The cloud auditor should focus on reviewing the privacy practices and controls that are implemented by the cloud service provider at different layers of the cloud service model (IaaS, PaaS, SaaS), as well as the contractual terms and conditions that define the privacy rights and obligations of both parties123.Reference:=

Cloud Audits and Compliance: What You Need To Know - Linford & Company LLP

Trust in the Cloud in audits of cloud services - PwC

Cloud Compliance & Regulations Resources | Google Cloud


Question 5

In a situation where duties related to cloud risk management and control are split between an organization and its cloud service providers, which of the following would BEST help to ensure a coordinated approach to risk and control processes?



Answer : D

A centralized risk and controls dashboard is the best option for ensuring a coordinated approach to risk and control processes when duties are split between an organization and its cloud service providers. This dashboard provides a unified view of risk and control status across the organization and the cloud services it utilizes. It enables both parties to monitor and manage risks effectively and ensures that control activities are aligned and consistent. This approach supports proactive risk management and facilitates communication and collaboration between the organization and the cloud service provider.

Reference= The concept of a centralized risk and controls dashboard is supported by the Cloud Security Alliance (CSA) and ISACA, which emphasize the importance of visibility and coordination in cloud risk management.The CCAK materials and the Cloud Controls Matrix (CCM) provide guidance on establishing such dashboards as a means to manage and mitigate risks in a cloud environment12.


Question 6
Question 7

An auditor identifies that a cloud service provider received multiple customer inquiries and requests for proposal (RFPs) during the last month.

Which of the following should be the BEST recommendation to reduce the provider's burden?



Answer : D

The CSA STAR registry is a publicly accessible registry that documents the security and privacy controls provided by popular cloud computing offerings1The registry is designed for users of cloud services to assess their cloud providers' security and compliance posture, including the regulations, standards, and frameworks they adhere to1The registry also promotes industry transparency and reduces complexity and costs for both providers and customers2

The provider can direct all customer inquiries to the information in the CSA STAR registry, as this would be the best recommendation to reduce the provider's burden.By publishing to the registry, the provider can show current and potential customers their security and compliance posture, without having to fill out multiple customer questionnaires or requests for proposal (RFPs)2The provider can also leverage the different levels of assurance available in the registry, such as self-assessment, third-party audit, or certification, to demonstrate their security maturity and trustworthiness1The provider can also benefit from the CSA Trusted Cloud Providers program, which recognizes providers that have fulfilled additional training and volunteer requirements with CSA, demonstrating their commitment to cloud security competency and industry best practices3

The other options are not correct because:

Option A is not correct because the provider can schedule a call with each customer is not a good recommendation to reduce the provider's burden. Scheduling a call with each customer would be time-consuming, inefficient, and impractical, especially if the provider receives multiple inquiries and RFPs every month. Scheduling a call would also not guarantee that the customer would be satisfied with the provider's security and compliance posture, as they may still request additional information or evidence. Scheduling a call would also not help the provider differentiate themselves from other providers in the market, as they may not be able to showcase their security maturity and trustworthiness effectively.

Option B is not correct because the provider can share all security reports with customers to streamline the process is not a good recommendation to reduce the provider's burden. Sharing all security reports with customers may not be feasible, as some reports may contain sensitive or confidential information that should not be disclosed to external parties. Sharing all security reports may also not be desirable, as some reports may be outdated, incomplete, or inconsistent, which could undermine the provider's credibility and reputation. Sharing all security reports may also not be effective, as some customers may not have the expertise or resources to review and understand them properly.

Option C is not correct because the provider can answer each customer individually is not a good recommendation to reduce the provider's burden. Answering each customer individually would be tedious, repetitive, and costly, as the provider would have to provide similar or identical information to different customers over and over again. Answering each customer individually would also not ensure that the provider's security and compliance posture is consistent and accurate, as they may make mistakes or omissions in their responses. Answering each customer individually would also not help the provider stand out from other providers in the market, as they may not be able to highlight their security achievements and certifications.


Page:    1 / 14   
Total 207 questions