100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Accounting Information Systems – Chapter 8 Solutions – Detailed Solution Manual Overview

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
08-12-2025
Written in
2025/2026

This document provides the complete solutions for Chapter 8 of an Accounting Information Systems course, covering the key concepts, exercises, and problem analyses included in the chapter. It explains the procedures, controls, and system components relevant to AIS topics typically addressed in Chapter 8. The material supports students in understanding the reasoning behind each solution and prepares them for assignments and exams.

Show more Read less
Institution
Solution Manual
Course
Solution Manual










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Solution Manual
Course
Solution Manual

Document information

Uploaded on
December 8, 2025
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Chapter 8 solution manual accounting information
systems

Accounting Information Systems, 13e (Romney/Steinbart)
Chapter 8 Controls for Information Security

8.1 Explain how information security affects information systems reliability.

1) The Trust Services Framework reliability principle that states that users must be able to enter,
update, and retrieve data during agreed-upon times is known as
A) availability.
B) security.
C) maintainability.
D) integrity.
Answer: A
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

2) According to the Trust Services Framework, the reliability principle of integrity is achieved
when the system produces data that
A) is available for operation and use at times set forth by agreement.
B) is protected against unauthorized physical and logical access.
C) can be maintained as required without affecting system availability, security, and integrity.
D) is complete, accurate, and valid.
Answer: D
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

3) Kuzman Jovan called a meeting of the top management at Jovan Capital Management.
Number one on the agenda was computer system security. "The risk of security breach incidents
has become unacceptable," he said, and turned to the Chief Information Officer. "What do you
intend to do?" Which of the following is the best answer?
A) Evaluate and modify the system using COBOL.
B) Evaluate and modify the system using the CTC checklist.
C) Evaluate and modify the system using the Trust Services framework
D) Evaluate and modify the system using the COSO Internal Control Framework.
Answer: C
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic

,4) Which of the following is not one of the three fundamental information security concepts?
A) Information security is a technology issue based on prevention.
B) Security is a management issue, not a technology issue.
C) The idea of defense-in-depth employs multiple layers of controls.
D) The time-based model of security focuses on the relationship between preventive, detective
and corrective controls.
Answer: A
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

5) Which of the following is not one of the essential criteria for successfully implementing each
of the principles that contribute to systems reliability, as discussed in the Trust Services
Framework?
A) developing and documenting policies
B) effectively communicating policies to all outsiders
C) designing and employing appropriate control procedures to implement policies
D) monitoring the system and taking corrective action to maintain compliance with policies
Answer: B
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

6) If the time an attacker takes to break through the organization's preventive controls is greater
than the sum of the time required to detect the attack and the time required to respond to the
attack, then security is
A) effective.
B) ineffective.
C) overdone.
D) undermanaged.
Answer: A
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic


7) It was 8:03 A.M. when Jiao Jan, the Network Administrator for South Asian Technologies,
was informed that the intrusion detection system had identified an ongoing attempt to breach
network security. By the time that Jiao had identified and blocked the attack, the hacker had
accessed and downloaded several files from the company's server. Using the notation for the
time-based model of security, in this case
A) D > P
B) P > D
C) P > C
D) C > P
Answer: A
Objective: Learning Objective 1
Difficulty: Difficult
AACSB: Analytic

8) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat"
hackers. He had researched an exploit and determined that he could penetrate the target system,

, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into
the attack he was locked out of the system. Using the notation of the time-based model of
security, which of the following must be true?
A) P < 6
B) D = 6
C) P = 6
D) P > 6
Answer: D
Objective: Learning Objective 1
Difficulty: Difficult
AACSB: Analytic

9) Identify a party below who was involved with developing the Trust Services Framework.
A) FASB
B) United States Congress
C) AICPA
D) IMA
Answer: C
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic

10) Information security procedures protect information integrity by
A) preventing fictitious transactions.
B) reducing the system cost.
C) making the system more efficient.
D) making it impossible for unauthorized users to access the system.
Answer: A
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Solutions The Australian
Follow You need to be logged in order to follow users or courses
Sold
31
Member since
2 year
Number of followers
11
Documents
729
Last sold
3 weeks ago
ExamPro Solutions

Welcome to ExamPro Solutions! Your trusted source for accurate, updated, and verified study guides, test banks, solution manuals, and solved exams. Our materials are carefully curated to help students understand key concepts, prepare for exams with confidence, and achieve top grades.

5,0

4 reviews

5
4
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions