SECURITY
PROGRAM
LOCK IN
CLOUD
SERVICE
100

A ___________ is a strategic methodology in auditing that prioritizes areas of an organization based on the level of risk they present.

Risk-Based Audit Approach

100

The new name of the application that is used to seek updates on different category with text such as news, ranting, and shhhh ka nalang (with an old bird logo)

X

100

Which of the following best describes the Scalability and Improved Flexibility advantage of cloud computing?

A. Users must purchase hardware for expansion

B. Systems can adjust based on service needs, reducing the risk of overprovision

C. Users need to plan capacity years in advance

D. Cloud services cannot adapt to sudden changes in demand

B. Systems can adjust based on service needs, reducing the risk of overprovision

100

Which benefit of cloud computing allows users to access data anytime, anywhere, enabling faster decision-making?

A. Improved Operational Efficiency

B. Significantly Reduced Costs

C. Mobility

D. Access Towards New Business Technologies

C. Mobility

100

Which of the following service models provides the least user control and is mainly used to consume applications over the internet?

A. Infrastructure-as-a-Service (IaaS)

B. Platform-as-a-Service (PaaS)

C. Software-as-a-Service (SaaS)

D. Hardware-as-a-Service (HaaS)

C. Software-as-a-Service (SaaS)

200

Which category does "Theft " in a computer information system belong:

a) Essential Charactrtistics of Cloud Computing
b) Types of Service Model
c) Security Errors and Fraud
d) Definition of Audit in Specialized Industries

c) Security Errors and Fraud

200

refers to the automated execution of programmed instructions by a computer to input, store, manipulate, and output data used in business operations.
a. Computer shop
b. Computer appliance with Philhealth card
c. Computer Studies
d. Computer Processing

d. Computer Processing

200

Why is “on-demand self-service” important?
a) Requires an IT expert to install
b) Delays access to apps
c) Lets users access services immediately
d) Works only in offices


c) Lets users access services immediately

200

Which of the following is NOT a feature of cloud computing?

a) Broad network access

b) Manual server setup

c) Resource pooling

d) Rapid elasticity

b) Manual server setup

200

Which of the following is not an example of switching costs?

a. Financial

b. Data Compatibility

c. Guaranteed data privacy

d. Ecosystem

c. Guaranteed data privacy

300

Which is not an audit procedure regarding Overall Security

a) Interviewing personnel
b) Limiting physical access
c) Reviewing policies and procedures
d) Inspecting computer sites

b) Limiting physical access

300

the intentional manipulation of financial records and statements to deceive stakeholders, often for personal gain. It involves misrepresenting a company's financial health.

a) Proud
b) Fruad
c) Fortuner
d) Fraud

d) Fraud

300

The accidental leaking of data by a cloud provider to the wrong client falls under which category of security and privacy concerns risk?

a. Data Leakages and Losses

b. Shared Access

c. Loss of Data

d. Customer Churn

b. Shared Access

300

What is cloud computing?

a) Installing software from a CD

b) Using online resources without owning physical hardware

c) Using electricity for internet

d) Storing data only on personal com

b) Using online resources without owning physical hardware

300

A cloud storage and file-sharing service commonly used for personal or team collaboration.

Dropbox

400

Give 2 examples of Security errors and fraud that we mentioned in the report.

  • Accidental or intentional damage of hardware
  • Unauthorized access, disclosure, or modification of data
  •  Theft
  • Interruption of crucial business activities
400

Which of the following is a system review in Program Modification:

a) Frequently asking the label as if there is something to begin with
b) Conduct check up at 10PM to rethink memories of the past
c) Review policies and procedures with the system and its functions
d) Consultation with international organizations to fayt vamfires

c) Review policies and procedures with the system and its functions

400

Which of the following countries prohibits any processing of [personal data] unless authorized by the subjects or law?

a. USA

b. China

c. Norway

d. Switzerland

d. Switzerland

400

A system that provides computing services over the internet.

Cloud Computing

400

This service model allows users to host their own platforms and applications using computing resources such as servers, storage, and networking provided by a vendor. It follows a "pay as you use" model.

Infrastructure-as-a-Service (IaaS)

500

Types of errors and fraud– Inaccurate source data– Unauthorized source data

– Inaccurate source data

– Unauthorized source data

500

Two major AUDIT PROCEDURES stated in Program Developmement, Program Modification and Computer Processing

  • SYSTEM REVIEW
  • TEST OF CONTROLS
500

It is a type of risk that may occur if customers do not trust your cloud service provider.  

Customer Churn

500

This advantage of cloud computing means that organizations can check the status of operations from anywhere, manage multiple locations, and experience a significant decrease in order processing time.

Improved Operational Efficiency

500

It is kept by the cloud provider.

Records