Which of the following situations best illustrates a "false positive" in the performance of a spam filter?
The spam filter removed Incoming communication that included certain keywords and domains.
The spam filter deleted commercial ads automatically, as they were recognized as unwanted.
The spam filter routed to the "junk|r folder a newsletter that appeared to include links to fake websites.
The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
A false positive occurs when a system incorrectly identifies a legitimate item as a threat or an unwanted entity. In the case of a spam filter, a false positive happens when the filter mistakenly classifies a genuine email as spam, even though it is legitimate.
Option A: "The spam filter removed incoming communication that included certain keywords and domains."
This describes a general filtering mechanism but does not indicate a mistake. If the filter was correctly configured, it is not necessarily a false positive. (Incorrect)
Option B: "The spam filter deleted commercial ads automatically, as they were recognized as unwanted."
If the ads were indeed unwanted, this is a true positive, meaning the system worked correctly. (Incorrect)
Option C: "The spam filter routed to the 'junk' folder a newsletter that appeared to include links to fake websites."
If the newsletter contained suspicious links, the filter was functioning as designed. This is not necessarily an error. (Incorrect)
Option D: "The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday."
This is a clear example of a false positive because the email was not spam or malicious, yet the filter mistakenly blocked it. (Correct Answer)
IIA GTAG (Global Technology Audit Guide) on Cybersecurity and IT Risks: Discusses false positives and negatives in automated security controls.
IIA’s "Auditing IT Security Controls" Report: Emphasizes the need for tuning security filters to reduce false positives.
COBIT 2019 – DSS05.07 (Manage Security Services): Highlights the importance of minimizing false positives to ensure business communication is not disrupted.
Analysis of Each Option:IIA References:Thus, the correct answer is D. The spam filter blocked a fitness club gift card that coworkers sent to an employee for her birthday.
According to IIA guidance, which of the following statements is true regarding penetration testing?
Testing should not be announced to anyone within the organization to solicit a real-life response.
Testing should take place during heavy operational time periods to test system resilience.
Testing should be wide in scope and primarily address detective management controls for identifying potential attacks.
Testing should address the preventive controls and management's response.
Penetration testing is a security practice used to identify vulnerabilities in an organization's information systems by simulating cyberattacks. It is an essential component of IT risk management and internal auditing under The Institute of Internal Auditors (IIA) standards, particularly in the context of IT governance, cybersecurity risk management, and control assurance.
Focus on Preventive Controls:
Penetration testing evaluates how well preventive controls (e.g., firewalls, encryption, authentication mechanisms) work against potential cyberattacks.
According to the IIA Global Technology Audit Guide (GTAG) 11: Developing an IT Audit Plan, testing should emphasize preventive security measures to minimize risks.
Management’s Response Assessment:
The effectiveness of an organization's incident response plan is also evaluated.
Management's reaction to simulated cyber threats ensures that detection and response mechanisms are functional and aligned with IIA Standard 2120 – Risk Management and IIA GTAG 1: Information Security Governance.
A. Testing should not be announced to anyone within the organization to solicit a real-life response. (Incorrect)
Reason: While unannounced tests (e.g., red team exercises) can provide real-world insights, penetration testing should be coordinated with IT and security personnel.
IIA GTAG 11 emphasizes structured and ethical testing approaches, ensuring that necessary stakeholders are informed to prevent operational disruptions.
B. Testing should take place during heavy operational time periods to test system resilience. (Incorrect)
Reason: While resilience testing is important, penetration testing is typically performed in controlled conditions to avoid disrupting business operations.
IIA Standard 2130 – Control supports minimizing business risks during testing.
C. Testing should be wide in scope and primarily address detective management controls for identifying potential attacks. (Incorrect)
Reason: While detection controls (e.g., intrusion detection systems) are important, penetration testing focuses primarily on preventive controls.
IIA GTAG 1 and IIA GTAG 11 stress proactive security strategies over purely detective measures.
IIA Global Technology Audit Guide (GTAG) 11: Developing an IT Audit Plan – Covers IT security testing, including penetration testing.
IIA GTAG 1: Information Security Governance – Emphasizes the role of security assessments.
IIA Standard 2120 – Risk Management – Highlights the importance of testing preventive security measures.
IIA Standard 2130 – Control – Discusses ensuring operational effectiveness during testing.
Explanation of the Correct Answer (D):Analysis of Incorrect Answers:IIA References:Thus, D is the most accurate choice as per IIA guidance.
Which of the following risks is best addressed by encryption?
Information integrity risk.
Privacy risk.
Access risk.
Software risk.
Comprehensive and Detailed In-Depth Explanation:
Encryption is a security measure that protects the confidentiality of sensitive data by converting it into an unreadable format. This directly addresses privacy risks by preventing unauthorized access to personal or confidential information.
Option A (Information integrity risk) – Integrity controls (e.g., checksums, hash functions) address this risk.
Option C (Access risk) – Managed through authentication and access controls, not encryption.
Option D (Software risk) – Related to vulnerabilities, which encryption does not directly mitigate.
Since encryption protects privacy by securing sensitive data, Option B is correct.
Which of the following performance measures disincentives engaging in earnings management?
Linking performance to profitability measures such as return on investment.
Linking performance to the stock price.
Linking performance to quotas such as units produced.
Linking performance to nonfinancial measures such as customer satisfaction and employees training
Earnings management occurs when companies manipulate financial reporting to meet targets, often leading to unethical practices or financial misstatements. The best way to disincentivize earnings management is to link performance to nonfinancial measures such as customer satisfaction and employee training, which cannot be directly manipulated through financial reporting.
Avoiding Short-Term Financial Manipulation:
When performance is tied to financial metrics (e.g., return on investment, stock price, or production quotas), there is a higher risk of earnings manipulation, such as shifting revenues, deferring expenses, or aggressive accounting practices.
Nonfinancial measures, however, emphasize long-term value creation and are harder to manipulate.
Sustainable Business Growth:
Customer satisfaction and employee training foster long-term profitability by improving product quality, brand reputation, and workforce capabilities.
Companies focusing on these measures build sustainable competitive advantages without distorting financial results.
Regulatory and Ethical Considerations:
Internal auditors, following IIA Standard 2120 (Risk Management), must evaluate risks related to unethical financial reporting.
Regulatory bodies (e.g., SEC, PCAOB, and COSO) emphasize reducing the risk of fraudulent financial reporting by incorporating broader performance measures beyond financial results.
A. Linking performance to profitability measures such as return on investment:
ROI and similar metrics can pressure executives to inflate earnings or cut necessary expenses to meet short-term targets.
B. Linking performance to the stock price:
Stock-based incentives can lead to earnings manipulation (e.g., stock buybacks, revenue recognition adjustments) to inflate stock prices artificially.
C. Linking performance to quotas such as units produced:
Production-based targets can result in overproduction or quality compromises, leading to inefficient resource allocation and long-term financial issues.
IIA Standard 2120 (Risk Management): Internal auditors must assess risks related to financial reporting integrity.
COSO’s Internal Control Framework: Emphasizes performance measures beyond financial results to ensure ethical management practices.
IIA Practice Guide: Assessing Organizational Governance: Encourages balanced scorecards, including nonfinancial KPIs, to reduce financial misstatement risks.
Step-by-Step Justification:Why Not the Other Options?IIA References:Thus, the correct answer is D. Linking performance to nonfinancial measures such as customer satisfaction and employee training. ✅
Copyright © 2021-2026 CertsTopics. All Rights Reserved