Big Cyber Monday Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Isaca AAISM Dumps

Page: 1 / 26
Total 255 questions

ISACA Advanced in AI Security Management (AAISM) Exam Questions and Answers

Question 1

A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?

Options:

A.

Privilege escalation

B.

Data poisoning

C.

Model inversion

D.

Evasion attack

Question 2

Which of the following reviews MUST be conducted as part of an AI impact assessment?

Options:

A.

Testing, evaluation, validation, and verification

B.

Evaluation of model reproducibility

C.

Security control self-assessment (CSA)

D.

Identification of environmental and societal consequences

Question 3

An organization is designing an AI-based credit risk assessment system that will integrate with sensitive financial datasets. Which of the following would BEST support the implementation of security-by-design principles in the AI system’s architecture?

Options:

A.

Segmenting AI services across containers to manage resource constraints

B.

Restricting access to AI models using IP allow lists to reduce public exposure

C.

Integrating differential privacy mechanisms into model training to limit data leakage

D.

Applying threat modeling specific to AI components before deployment

Question 4

Which of the following methods provides the MOST effective protection against model inversion attacks?

Options:

A.

Using adversarial training

B.

Reducing the model’s complexity

C.

Implementing regularization output

D.

Increasing the number of training iterations

Question 5

An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?

Options:

A.

Prompt injection

B.

Jailbreaking

C.

Remote code execution

D.

Evasion

Question 6

A retail organization implements an AI-driven recommendation system that utilizes customer purchase history. Which of the following is the BEST way for the organization to ensure privacy and comply with regulatory standards?

Options:

A.

Conducting quarterly retraining of the AI model to maintain the accuracy of recommendations

B.

Maintaining a register of legal and regulatory requirements for privacy

C.

Establishing a governance committee to oversee AI privacy practices

D.

Storing customer data indefinitely to ensure the AI model has a complete history

Question 7

An organization deploying an LLM is concerned input manipulations could compromise security. What is the MOST effective way to determine an acceptable risk threshold?

Options:

A.

Deploy real-time logging and monitoring

B.

Restrict all inputs containing special characters

C.

Assess the business impact of known threats

D.

Implement a static threshold limiting LLM outputs

Question 8

A PRIMARY objective of responsibly providing AI services is to:

Options:

A.

Enable AI models to operate autonomously

B.

Ensure the confidentiality and integrity of data processed by AI models

C.

Build trust for decisions and predictions made by AI models

D.

Improve the ability of AI models to learn from new data

Question 9

A financial organization is concerned about the risk of prompt injection attacks on its customer service chatbot. Which of the following controls BEST addresses this concern?

Options:

A.

Human-in-the-loop

B.

Input validation

C.

Increasing model parameters

D.

Continuous monitoring

Question 10

Which of the following AI data management techniques involves creating validation and test data?

Options:

A.

Training

B.

Annotating

C.

Splitting

D.

Learning

Question 11

An organization is adopting an agentic AI solution from an external vendor to support its internal IT operations. To evaluate the security posture of this system, which of the following provides the MOST reliable and independently verifiable evidence of implemented security controls?

Options:

A.

Internal red team testing reports

B.

Industry benchmarking peer review

C.

General AI security whitepapers

D.

Third-party audit reports

Question 12

When evaluating a third-party AI service provider, which of the following master services agreement provisions is MOST critical for managing security risk?

Options:

A.

Prohibiting the use of customer data for model training

B.

Restricting query volume thresholds

C.

Sharing real-time log information

D.

Guaranteeing unlimited model retraining requests

Question 13

Which of the following is a key risk indicator (KRI) for an AI system used for threat detection?

Options:

A.

Number of training epochs

B.

Training time of the model

C.

Number of layers in the neural network

D.

Number of system overrides by cyber analysts

Question 14

Which of the following is the MOST critical key risk indicator (KRI) for an AI system?

Options:

A.

The accuracy rate of the model

B.

The amount of data in the model

C.

The response time of the model

D.

The rate of drift in the model

Question 15

Which of the following strategies is the MOST effective way to protect against AI data poisoning?

Options:

A.

Increasing model complexity to better handle data variations

B.

Ensuring the model is trained on diverse data sources

C.

Incorporating more features and data into model training

D.

Using robust data validation techniques and anomaly detection

Question 16

Which of the following approaches BEST helps to reduce model bias?

Options:

A.

Increasing the number of labels per instance

B.

Decreasing the frequency of model updates

C.

Utilizing a more complex model architecture

D.

Ensuring diversity in training data sources

Question 17

In a new supply chain management system, AI models used by participating parties are interactively connected to generate advice in support of management decision making. Which of the following is the GREATEST challenge related to this architecture?

Options:

A.

Establishing clear lines of responsibility for AI model outputs

B.

Identifying hallucinations returned by AI models

C.

Determining the aggregate risk of the system

D.

Explaining the overall benefit of the system to stakeholders

Question 18

Which strategy is MOST effective for penetration testers assessing an AI model against membership inference attacks?

Options:

A.

Generating synthetic training data

B.

Analyzing AI model confidence scores

C.

Disabling model logging

D.

Measuring accuracy on the test set

Question 19

Which of the following should be included in an AI acceptable use policy?

Options:

A.

AI training data requirements

B.

Data collection and storage processes

C.

Ethical and legal compliance standards

D.

AI monitoring requirements

Question 20

Which of the following is MOST important to consider when validating a third-party AI tool?

Options:

A.

Terms and conditions

B.

Right to audit

C.

Industry analysis and certifications

D.

Roundtable testing

Question 21

Which of the following should be done FIRST when developing an acceptable use policy for generative AI?

Options:

A.

Determine the scope and intended use of AI

B.

Review AI regulatory requirements

C.

Consult with risk management and legal

D.

Review existing company policies

Question 22

An organization plans to apply an AI system to its business, but developers find it difficult to predict system results due to lack of visibility to the inner workings of the AI model. Which of the following is the GREATEST challenge associated with this situation?

Options:

A.

Gaining the trust of end users through explainability and transparency

B.

Assigning a risk owner who is responsible for system uptime and performance

C.

Determining average turnaround time for AI transaction completion

D.

Continuing operations to meet expected AI security requirements

Question 23

Which of the following is the BEST mitigation control for membership inference attacks on AI systems?

Options:

A.

Model ensemble techniques

B.

AI threat modeling

C.

Differential privacy

D.

Cybersecurity-oriented red teaming

Question 24

Which of the following is MOST important to monitor in order to ensure the effectiveness of an organization’s AI vendor management program?

Options:

A.

Vendor compliance with AI-related requirements

B.

Vendor reviews of external AI threat reports

C.

Vendor results in compliance training programs

D.

Vendor participation in industry AI research

Question 25

Which defense is MOST effective against cyberattacks that alter input data to avoid detection?

Options:

A.

Enhancing model robustness through adversarial training

B.

Restricting access to internal model parameters

C.

Conducting periodic monitoring of decisions

D.

Applying differential privacy to training data

Question 26

Which of the following is the BEST way to ensure role clarity and staff effectiveness when implementing AI-assisted security monitoring tools?

Options:

A.

Delay implementation until more data scientists are hired

B.

Increase budgets for AI certifications

C.

Update the security program to include cross-functional AI-specific responsibilities

D.

Transition responsibilities to external consultants

Question 27

An organization concerned about the ethical and responsible use of a newly developed AI product should consider implementing:

Options:

A.

Model cards

B.

Vendor monitoring

C.

An accountability model

D.

Security by design

Question 28

Which of the following MOST effectively minimizes the attack surface when securing AI agent components during their development and deployment?

Options:

A.

Deploy pre-trained models directly into production.

B.

Consolidate event logs for correlation and centralized analysis.

C.

Schedule periodic manual code reviews.

D.

Implement compartmentalization with least privilege enforcement.

Question 29

What is the PRIMARY purpose of a dedicated AI management system policy?

Options:

A.

Minimizing environmental impact

B.

Optimizing AI model accuracy

C.

Complying with external regulations

D.

Providing a framework to set AI objectives

Question 30

To ensure AI tools do not jeopardize ethical principles, it is MOST important to validate that:

Options:

A.

The organization has implemented a responsible development policy

B.

Outputs of AI tools do not perpetuate adverse biases

C.

Stakeholders have approved alignment with company values

D.

AI tools are evaluated by the privacy department before implementation

Question 31

Which of the following controls would BEST help to prevent data poisoning in AI models?

Options:

A.

Increasing the size of the training data set

B.

Implementing a strict data validation mechanism

C.

Establishing continuous monitoring

D.

Regularly updating the foundational model

Question 32

In the context of generative AI, which of the following would be the MOST likely goal of penetration testing during a red-teaming exercise?

Options:

A.

Generate outputs that are unexpected using adversarial inputs

B.

Stress test the model’s decision-making process

C.

Degrade the model’s performance for existing use cases

D.

Replace the model’s outputs with entirely random content

Question 33

Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?

Options:

A.

Health support system

B.

Credit risk modeling system

C.

Car navigation system

D.

Industrial control system

Question 34

When creating a use case for an AI model that provides sensitive decisions affecting end users, which of the following is the GREATEST benefit of using model cards?

Options:

A.

Ethical considerations of the model are documented

B.

Technical instructions for model deployment are created

C.

Data collection requirements are reduced

D.

Model type selection is documented

Question 35

The PRIMARY purpose of adopting and implementing AI architecture within an organizational AI program is to:

Options:

A.

Deploy fast and cost-efficient AI systems

B.

Provide a basis for identifying threats and vulnerabilities

C.

Align AI system components with business goals

D.

Ensure powerful and scalable AI systems

Question 36

Which testing technique is BEST for determining how an AI model makes decisions?

Options:

A.

Red team

B.

Black box

C.

White box

D.

Blue team

Question 37

Which of the following is the MOST effective way to prevent a model inversion attack?

Options:

A.

Monitor model output for anomalies

B.

Utilize data pseudonymization

C.

Implement differential privacy during model training

D.

Ensure data minimization

Question 38

Which of the following should be the MOST important consideration when conducting an AI impact assessment?

Options:

A.

Achieve business objectives

B.

Effect on employee retention

C.

Security awareness training

D.

Reputation of the organization

Question 39

Which BEST describes the role of model cards in AI solutions?

Options:

A.

They visualize AI model performance

B.

They document training data and AI model use cases

C.

They help developers create synthetic data

D.

They automatically fine-tune AI models

Question 40

Personal data used to train AI systems can BEST be protected by:

Options:

A.

Erasing personal data after training

B.

Ensuring the quality of personal data

C.

Anonymizing personal data

D.

Hashing personal data

Question 41

Which of the following MOST effectively secures ongoing stakeholder support for AI initiatives?

Options:

A.

Quantifying and communicating the value of AI solutions

B.

Conducting periodic staff training

C.

Addressing and optimizing AI-related risk

D.

Developing and monitoring an AI strategic roadmap

Question 42

During the creation of a new large language model (LLM), an organization procured training data from multiple sources. Which of the following is MOST likely to address the CISO's security and privacy concerns?

Options:

A.

Data augmentation

B.

Data minimization

C.

Data classification

D.

Data discovery

Question 43

An organization utilizes AI-enabled mapping software to plan routes for delivery drivers. A driver following the AI route drives the wrong way down a one-way street, despite numerous signs. Which of the following biases does this scenario demonstrate?

Options:

A.

Selection

B.

Reporting

C.

Confirmation

D.

Automation

Question 44

Which of the following is the GREATEST concern when a vendor enables generative AI features for an organization's critical system?

Options:

A.

Access to the model

B.

Proposed regulatory enhancements

C.

Security monitoring and alerting

D.

Bias and ethical practices

Question 45

An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network (GAN)–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:

Options:

A.

Validation data sets to enable highly realistic AI decisions

B.

Classified real intrusion data based on labeled data

C.

Automated rule creation to increase model performance

D.

Synthetic intrusion data to train the tool’s components

Question 46

When preparing for an AI incident, which of the following should be done FIRST?

Options:

A.

Implement a communication channel to report AI incidents

B.

Establish a cross-functional incident response team with AI knowledge

C.

Establish recovery processes for AI system models and data sets

D.

Create containment and eradication procedures for AI-related incidents

Question 47

An organization plans to use AI to analyze the shopping patterns of its customers to predict interests and send targeted, customized marketing emails. Which of the following should be done FIRST?

Options:

A.

Obtain customer consent

B.

Train the marketing department

C.

Update the terms of service

D.

Verify customer email addresses

Question 48

A school district contracts a third-party provider for AI-based curriculum recommendations. Which of the following is the BEST way to ensure the vendor uses AI responsibly?

Options:

A.

Confirming the AI solution supports single sign-on (SSO)

B.

Verifying the vendor has updated terms of service

C.

Requiring the vendor to provide the model card

D.

Ensuring the vendor offers 24/7 technical support

Question 49

An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:

Options:

A.

synthetic intrusion data to train the tool’s components

B.

validation data sets to enable highly realistic AI decisions

C.

automated rule creation to increase model performance

D.

classified real intrusion data based on labeled data

Question 50

Who is responsible for implementing recommendations in a final report after an external AI compliance audit?

Options:

A.

System architects

B.

Internal auditors

C.

End users

D.

Model owners

Question 51

Which of the following strategies is the MOST effective way to protect against AI data poisoning?

Options:

A.

Ensuring the model is trained on diverse data sources

B.

Increasing model complexity

C.

Using robust data validation techniques and anomaly detection

D.

Incorporating more features and data into model training

Question 52

An organization is planning to commission a third-party AI system to make decisions using sensitive data. Which of the following metrics is MOST important for the organization to consider?

