100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Accounting Information Systems – Chapter 8 Solutions – Detailed Solution Manual Overview

Puntuación
-
Vendido
-
Páginas
19
Grado
A+
Subido en
08-12-2025
Escrito en
2025/2026

This document provides the complete solutions for Chapter 8 of an Accounting Information Systems course, covering the key concepts, exercises, and problem analyses included in the chapter. It explains the procedures, controls, and system components relevant to AIS topics typically addressed in Chapter 8. The material supports students in understanding the reasoning behind each solution and prepares them for assignments and exams.

Mostrar más Leer menos
Institución
Solution Manual
Grado
Solution Manual










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Solution Manual
Grado
Solution Manual

Información del documento

Subido en
8 de diciembre de 2025
Número de páginas
19
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Chapter 8 solution manual accounting information
systems

Accounting Information Systems, 13e (Romney/Steinbart)
Chapter 8 Controls for Information Security

8.1 Explain how information security affects information systems reliability.

1) The Trust Services Framework reliability principle that states that users must be able to enter,
update, and retrieve data during agreed-upon times is known as
A) availability.
B) security.
C) maintainability.
D) integrity.
Answer: A
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

2) According to the Trust Services Framework, the reliability principle of integrity is achieved
when the system produces data that
A) is available for operation and use at times set forth by agreement.
B) is protected against unauthorized physical and logical access.
C) can be maintained as required without affecting system availability, security, and integrity.
D) is complete, accurate, and valid.
Answer: D
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

3) Kuzman Jovan called a meeting of the top management at Jovan Capital Management.
Number one on the agenda was computer system security. "The risk of security breach incidents
has become unacceptable," he said, and turned to the Chief Information Officer. "What do you
intend to do?" Which of the following is the best answer?
A) Evaluate and modify the system using COBOL.
B) Evaluate and modify the system using the CTC checklist.
C) Evaluate and modify the system using the Trust Services framework
D) Evaluate and modify the system using the COSO Internal Control Framework.
Answer: C
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic

,4) Which of the following is not one of the three fundamental information security concepts?
A) Information security is a technology issue based on prevention.
B) Security is a management issue, not a technology issue.
C) The idea of defense-in-depth employs multiple layers of controls.
D) The time-based model of security focuses on the relationship between preventive, detective
and corrective controls.
Answer: A
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

5) Which of the following is not one of the essential criteria for successfully implementing each
of the principles that contribute to systems reliability, as discussed in the Trust Services
Framework?
A) developing and documenting policies
B) effectively communicating policies to all outsiders
C) designing and employing appropriate control procedures to implement policies
D) monitoring the system and taking corrective action to maintain compliance with policies
Answer: B
Objective: Learning Objective 1
Difficulty: Easy
AACSB: Analytic

6) If the time an attacker takes to break through the organization's preventive controls is greater
than the sum of the time required to detect the attack and the time required to respond to the
attack, then security is
A) effective.
B) ineffective.
C) overdone.
D) undermanaged.
Answer: A
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic


7) It was 8:03 A.M. when Jiao Jan, the Network Administrator for South Asian Technologies,
was informed that the intrusion detection system had identified an ongoing attempt to breach
network security. By the time that Jiao had identified and blocked the attack, the hacker had
accessed and downloaded several files from the company's server. Using the notation for the
time-based model of security, in this case
A) D > P
B) P > D
C) P > C
D) C > P
Answer: A
Objective: Learning Objective 1
Difficulty: Difficult
AACSB: Analytic

8) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat"
hackers. He had researched an exploit and determined that he could penetrate the target system,

, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into
the attack he was locked out of the system. Using the notation of the time-based model of
security, which of the following must be true?
A) P < 6
B) D = 6
C) P = 6
D) P > 6
Answer: D
Objective: Learning Objective 1
Difficulty: Difficult
AACSB: Analytic

9) Identify a party below who was involved with developing the Trust Services Framework.
A) FASB
B) United States Congress
C) AICPA
D) IMA
Answer: C
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic

10) Information security procedures protect information integrity by
A) preventing fictitious transactions.
B) reducing the system cost.
C) making the system more efficient.
D) making it impossible for unauthorized users to access the system.
Answer: A
Objective: Learning Objective 1
Difficulty: Moderate
AACSB: Analytic
$17.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Solutions The Australian
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
31
Miembro desde
2 año
Número de seguidores
11
Documentos
729
Última venta
3 semanas hace
ExamPro Solutions

Welcome to ExamPro Solutions! Your trusted source for accurate, updated, and verified study guides, test banks, solution manuals, and solved exams. Our materials are carefully curated to help students understand key concepts, prepare for exams with confidence, and achieve top grades.

5.0

4 reseñas

5
4
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes