CCAK Online Practice Questions

Home / Cloud Security Alliance (CSA) / CCAK

Latest CCAK Exam Practice Questions

The practice questions for CCAK exam was last updated on 2025-06-03 .

Viewing page 1 out of 14 pages.

Viewing questions 1 out of 73 questions.

Question#1

Visibility to which of the following would give an auditor the BEST view of design and implementation decisions when an organization uses programmatic automation for Infrastructure as a Service (laaS) deployments?

A. Source code within build scripts
B. Output from threat modeling exercises
C. Service level agreements (SLAs)
D. Results from automated testing

Explanation:
Visibility to the source code within build scripts would give an auditor the best view of design and implementation decisions when an organization uses programmatic automation for Infrastructure as a Service (IaaS) deployments. IaaS is a cloud service model that provides virtualized computing resources, such as servers, storage, network, and operating systems, over the internet. Programmatic automation is the process of using code or scripts to automate the provisioning, configuration, management, and monitoring of the cloud infrastructure. Build scripts are files that contain commands or instructions to create or modify the cloud infrastructure according to the desired specifications.12
An auditor can use the source code within build scripts to gain insight into how the organization designs and implements its cloud infrastructure.
The source code can reveal the following information3:
The type, size, and number of cloud resources that are provisioned and deployed
The configuration settings and parameters that are applied to the cloud resources
The security controls and policies that are enforced on the cloud resources
The dependencies and relationships between the cloud resources
The testing and validation methods that are used to verify the functionality and performance of the cloud resources
The logging and auditing mechanisms that are used to track and record the changes and activities on the cloud resources
By reviewing the source code within build scripts, an auditor can evaluate whether the organization follows the best practices and standards for cloud infrastructure design and implementation, such as scalability, reliability, security, compliance, and efficiency. An auditor can also identify any gaps or risks in the organization’s cloud infrastructure and provide recommendations for improvement.
Reference: = What is Infrastructure as Code? | Cloud Computing - AWS1; What is Programmatic Automation? - Definition from Techopedia2; How to audit your IaC for better DevSecOps - TechBeacon3

Question#2

What areas should be reviewed when auditing a public cloud?

A. Patching and configuration
B. Vulnerability management and cyber security reviews
C. Identity and access management (IAM) and data protection
D. Source code reviews and hypervisor

Explanation:
Identity and access management (IAM) and data protection are the areas that should be reviewed when auditing a public cloud, as they are the key aspects of cloud security and compliance that affect both the cloud service provider and the cloud service customer. IAM and data protection refer to the methods and techniques that ensure the confidentiality, integrity, and availability of data and resources in the cloud environment. IAM involves the use of credentials, policies, roles, permissions, and tokens to verify the identity and access rights of users or devices. Data protection involves the use of encryption, backup, recovery, deletion, and retention to protect data from unauthorized access, modification, loss, or disclosure123.
Patching and configuration (A) are not the areas that should be reviewed when auditing a public cloud, as they are not the key aspects of cloud security and compliance that affect both the cloud service provider and the cloud service customer. Patching and configuration refer to the processes and practices that ensure the security, reliability, and performance of the cloud infrastructure, platform, or software. Patching involves the use of updates or fixes to address vulnerabilities, bugs, errors, or exploits that may compromise or affect the functionality of the cloud components. Configuration involves the use of settings or parameters to customize or optimize the functionality of the cloud components. Patching and configuration are mainly under the responsibility of the cloud service provider, as they own and operate the cloud infrastructure, platform, or software. The cloud service customer has limited or no access or control over these aspects123.
Vulnerability management and cyber security reviews (B) are not the areas that should be reviewed
when auditing a public cloud, as they are not specific or measurable aspects of cloud security and compliance that can be easily audited or tested. Vulnerability management and cyber security reviews refer to the processes and practices that identify, assess, treat, monitor, and report on the risks that affect the security posture of an organization or a domain. Vulnerability management involves the use of tools or techniques to scan, analyze, prioritize, remediate, or mitigate vulnerabilities that may expose an organization or a domain to threats or attacks. Cyber security reviews involve the use of tools or techniques to evaluate, measure, benchmark, or improve the security capabilities or maturity of an organization or a domain. Vulnerability management and cyber security reviews are general or broad terms that encompass various aspects of cloud security and compliance, such as IAM, data protection, patching, configuration, etc. Therefore, they are not specific or measurable areas that can be audited or tested individually123.
Source code reviews and hypervisor (D) are not the areas that should be reviewed when auditing a public cloud, as they are not relevant or accessible aspects of cloud security and compliance for most cloud service customers. Source code reviews refer to the processes and practices that examine the source code of software applications or systems to identify errors, bugs, vulnerabilities, or inefficiencies that may affect their quality, functionality, or security. Hypervisor refers to the software that allows the creation and management of virtual machines on a physical server. Source code reviews and hypervisor are mainly under the responsibility of the cloud service provider, as they own and operate the software applications or systems that deliver cloud services. The cloud service customer has no access or control over these aspects123.
Reference: = Cloud Audits: A Guide for Cloud Service Providers - Cloud Standards …
Cloud Audits: A Guide for Cloud Service Customers - Cloud Standards …
Cloud Auditing Knowledge: Preparing for the CCAK Certificate Exam

