Isaca CCAK Actual Exam Questions

Last updated on July 7, 2025.

Topic 1 - Exam A

Question #1 Topic 1

Changes to which of the following will MOST likely influence the expansion or reduction of controls required to remediate the risk arising from changes to an organization’s SaaS vendor?

  • A. Risk exceptions policy
  • B. Contractual requirements
  • C. Risk appetite
  • D. Board oversight
Reveal Solution Hide Solution   Discussion   6

Correct Answer: B 🗳️

Question #2 Topic 1

A CSP contracts for a penetration test to be conducted on its infrastructures. The auditor engages the target with no prior knowledge of its defenses, assets, or channels. The CSP’s security operation center is not notified in advance of the scope of the audit and the test vectors. Which mode is selected by the CSP?

  • A. Double gray box
  • B. Tandem
  • C. Reversal
  • D. Double blind
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #3 Topic 1

Due to cloud audit team resource constraints, an audit plan as initially approved cannot be completed. Assuming that the situation is communicated in the cloud audit report, which course of action is MOST relevant?

  • A. Focusing on auditing high-risk areas
  • B. Testing the adequacy of cloud controls design
  • C. Relying on management testing of cloud controls
  • D. Testing the operational effectiveness of cloud controls
Reveal Solution Hide Solution   Discussion   1

Correct Answer: A 🗳️

Question #4 Topic 1

In an organization, how are policy violations MOST likely to occur?

  • A. By accident
  • B. Deliberately by the ISP
  • C. Deliberately
  • D. Deliberately by the cloud provider
Reveal Solution Hide Solution   Discussion   2

Correct Answer: A 🗳️

Question #5 Topic 1

Which of the following is the BEST tool to perform cloud security control audits?

  • A. General Data Protection Regulation (GDPR)
  • B. ISO 27001
  • C. Federal Information Processing Standard (FIPS) 140-2
  • D. CSA Cloud Control Matrix (CCM)
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #6 Topic 1

Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls. Which of the following controls BEST matches this control description?

  • A. Network Security
  • B. Change Detection
  • C. Virtual Instance and OS Hardening
  • D. Network Vulnerability Management
Reveal Solution Hide Solution   Discussion   7

Correct Answer: A 🗳️

Question #7 Topic 1

After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data. In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?

  • A. As an integrity breach
  • B. As control breach
  • C. As an availability breach
  • D. As a confidentiality breach
Reveal Solution Hide Solution   Discussion   7

Correct Answer: A 🗳️

Question #8 Topic 1

Organizations maintain mappings between the different control frameworks they adopt to:

  • A. help identify controls with common assessment status.
  • B. avoid duplication of work when assessing compliance.
  • C. help identify controls with different assessment status.
  • D. start a compliance assessment using latest assessment.
Reveal Solution Hide Solution   Discussion   8

Correct Answer: B 🗳️

Question #9 Topic 1

SAST testing is performed by:

  • A. scanning the application source code.
  • B. scanning the application interface.
  • C. scanning all infrastructure components.
  • D. performing manual actions to gain control of the application.
Reveal Solution Hide Solution   Discussion   2

Correct Answer: A 🗳️

Question #10 Topic 1

When a client’s business process changes, the CSP SLA should:

  • A. be reviewed, but the SLA cannot be updated.
  • B. not be reviewed, but the cloud contract should be cancelled immediately.
  • C. not be reviewed as the SLA cannot be updated.
  • D. be reviewed and updated if required.
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

file Viewing page 1 out of 33 pages.
Viewing questions 1-10 out of 325 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...