- Home
- ISACA Certification
- CCAK Exam
- ISACA.CCAK.v2025-05-13.q213 Practice Test
Question 71
The MOST important factor to consider when implementing cloud-related controls is the:
Correct Answer: A
Explanation
The most important factor to consider when implementing cloud-related controls is the shared responsibility model. The shared responsibility model is a framework that defines the roles and responsibilities of cloud service providers (CSPs) and cloud customers (CCs) in ensuring the security and compliance of cloud computing environments. The shared responsibility model helps to clarify which security tasks are handled by the CSP and which tasks are handled by the CC, depending on the type of cloud service model (IaaS, PaaS, SaaS) and the specific contractual agreements. The shared responsibility model also helps to avoid gaps or overlaps in security controls, and to allocate resources and accountability accordingly12.
References:
Shared responsibility in the cloud - Microsoft Azure
Understanding the Shared Responsibilities Model in Cloud Services - ISACA
The most important factor to consider when implementing cloud-related controls is the shared responsibility model. The shared responsibility model is a framework that defines the roles and responsibilities of cloud service providers (CSPs) and cloud customers (CCs) in ensuring the security and compliance of cloud computing environments. The shared responsibility model helps to clarify which security tasks are handled by the CSP and which tasks are handled by the CC, depending on the type of cloud service model (IaaS, PaaS, SaaS) and the specific contractual agreements. The shared responsibility model also helps to avoid gaps or overlaps in security controls, and to allocate resources and accountability accordingly12.
References:
Shared responsibility in the cloud - Microsoft Azure
Understanding the Shared Responsibilities Model in Cloud Services - ISACA
Question 72
Which of the following BEST ensures adequate restriction on the number of people who can access the pipeline production environment?
Correct Answer: C
Role-based access control (RBAC) is a method of restricting access to resources based on the roles of individual users within an organization1 RBAC can help ensure adequate restriction on the number of people who can access the pipeline production environment, as it can limit the permissions and actions that each user can perform on the pipeline resources, such as code, secrets, environments, etc. RBAC can also help enforce the principle of least privilege, which states that users should only have the minimum level of access required to perform their tasks2 The other options are not correct because:
* Option A is not correct because ensuring segregation of duties in the production and development pipelines is not sufficient to ensure adequate restriction on the number of people who can access the pipeline production environment. Segregation of duties is a practice that aims to prevent fraud, errors, or conflicts of interest by dividing responsibilities among different people or teams3 However, segregation of duties does not necessarily limit the number of people who can access the pipeline resources, as it depends on how the roles and permissions are defined and assigned. Segregation of duties is also more relevant for preventing unauthorized changes or deployments to the production environment, rather than restricting access to it4
* Option B is not correct because periodic review of the continuous integration and continuous delivery (CI/CD) pipeline audit logs to identify any access violations is not a proactive measure to ensure adequate restriction on the number of people who can access the pipeline production environment. Audit logs are records of events or activities that occur within a system or process5 Audit logs can help monitor and detect any unauthorized or suspicious access to the pipeline resources, but they cannot prevent or restrict such access in the first place. Audit logs are also dependent on the frequency and quality of the review process, which may not be timely or effective enough to mitigate the risks of access violations6
* Option D is not correct because separation of production and development pipelines is not a direct way
* to ensure adequate restriction on the number of people who can access the pipeline production environment. Separation of production and development pipelines is a practice that aims to isolate and protect the production environment from any potential errors, bugs, or vulnerabilities that may arise from the development process. However, separation of pipelines does not automatically imply restriction of access, as it depends on how the roles and permissions are configured for each pipeline.
Separation of pipelines may also introduce challenges such as synchronization, coordination, and communication among the pipeline teams and stakeholders.
References: 1: Wikipedia. Role-based access control - Wikipedia. [Online]. Available: 1. [Accessed:
14-Apr-2023]. 2: Microsoft Learn. Set pipeline permissions - Azure Pipelines | Microsoft Learn.
[Online]. Available: 1. [Accessed: 14-Apr-2023]. 3: Investopedia. Segregation Of Duties Definition - Investopedia.com Blog. [Online]. Available: . [Accessed: 14-Apr-2023]. 4: Cider Security. Insufficient PBAC (Pipeline-Based Access Controls) - Cider Security Blog. [Online]. Available: . [Accessed: 14-Apr-2023]. 5:
Wikipedia. Audit trail - Wikipedia. [Online]. Available: . [Accessed: 14-Apr-2023]. 6: Microsoft Learn.
Securing Azure Pipelines - Azure Pipelines | Microsoft Learn. [Online]. Available: . [Accessed: 14-Apr-2023].