Question#3

What type of termination occurs at the initiative of one party and without the fault of the other party?

A. Termination without the fault
B. Termination at the end of the term
C. Termination for cause
D. Termination for convenience

Explanation:
Termination for convenience is a contractual provision that allows one party to unilaterally terminate the contract without the fault of the other party. This type of termination does not require the terminating party to prove that the other party has failed to meet their obligations or is at fault in any way. Instead, it is often used to end a contract when it is no longer in the best interest of the terminating party to continue, for reasons that may include changes in business strategy, financial considerations, or other external factors.
Reference = The concept of termination for convenience is commonly found in various contractual agreements and is a standard clause in government contracts, allowing the government to terminate a contract when it is deemed to be in the public interest. While the search did not yield specific CCAK documents detailing this type of termination, it is a well-established principle in contract law and is likely covered under the broader topic of contract management within the CCAK curriculum.

Question#4

Which of the following helps an organization to identify control gaps and shortcomings in the context of cloud computing?

A. Walk-through peer review
B. Periodic documentation review
C. User security awareness training
D. Monitoring effectiveness

Explanation:
Periodic documentation review is a critical process that helps organizations identify control gaps and shortcomings, particularly in the context of cloud computing. This process involves regularly examining the documentation of processes, controls, and policies to ensure they are up-to-date and effective. It allows an organization to verify that the controls are operating as intended and to discover any areas where the controls may not fully address the organization’s requirements or the unique risks associated with cloud services. By conducting these reviews, organizations can maintain compliance with relevant regulations and standards, and ensure continuous improvement in their cloud security posture.
Reference = The significance of periodic documentation review is highlighted in cloud auditing and security best practices, as outlined by the Cloud Security Alliance (CSA) and the Certificate of Cloud Auditing Knowledge (CCAK) program12. These resources emphasize the importance of regular reviews as part of a comprehensive cloud governance and compliance strategy.

Question#5

It is MOST important for an auditor to be aware that an inventory of assets within a cloud environment:

A. should be mapped only if discovered during the audit.
B. is not fundamental for the security management program, as this is a cloud service.
C. can be a misleading source of data.
D. is fundamental for the security management program

Explanation:
It is most important for an auditor to be aware that an inventory of assets within a cloud environment is fundamental for the security management program. An inventory of assets is a list of all the hardware, software, data, and services that are owned, used, or managed by an organization in the cloud. An inventory of assets helps the organization to identify, classify, and prioritize its cloud resources and to implement appropriate security controls and policies to protect them. An inventory of assets also helps the organization to comply with relevant regulations, standards, and contracts that may apply to its cloud environment.12
An auditor should be aware of the importance of an inventory of assets in the cloud because it provides a baseline for assessing the security posture and compliance status of the organization’s cloud environment. An auditor can use the inventory of assets to verify that the organization has a clear and accurate understanding of its cloud resources and their characteristics, such as location, ownership, configuration, dependencies, vulnerabilities, and risks. An auditor can also use the inventory of assets to evaluate whether the organization has implemented adequate security measures and processes to protect its cloud resources from threats and incidents. An auditor can also use the inventory of assets to identify any gaps or weaknesses in the organization’s security management program and to provide recommendations for improvement.34
Reference: = Why is IT Asset Inventory Management Critical? - Fresh Security1; Use asset inventory to manage your resources’ security posture2; The importance of asset inventory in cybersecurity3; The Importance Of Asset Inventory In Cyber Security And CMDB - Visore4

Exam Code: CCAKQ & A: 207 Q&AsUpdated:  2025-06-03

 Get All CCAK Q&As