- Home
- ISACA Certification
- CCAK Exam
- ISACA.CCAK.v2025-05-13.q213 Practice Test
Question 96
Which of the following MOST enhances the internal stakeholder decision-making process for the remediation of risks identified from an organization's cloud compliance program?
Correct Answer: C
Establishing ownership and accountability most enhances the internal stakeholder decision-making process for the remediation of risks identified from an organization's cloud compliance program. Cloud compliance refers to the principle that cloud-delivered systems must comply with the standards required by their customers.
Compliance requirements may include data protection regulations such as HIPAA, PCI DSS, GDPR, ISO/IEC
27001, NIST, and SOX. A cloud compliance program is a set of policies, procedures, and controls that help an organization to achieve and maintain compliance with these requirements12.
A cloud compliance program involves identifying, assessing, prioritizing, and mitigating the risks associated with using cloud services. To effectively manage these risks, an organization needs to establish ownership and accountability for each risk and its remediation. Ownership and accountability mean assigning clear roles and responsibilities to the internal stakeholders who are involved in the cloud compliance program, such as the cloud service provider, the cloud customer, the cloud users, the cloud auditors, and the cloud regulators. By doing so, an organization can ensure that the internal stakeholders have the authority, resources, and incentives to make timely and informed decisions for the remediation of risks123.
The other options are not the most effective ways to enhance the internal stakeholder decision-making process for the remediation of risks. Option A, automating risk monitoring and reporting processes, is a good practice for improving the efficiency and accuracy of the cloud compliance program, but it does not address the issue of who is responsible for making decisions based on the monitoring and reporting results. Option B, reporting emerging threats to senior stakeholders, is a good practice for increasing the awareness and visibility of the cloud compliance program, but it does not address the issue of how to prioritize and respond to the emerging threats. Option D, monitoring key risk indicators (KRIs) for multi-cloud environments, is a good practice for measuring and tracking the performance and effectiveness of the cloud compliance program, but it does not address the issue of how to align and coordinate the decisions across different cloud environments123.
References :=
* Cloud Compliance Frameworks: What You Need to Know1
* Cloud Compliance: What It Is + 8 Best Practices for Improving It2
* Cloud Computing: Auditing Challenges - ISACA
Compliance requirements may include data protection regulations such as HIPAA, PCI DSS, GDPR, ISO/IEC
27001, NIST, and SOX. A cloud compliance program is a set of policies, procedures, and controls that help an organization to achieve and maintain compliance with these requirements12.
A cloud compliance program involves identifying, assessing, prioritizing, and mitigating the risks associated with using cloud services. To effectively manage these risks, an organization needs to establish ownership and accountability for each risk and its remediation. Ownership and accountability mean assigning clear roles and responsibilities to the internal stakeholders who are involved in the cloud compliance program, such as the cloud service provider, the cloud customer, the cloud users, the cloud auditors, and the cloud regulators. By doing so, an organization can ensure that the internal stakeholders have the authority, resources, and incentives to make timely and informed decisions for the remediation of risks123.
The other options are not the most effective ways to enhance the internal stakeholder decision-making process for the remediation of risks. Option A, automating risk monitoring and reporting processes, is a good practice for improving the efficiency and accuracy of the cloud compliance program, but it does not address the issue of who is responsible for making decisions based on the monitoring and reporting results. Option B, reporting emerging threats to senior stakeholders, is a good practice for increasing the awareness and visibility of the cloud compliance program, but it does not address the issue of how to prioritize and respond to the emerging threats. Option D, monitoring key risk indicators (KRIs) for multi-cloud environments, is a good practice for measuring and tracking the performance and effectiveness of the cloud compliance program, but it does not address the issue of how to align and coordinate the decisions across different cloud environments123.
References :=
* Cloud Compliance Frameworks: What You Need to Know1
* Cloud Compliance: What It Is + 8 Best Practices for Improving It2
* Cloud Computing: Auditing Challenges - ISACA
Question 97
Which of the following is an example of availability technical impact?