1: AWS DevOps Blog. How to implement CI/CD with AWS CodePipeline - AWS DevOps Blog | Amazon Web Services Blog. [Online]. Available: . [Accessed: 14-Apr-2023]. : LambdaTest. What Is Parallel Testing?
with Example - LambdaTest Blog. [Online]. Available: . [Accessed: 14-Apr-2023].
* Option A is not correct because ensuring segregation of duties in the production and development pipelines is not sufficient to ensure adequate restriction on the number of people who can access the pipeline production environment. Segregation of duties is a practice that aims to prevent fraud, errors, or conflicts of interest by dividing responsibilities among different people or teams3 However, segregation of duties does not necessarily limit the number of people who can access the pipeline resources, as it depends on how the roles and permissions are defined and assigned. Segregation of duties is also more relevant for preventing unauthorized changes or deployments to the production environment, rather than restricting access to it4
* Option B is not correct because periodic review of the continuous integration and continuous delivery (CI/CD) pipeline audit logs to identify any access violations is not a proactive measure to ensure adequate restriction on the number of people who can access the pipeline production environment. Audit logs are records of events or activities that occur within a system or process5 Audit logs can help monitor and detect any unauthorized or suspicious access to the pipeline resources, but they cannot prevent or restrict such access in the first place. Audit logs are also dependent on the frequency and quality of the review process, which may not be timely or effective enough to mitigate the risks of access violations6
* Option D is not correct because separation of production and development pipelines is not a direct way
* to ensure adequate restriction on the number of people who can access the pipeline production environment. Separation of production and development pipelines is a practice that aims to isolate and protect the production environment from any potential errors, bugs, or vulnerabilities that may arise from the development process. However, separation of pipelines does not automatically imply restriction of access, as it depends on how the roles and permissions are configured for each pipeline.
Separation of pipelines may also introduce challenges such as synchronization, coordination, and communication among the pipeline teams and stakeholders.
References: 1: Wikipedia. Role-based access control - Wikipedia. [Online]. Available: 1. [Accessed:
14-Apr-2023]. 2: Microsoft Learn. Set pipeline permissions - Azure Pipelines | Microsoft Learn.
[Online]. Available: 1. [Accessed: 14-Apr-2023]. 3: Investopedia. Segregation Of Duties Definition - Investopedia.com Blog. [Online]. Available: . [Accessed: 14-Apr-2023]. 4: Cider Security. Insufficient PBAC (Pipeline-Based Access Controls) - Cider Security Blog. [Online]. Available: . [Accessed: 14-Apr-2023]. 5:
Wikipedia. Audit trail - Wikipedia. [Online]. Available: . [Accessed: 14-Apr-2023]. 6: Microsoft Learn.
Securing Azure Pipelines - Azure Pipelines | Microsoft Learn. [Online]. Available: . [Accessed: 14-Apr-2023].
1: AWS DevOps Blog. How to implement CI/CD with AWS CodePipeline - AWS DevOps Blog | Amazon Web Services Blog. [Online]. Available: . [Accessed: 14-Apr-2023]. : LambdaTest. What Is Parallel Testing?
with Example - LambdaTest Blog. [Online]. Available: . [Accessed: 14-Apr-2023].
Question 73
Which of the following is an example of financial business impact?
Correct Answer: A
An example of financial business impact is a distributed denial of service (DDoS) attack that renders the customer's cloud inaccessible for 24 hours, resulting in millions in lost sales. Financial business impact refers to the monetary losses or gains that an organization may experience as a result of a cloud security incident.
Financial business impact can be measured by factors such as revenue, profit, cost, cash flow, market share, and stock price .
Option A is an example of financial business impact because it shows how a DDoS attack, which is a type of cyberattack that overwhelms a system or network with malicious traffic and prevents legitimate users from accessing it, can cause direct and significant financial losses for the customer's organization due to the interruption of its cloud services and the inability to generate sales. Option A also implies that the customer's organization depends on the availability of its cloud services for its core business operations.
The other options are not examples of financial business impact. Option B is an example of operational business impact, which refers to the disruption or degradation of the organization's processes, functions, or activities as a result of a cloud security incident. Operational business impact can be measured by factors such as productivity, efficiency, quality, performance, and customer satisfaction . Option B shows how a hacker using a stolen administrator identity, which is a type of identity theft or impersonation attack that exploits the credentials or privileges of a legitimate user to access or manipulate a system or network, can cause operational business impact for the customer's organization by bringing down its SaaS sales and marketing systems, which are essential for its business functions.
Option C is an example of reputational business impact, which refers to the damage or enhancement of the organization's image, brand, or reputation as a result of a cloud security incident. Reputational business impact can be measured by factors such as trust, loyalty, satisfaction, awareness, and perception of the organization's stakeholders, such as customers, partners, investors, regulators, and media . Option C shows how a breach reported in a timely manner to the CEO, which is a good practice for ensuring transparency and accountability in the event of a cloud security incident, can still cause reputational business impact for the customer's organization due to the public blame game between the CFO and CISO, which reflects poorly on the organization's leadership and culture and leads to the board replacing all three. References :=
* Business Impact Analysis - Ready.gov
* Business Impact Analysis - Cloud Security Alliance
* What Is A Distributed Denial-of-Service (DDoS) Attack? | Cloudflare
* What is Identity Theft? - Cloud Security Alliance
* Incident Response - Cloud Security Alliance
Financial business impact can be measured by factors such as revenue, profit, cost, cash flow, market share, and stock price .
Option A is an example of financial business impact because it shows how a DDoS attack, which is a type of cyberattack that overwhelms a system or network with malicious traffic and prevents legitimate users from accessing it, can cause direct and significant financial losses for the customer's organization due to the interruption of its cloud services and the inability to generate sales. Option A also implies that the customer's organization depends on the availability of its cloud services for its core business operations.
The other options are not examples of financial business impact. Option B is an example of operational business impact, which refers to the disruption or degradation of the organization's processes, functions, or activities as a result of a cloud security incident. Operational business impact can be measured by factors such as productivity, efficiency, quality, performance, and customer satisfaction . Option B shows how a hacker using a stolen administrator identity, which is a type of identity theft or impersonation attack that exploits the credentials or privileges of a legitimate user to access or manipulate a system or network, can cause operational business impact for the customer's organization by bringing down its SaaS sales and marketing systems, which are essential for its business functions.
Option C is an example of reputational business impact, which refers to the damage or enhancement of the organization's image, brand, or reputation as a result of a cloud security incident. Reputational business impact can be measured by factors such as trust, loyalty, satisfaction, awareness, and perception of the organization's stakeholders, such as customers, partners, investors, regulators, and media . Option C shows how a breach reported in a timely manner to the CEO, which is a good practice for ensuring transparency and accountability in the event of a cloud security incident, can still cause reputational business impact for the customer's organization due to the public blame game between the CFO and CISO, which reflects poorly on the organization's leadership and culture and leads to the board replacing all three. References :=
* Business Impact Analysis - Ready.gov
* Business Impact Analysis - Cloud Security Alliance
* What Is A Distributed Denial-of-Service (DDoS) Attack? | Cloudflare
* What is Identity Theft? - Cloud Security Alliance
* Incident Response - Cloud Security Alliance
Question 74
To understand their compliance alignments and gaps with a cloud provider, what must cloud customers rely on?
Correct Answer: E
Question 75
Which of the following is a cloud-specific security standard?
Correct Answer: A
ISO/IEC 15027017 is a cloud-specific security standard that provides guidelines for information security controls applicable to the provision and use of cloud services. It is based on ISO/IEC 27002, which is a general standard for information security management, but it also includes additional controls and implementation guidance that specifically relate to cloud services. ISO/IEC 15027017 is intended to help both cloud service providers and cloud service customers to enhance the security and confidentiality of their cloud environment and to comply with relevant regulatory requirements and industry standards.12 Reference := ISO/IEC 27017:2015 - Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services1; Cloud Security Standards: ISO, PCI, GDPR and Your Cloud - Exabeam3; ISO/IEC 27017 - Wikipedia2
- Other Version
- 801ISACA.CCAK.v2023-04-28.q71
- 888ISACA.CCAK.v2022-12-30.q72
- 1635ISACA.CCAK.v2022-07-25.q75
- 1595ISACA.CCAK.v2022-02-11.q57
- 70ISACA.Passtestking.CCAK.v2021-10-20.by.jerry.27q.pdf
- Latest Upload
- 105OCEG.GRCP.v2025-09-11.q211
- 104HP.HPE0-V27.v2025-09-11.q78
- 118Oracle.1Z0-1057-23.v2025-09-10.q47
- 150Google.Professional-Cloud-Network-Engineer.v2025-09-09.q179
- 131SAP.C-S4EWM-2023.v2025-09-08.q83
- 164TheSecOpsGroup.CNSP.v2025-09-08.q20
- 223CFAInstitute.ESG-Investing.v2025-09-08.q173
- 158PECB.ISO-IEC-27001-Lead-Implementer.v2025-09-06.q132
- 150Salesforce.Data-Architect.v2025-09-05.q216
- 144Adobe.AD0-E605.v2025-09-05.q50
[×]
Download PDF File
Enter your email address to download ISACA.CCAK.v2025-05-13.q213 Practice Test