ISACA Advanced in AI Security Management (AAISM) Exam Questions and Answers
An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?
The PRIMARY benefit of implementing moderation controls in generative AI applications is that it can:
When integrating AI for innovation, which of the following can BEST help an organization manage security risk?
After deployment, an AI model’s output begins to drift outside of the expected range. Which of the following is the development team’s BEST course of action?
Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?
As organizations increasingly rely on vendors to develop AI systems, which of the following is the MOST effective way to monitor vendors and ensure compliance with ethical and security standards?
Which of the following is the BEST reason to immediately disable an AI system?
When an attacker uses synthetic data to reverse engineer an organization’s AI model, it is an example of which of the following types of attack?
Which of the following is the GREATEST benefit of implementing an AI tool to safeguard sensitive data and prevent unauthorized access?
A large pharmaceutical company using a new AI solution to develop treatment regimens is concerned about potential hallucinations with the introduction of real-world data. Which of the following is MOST likely to reduce this risk?
Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?
Which of the following is the MOST important consideration when deciding how to compose an AI red team?
Which of the following MOST effectively minimizes the attack surface when securing AI agent components during their development and deployment?
The PRIMARY ethical concern of generative AI is that it may:
Which of the following recommendations would BEST help a service provider mitigate the risk of lawsuits arising from generative AI’s access to and use of internet data?
Which of the following is a key risk indicator (KRI) for an AI system used for threat detection?
Which of the following is the BEST mitigation control for membership inference attacks on AI systems?
Which of the following is the GREATEST risk inherent to implementing generative AI?
To ensure AI tools do not jeopardize ethical principles, it is MOST important to validate that:
When documenting information about machine learning (ML) models, which of the following artifacts BEST helps enhance stakeholder trust?
Which of the following is the MOST important course of action when implementing continuous monitoring and reporting for AI-based systems?
An organization uses an AI tool to scan social media for product reviews. Fraudulent social media accounts begin posting negative reviews attacking the organization's product. Which type of AI attack is MOST likely to have occurred?
An organization recently introduced a generative AI chatbot that can interact with users and answer their queries. Which of the following would BEST mitigate hallucination risk identified by the risk team?
Which of the following technologies can be used to manage deepfake risk?
Which of the following will BEST reduce data bias in machine learning (ML) algorithms?
Which of the following AI system vulnerabilities is MOST easily exploited by adversaries?
An AI research team is developing a natural language processing model that relies on several open-source libraries. Which of the following is the team’s BEST course of action to ensure the integrity of the software packages used?