ISACA Advanced in AI Security Management (AAISM) Exam Questions and Answers
A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?
Which of the following reviews MUST be conducted as part of an AI impact assessment?
An organization is designing an AI-based credit risk assessment system that will integrate with sensitive financial datasets. Which of the following would BEST support the implementation of security-by-design principles in the AI system’s architecture?
Which of the following methods provides the MOST effective protection against model inversion attacks?
An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?
A retail organization implements an AI-driven recommendation system that utilizes customer purchase history. Which of the following is the BEST way for the organization to ensure privacy and comply with regulatory standards?
An organization deploying an LLM is concerned input manipulations could compromise security. What is the MOST effective way to determine an acceptable risk threshold?
A PRIMARY objective of responsibly providing AI services is to:
A financial organization is concerned about the risk of prompt injection attacks on its customer service chatbot. Which of the following controls BEST addresses this concern?
Which of the following AI data management techniques involves creating validation and test data?
An organization is adopting an agentic AI solution from an external vendor to support its internal IT operations. To evaluate the security posture of this system, which of the following provides the MOST reliable and independently verifiable evidence of implemented security controls?
When evaluating a third-party AI service provider, which of the following master services agreement provisions is MOST critical for managing security risk?
Which of the following is a key risk indicator (KRI) for an AI system used for threat detection?
Which of the following is the MOST critical key risk indicator (KRI) for an AI system?
Which of the following strategies is the MOST effective way to protect against AI data poisoning?
Which of the following approaches BEST helps to reduce model bias?
In a new supply chain management system, AI models used by participating parties are interactively connected to generate advice in support of management decision making. Which of the following is the GREATEST challenge related to this architecture?
Which strategy is MOST effective for penetration testers assessing an AI model against membership inference attacks?
Which of the following should be included in an AI acceptable use policy?
Which of the following is MOST important to consider when validating a third-party AI tool?
Which of the following should be done FIRST when developing an acceptable use policy for generative AI?
An organization plans to apply an AI system to its business, but developers find it difficult to predict system results due to lack of visibility to the inner workings of the AI model. Which of the following is the GREATEST challenge associated with this situation?
Which of the following is the BEST mitigation control for membership inference attacks on AI systems?
Which of the following is MOST important to monitor in order to ensure the effectiveness of an organization’s AI vendor management program?
Which defense is MOST effective against cyberattacks that alter input data to avoid detection?
Which of the following is the BEST way to ensure role clarity and staff effectiveness when implementing AI-assisted security monitoring tools?
An organization concerned about the ethical and responsible use of a newly developed AI product should consider implementing:
Which of the following MOST effectively minimizes the attack surface when securing AI agent components during their development and deployment?
What is the PRIMARY purpose of a dedicated AI management system policy?
To ensure AI tools do not jeopardize ethical principles, it is MOST important to validate that:
Which of the following controls would BEST help to prevent data poisoning in AI models?
In the context of generative AI, which of the following would be the MOST likely goal of penetration testing during a red-teaming exercise?
Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?
When creating a use case for an AI model that provides sensitive decisions affecting end users, which of the following is the GREATEST benefit of using model cards?
The PRIMARY purpose of adopting and implementing AI architecture within an organizational AI program is to:
Which testing technique is BEST for determining how an AI model makes decisions?
Which of the following is the MOST effective way to prevent a model inversion attack?
Which of the following should be the MOST important consideration when conducting an AI impact assessment?
Which BEST describes the role of model cards in AI solutions?
Personal data used to train AI systems can BEST be protected by:
Which of the following MOST effectively secures ongoing stakeholder support for AI initiatives?
During the creation of a new large language model (LLM), an organization procured training data from multiple sources. Which of the following is MOST likely to address the CISO's security and privacy concerns?
An organization utilizes AI-enabled mapping software to plan routes for delivery drivers. A driver following the AI route drives the wrong way down a one-way street, despite numerous signs. Which of the following biases does this scenario demonstrate?
Which of the following is the GREATEST concern when a vendor enables generative AI features for an organization's critical system?
An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network (GAN)–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:
When preparing for an AI incident, which of the following should be done FIRST?
An organization plans to use AI to analyze the shopping patterns of its customers to predict interests and send targeted, customized marketing emails. Which of the following should be done FIRST?
A school district contracts a third-party provider for AI-based curriculum recommendations. Which of the following is the BEST way to ensure the vendor uses AI responsibly?
An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:
Who is responsible for implementing recommendations in a final report after an external AI compliance audit?
Which of the following strategies is the MOST effective way to protect against AI data poisoning?
An organization is planning to commission a third-party AI system to make decisions using sensitive data. Which of the following metrics is MOST important for the organization to consider?
An organization plans to leverage AI in the software development process to speed up coding. Which of the following should the information security manager do FIRST?
As organizations increasingly rely on vendors to develop AI systems, which of the following is the MOST effective way to monitor vendors and ensure compliance with ethical and security standards?
A CISO must provide KPIs for the organization’s newly deployed AI chatbot. Which metrics are BEST?
Which of the following AI data life cycle phases presents the GREATEST inherent risk?
An organization is deploying an automated AI cybersecurity system. Which strategy MOST effectively minimizes human error and improves security?
Which of the following BEST describes the role of risk documentation in an AI governance program?
A data scientist creating categories and training the algorithm on large data sets is an example of which type of AI model learning technique?
Embedding unique identifiers into AI models would BEST help with:
An organization implementing an LLM application sees unexpected cost increases due to excessive computational resource usage. Which vulnerability is MOST likely in need of mitigation?
Which of the following is the MOST effective use of AI-enabled tools in a security operations center (SOC)?
Which of the following is the MOST effective strategy for penetration testers assessing the security of an AI model against membership inference attacks?
An organization's CIO provided the AI steering committee with a list of AI technologies in use and tasked them with categorizing the technologies by risk. Which of the following should the committee do FIRST?
When implementing a generative AI system, which of the following approaches will BEST prevent misalignment between the corporate risk appetite and tolerance?
A SaaS-based LLM system has risks including prompt injection, data poisoning, and model exfiltration. What is the BEST way to ensure consistent risk treatment?
Which of the following is the GREATEST benefit of implementing an AI tool to safeguard sensitive data and prevent unauthorized access?
Cybersecurity teams should FIRST be embedded in the:
A large financial institution is integrating a third-party AI solution into its fraud detection system. Which is the BEST way to reduce AI vendor/supply chain risk?
Which AI data management technique involves creating validation and test data?
Which of the following is the MOST effective action an organization can take to address data security risk when using generative AI features in an application?
Which of the following factors is MOST important for preserving user confidence and trust in generative AI systems?
A large financial services organization is integrating a third-party AI solution into its critical fraud detection system. Which of the following is the BEST way for the organization to reduce risk associated with AI vendor and supply chain dependencies?
An organization is deploying a large language model (LLM) and is concerned that input manipulations may compromise its integrity. Which of the following is the MOST effective way to determine an acceptable risk threshold?
AI developers often find it difficult to explain the processes inside deep learning systems PRIMARILY because:
Which of the following BEST strengthens information security controls around the use of generative AI applications?