Accounting Information Systems (13th Edition)
13th Edition
ISBN: 9780133428537
Author: Marshall B. Romney, Paul J. Steinbart
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 1CQ
To determine
Identify the true statement.
Expert Solution & Answer
Answer to Problem 1CQ
Option b
Explanation of Solution
Justification for correct answer:
Option (b):
The information security is required to protect privacy, confidentiality integrity and available information resources. Therefore, Option b, is the correct answer.
Justification for incorrect answer:
Option (a):
The defense in depth concept states with enough given time any control can be overcome. Therefore, Option a, is an incorrect answer.
Option (c):
The correct formula is
Option (d):
The security is a managerial issue. Therefore, Option d, is an incorrect answer.
Conclusion
Therefore, Option (b) is the correct answer.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
a. What is Competitive Advantage
b. What is Competitive Disadvantage
c. What is Risk Management and why it is important in Information Assurance and Security
d. Discuss briefly the components of Risk Management
Which of the following is NOT an objective of all information systems?a. support for the stewardship function ofmanagementb. support for management decision makingc. support for the day-to-day operations of the firmd. all of the above are objectives
1. _____ are controls that do not rely on the client's information technology (IT) environment for their operation.
a. IT general controls (ITGCs)
b. Automated controls
c. Computer application controls
d. Manual controls
2. Assessing control risk begins with understanding entity-level controls.
a. True
b. False
Chapter 8 Solutions
Accounting Information Systems (13th Edition)
Knowledge Booster
Similar questions
- Identify the factor that affects the faithful representation. a. Efficiency of computer systems b. The condition in the economy c. Level of measurement uncertainty d. Level of incompletenessarrow_forwardA project plan is a company's information security blueprint, but how does this occur?arrow_forwardThe control environment is seen as the foundation for all other components of internal control. (T/F)arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeCornerstones of Financial AccountingAccountingISBN:9781337690881Author:Jay Rich, Jeff JonesPublisher:Cengage Learning
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Cornerstones of Financial Accounting
Accounting
ISBN:9781337690881
Author:Jay Rich, Jeff Jones
Publisher:Cengage Learning