Correct Answer: A
An example of availability technical impact is a distributed denial of service (DDoS) attack that renders the customer's cloud inaccessible for 24 hours. Availability technical impact refers to the effect of a cloud security incident on the protection of data and services from disruption or denial. Availability is one of the three security properties of an information system, along with confidentiality and integrity.
Option A is an example of availability technical impact because it shows how a DDoS attack, which is a type of cyberattack that overwhelms a system or network with malicious traffic and prevents legitimate users from accessing it, can cause a severe and prolonged disruption of the customer's cloud services. Option A also implies that the customer's organization depends on the availability of its cloud services for its core business operations.
The other options are not examples of availability technical impact. Option B is an example of confidentiality technical impact, which refers to the effect of a cloud security incident on the protection of data from unauthorized access or disclosure. Option B shows how a breach of customer personal data from an unsecured server, which is a type of data leakage or exposure attack that exploits the lack of proper security controls on a system or network, can cause a violation of the privacy and security of the customer's data. Option C is an example of integrity technical impact, which refers to the effect of a cloud security incident on the protection of data from unauthorized modification or deletion. Option C shows how an administrator inadvertently clicking on phish bait, which is a type of social engineering or phishing attack that tricks a user into clicking on a malicious link or attachment, can expose the company to a ransomware attack, which is a type of malware or encryption attack that locks or encrypts the data and demands a ransom for its release. Option D is also an example of integrity technical impact, as it shows how a hacker using a stolen administrator identity, which is a type of identity theft or impersonation attack that exploits the credentials or privileges of a legitimate user to access or manipulate a system or network, can alter the discount percentage in the product database, which is a type of data tampering or corruption attack that affects the accuracy and reliability of the data. References :=
* OWASP Risk Rating Methodology | OWASP Foundation1
* OEE Factors: Availability, Performance, and Quality | OEE2
* The Effects of Technological Developments on Work and Their ...
Option A is an example of availability technical impact because it shows how a DDoS attack, which is a type of cyberattack that overwhelms a system or network with malicious traffic and prevents legitimate users from accessing it, can cause a severe and prolonged disruption of the customer's cloud services. Option A also implies that the customer's organization depends on the availability of its cloud services for its core business operations.
The other options are not examples of availability technical impact. Option B is an example of confidentiality technical impact, which refers to the effect of a cloud security incident on the protection of data from unauthorized access or disclosure. Option B shows how a breach of customer personal data from an unsecured server, which is a type of data leakage or exposure attack that exploits the lack of proper security controls on a system or network, can cause a violation of the privacy and security of the customer's data. Option C is an example of integrity technical impact, which refers to the effect of a cloud security incident on the protection of data from unauthorized modification or deletion. Option C shows how an administrator inadvertently clicking on phish bait, which is a type of social engineering or phishing attack that tricks a user into clicking on a malicious link or attachment, can expose the company to a ransomware attack, which is a type of malware or encryption attack that locks or encrypts the data and demands a ransom for its release. Option D is also an example of integrity technical impact, as it shows how a hacker using a stolen administrator identity, which is a type of identity theft or impersonation attack that exploits the credentials or privileges of a legitimate user to access or manipulate a system or network, can alter the discount percentage in the product database, which is a type of data tampering or corruption attack that affects the accuracy and reliability of the data. References :=
* OWASP Risk Rating Methodology | OWASP Foundation1
* OEE Factors: Availability, Performance, and Quality | OEE2
* The Effects of Technological Developments on Work and Their ...
Question 98
Which of the following activities are part of the implementation phase of a cloud assurance program during a cloud migration?
Correct Answer: A
During the implementation phase of a cloud assurance program, the focus is on establishing the operational aspects that will ensure the ongoing security and compliance of the cloud environment. This includes developing the monitoring goals and requirements which are essential for setting up the assurance framework. It involves determining what needs to be monitored, how it should be monitored, and the metrics that will be used to measure compliance and performance.
Reference = The information aligns with best practices for cloud migration and assurance programs as outlined in various resources, including the Cloud Assurance Program Guide by Microsoft Cybersecurity1, which discusses the importance of developing and implementing policies for cloud data and system migration, and the Enterprise Guide to Successful Cloud Adoption by New Relic2, which emphasizes the role of observability in cloud migration, including the establishment of monitoring goals.
Reference = The information aligns with best practices for cloud migration and assurance programs as outlined in various resources, including the Cloud Assurance Program Guide by Microsoft Cybersecurity1, which discusses the importance of developing and implementing policies for cloud data and system migration, and the Enterprise Guide to Successful Cloud Adoption by New Relic2, which emphasizes the role of observability in cloud migration, including the establishment of monitoring goals.
Question 99
Which of the following has been provided by the Federal Office for Information Security in Germany to support customers in selecting, controlling, and monitoring their cloud service providers?
Correct Answer: D
Explanation
The BSI Criteria Catalogue C5 is a document that has been provided by the Federal Office for Information Security (BSI) in Germany to support customers in selecting, controlling, and monitoring their cloud service providers (CSPs). The C5 stands for Cloud Computing Compliance Criteria Catalogue and specifies minimum requirements for secure cloud computing. The C5 is primarily intended for professional CSPs, their auditors, and customers of the CSPs. The C5 covers 17 domains and 114 control objectives that address all key aspects of cloud security, such as data protection, identity and access management, encryption and key management, incident response, audit assurance, and compliance. The C5 also maps to other industry-accepted security standards, regulations, and frameworks, such as ISO 27001/27002/27017/27018, NIST SP 800-53, CSA Cloud Controls Matrix (CCM), COBIT, GDPR, etc. The C5 helps customers to evaluate and compare the security and compliance posture of different CSPs, and to verify that the CSPs meet their contractual obligations and legal requirements12.
References:
BSI - C5 criteria catalogue - Federal Office for Information Security
Germany C5 - Azure Compliance | Microsoft Learn
The BSI Criteria Catalogue C5 is a document that has been provided by the Federal Office for Information Security (BSI) in Germany to support customers in selecting, controlling, and monitoring their cloud service providers (CSPs). The C5 stands for Cloud Computing Compliance Criteria Catalogue and specifies minimum requirements for secure cloud computing. The C5 is primarily intended for professional CSPs, their auditors, and customers of the CSPs. The C5 covers 17 domains and 114 control objectives that address all key aspects of cloud security, such as data protection, identity and access management, encryption and key management, incident response, audit assurance, and compliance. The C5 also maps to other industry-accepted security standards, regulations, and frameworks, such as ISO 27001/27002/27017/27018, NIST SP 800-53, CSA Cloud Controls Matrix (CCM), COBIT, GDPR, etc. The C5 helps customers to evaluate and compare the security and compliance posture of different CSPs, and to verify that the CSPs meet their contractual obligations and legal requirements12.
References:
BSI - C5 criteria catalogue - Federal Office for Information Security
Germany C5 - Azure Compliance | Microsoft Learn
Question 100
Which of the following is an example of financial business impact?
Correct Answer: A
Explanation
An example of financial business impact is a distributed denial of service (DDoS) attack that renders the customer's cloud inaccessible for 24 hours, resulting in millions in lost sales. Financial business impact refers to the monetary losses or gains that an organization may experience as a result of a cloud security incident.
Financial business impact can be measured by factors such as revenue, profit, cost, cash flow, market share, and stock price .
Option A is an example of financial business impact because it shows how a DDoS attack, which is a type of cyberattack that overwhelms a system or network with malicious traffic and prevents legitimate users from accessing it, can cause direct and significant financial losses for the customer's organization due to the interruption of its cloud services and the inability to generate sales. Option A also implies that the customer's organization depends on the availability of its cloud services for its core business operations.
The other options are not examples of financial business impact. Option B is an example of operational business impact, which refers to the disruption or degradation of the organization's processes, functions, or activities as a result of a cloud security incident. Operational business impact can be measured by factors such as productivity, efficiency, quality, performance, and customer satisfaction . Option B shows how a hacker using a stolen administrator identity, which is a type of identity theft or impersonation attack that exploits the credentials or privileges of a legitimate user to access or manipulate a system or network, can cause operational business impact for the customer's organization by bringing down its SaaS sales and marketing systems, which are essential for its business functions.
Option C is an example of reputational business impact, which refers to the damage or enhancement of the organization's image, brand, or reputation as a result of a cloud security incident. Reputational business impact can be measured by factors such as trust, loyalty, satisfaction, awareness, and perception of the organization's stakeholders, such as customers, partners, investors, regulators, and media . Option C shows how a breach reported in a timely manner to the CEO, which is a good practice for ensuring transparency and accountability in the event of a cloud security incident, can still cause reputational business impact for the customer's organization due to the public blame game between the CFO and CISO, which reflects poorly on the organization's leadership and culture and leads to the board replacing all three. References := Business Impact Analysis - Ready.gov Business Impact Analysis - Cloud Security Alliance What Is A Distributed Denial-of-Service (DDoS) Attack? | Cloudflare What is Identity Theft? - Cloud Security Alliance Incident Response - Cloud Security Alliance
An example of financial business impact is a distributed denial of service (DDoS) attack that renders the customer's cloud inaccessible for 24 hours, resulting in millions in lost sales. Financial business impact refers to the monetary losses or gains that an organization may experience as a result of a cloud security incident.
Financial business impact can be measured by factors such as revenue, profit, cost, cash flow, market share, and stock price .
Option A is an example of financial business impact because it shows how a DDoS attack, which is a type of cyberattack that overwhelms a system or network with malicious traffic and prevents legitimate users from accessing it, can cause direct and significant financial losses for the customer's organization due to the interruption of its cloud services and the inability to generate sales. Option A also implies that the customer's organization depends on the availability of its cloud services for its core business operations.
The other options are not examples of financial business impact. Option B is an example of operational business impact, which refers to the disruption or degradation of the organization's processes, functions, or activities as a result of a cloud security incident. Operational business impact can be measured by factors such as productivity, efficiency, quality, performance, and customer satisfaction . Option B shows how a hacker using a stolen administrator identity, which is a type of identity theft or impersonation attack that exploits the credentials or privileges of a legitimate user to access or manipulate a system or network, can cause operational business impact for the customer's organization by bringing down its SaaS sales and marketing systems, which are essential for its business functions.
Option C is an example of reputational business impact, which refers to the damage or enhancement of the organization's image, brand, or reputation as a result of a cloud security incident. Reputational business impact can be measured by factors such as trust, loyalty, satisfaction, awareness, and perception of the organization's stakeholders, such as customers, partners, investors, regulators, and media . Option C shows how a breach reported in a timely manner to the CEO, which is a good practice for ensuring transparency and accountability in the event of a cloud security incident, can still cause reputational business impact for the customer's organization due to the public blame game between the CFO and CISO, which reflects poorly on the organization's leadership and culture and leads to the board replacing all three. References := Business Impact Analysis - Ready.gov Business Impact Analysis - Cloud Security Alliance What Is A Distributed Denial-of-Service (DDoS) Attack? | Cloudflare What is Identity Theft? - Cloud Security Alliance Incident Response - Cloud Security Alliance
- Other Version
- 801ISACA.CCAK.v2023-04-28.q71
- 888ISACA.CCAK.v2022-12-30.q72
- 1635ISACA.CCAK.v2022-07-25.q75
- 1595ISACA.CCAK.v2022-02-11.q57
- 70ISACA.Passtestking.CCAK.v2021-10-20.by.jerry.27q.pdf
- Latest Upload
- 105OCEG.GRCP.v2025-09-11.q211
- 104HP.HPE0-V27.v2025-09-11.q78
- 118Oracle.1Z0-1057-23.v2025-09-10.q47
- 151Google.Professional-Cloud-Network-Engineer.v2025-09-09.q179
- 131SAP.C-S4EWM-2023.v2025-09-08.q83
- 165TheSecOpsGroup.CNSP.v2025-09-08.q20
- 223CFAInstitute.ESG-Investing.v2025-09-08.q173
- 169PECB.ISO-IEC-27001-Lead-Implementer.v2025-09-06.q132
- 150Salesforce.Data-Architect.v2025-09-05.q216
- 144Adobe.AD0-E605.v2025-09-05.q50
[×]
Download PDF File
Enter your email address to download ISACA.CCAK.v2025-05-13.q213 Practice Test