Options:

A.

Model response time

B.

Service availability

C.

Accessibility rating

D.

Accuracy thresholds

Question 53

An organization plans to leverage AI in the software development process to speed up coding. Which of the following should the information security manager do FIRST?

Options:

A.

Conduct an impact assessment

B.

Train developers to verify AI output

C.

Update the security policy to include AI controls

D.

Perform a cost-benefit analysis

Question 54

As organizations increasingly rely on vendors to develop AI systems, which of the following is the MOST effective way to monitor vendors and ensure compliance with ethical and security standards?

Options:

A.

Conducting regular audits of vendor processes and adherence to AI development guidelines

B.

Requiring vendors to monitor their adherence to ethics and security standards

C.

Mandating that vendors share source code and AI documentation with the contracting party

D.

Allowing vendors to self-attest ethical AI compliance and implement benchmark monitoring

Question 55

A CISO must provide KPIs for the organization’s newly deployed AI chatbot. Which metrics are BEST?

Options:

A.

Response time and throughput

B.

Error rate and bias detection

C.

Customer effort score and user retention

D.

Explainability and F1 score

Question 56

Which of the following AI data life cycle phases presents the GREATEST inherent risk?

Options:

A.

Training

B.

Maintenance

C.

Monitoring

D.

Preparation

Question 57

An organization is deploying an automated AI cybersecurity system. Which strategy MOST effectively minimizes human error and improves security?

Options:

A.

Manual monitoring of alerts

B.

Using historical data to train detection software

C.

Utilizing machine learning algorithms to ensure responsible use

D.

Conducting periodic penetration testing

Question 58

Which of the following BEST describes the role of risk documentation in an AI governance program?

Options:

A.

Providing a record of past AI-related incidents for audits

B.

Outlining the acceptable levels of risk for AI-related initiatives

C.

Offering detailed analyses of technical risk and vulnerabilities

D.

Demonstrating governance, risk, and compliance (GRC) for external stakeholders

Question 59

A data scientist creating categories and training the algorithm on large data sets is an example of which type of AI model learning technique?

Options:

A.

Reinforcement

B.

Unsupervised

C.

Machine learning (ML)

D.

Supervised

Question 60

Embedding unique identifiers into AI models would BEST help with:

Options:

A.

Preventing unauthorized access

B.

Tracking ownership

C.

Eliminating AI system biases

D.

Detecting adversarial attacks

Question 61

An organization implementing an LLM application sees unexpected cost increases due to excessive computational resource usage. Which vulnerability is MOST likely in need of mitigation?

Options:

A.

Excessive agency

B.

Sensitive information disclosure

C.

Unbounded consumption

D.

System prompt leakage

Question 62

Which of the following is the MOST effective use of AI-enabled tools in a security operations center (SOC)?

Options:

A.

Employing AI-enabled tools to reduce false negatives by detecting subtle attack patterns

B.

Using AI-enabled tools exclusively to classify all types of security incidents

C.

Replacing human analysis with automated AI decision-making processes

D.

Assigning AI-enabled tools to triage non-critical alerts to preserve SOC resources

Question 63

Which of the following is the MOST effective strategy for penetration testers assessing the security of an AI model against membership inference attacks?

Options:

A.

Disabling AI model logging to reduce noise during testing

B.

Measuring AI model accuracy on the test set

C.

Analyzing AI model confidence scores to indicate training data

D.

Generating synthetic data to replace the training data

Question 64

An organization's CIO provided the AI steering committee with a list of AI technologies in use and tasked them with categorizing the technologies by risk. Which of the following should the committee do FIRST?

Options:

A.

Begin grouping similar AI products and solutions together

B.

Identify vulnerabilities related to the technologies in use

C.

Ensure the AI technologies are included in the asset inventory

D.

Assess risk levels based on risk appetite and regulatory requirements

Question 65

When implementing a generative AI system, which of the following approaches will BEST prevent misalignment between the corporate risk appetite and tolerance?

Options:

A.

Ensuring effective AI key performance indicators (KPIs)

B.

Performing an AI impact assessment

C.

Creating and maintaining an AI risk register

D.

Establishing and monitoring acceptable levels of AI system risk

Question 66

A SaaS-based LLM system has risks including prompt injection, data poisoning, and model exfiltration. What is the BEST way to ensure consistent risk treatment?

Options:

A.

Apply control baselines from a recognized industry standard

B.

Implement an AI threat control matrix mapping threats to controls and assurance

C.

Focus on post-deployment red teaming

D.

Rely on vendor audit reports and SLAs

Question 67

Which of the following is the GREATEST benefit of implementing an AI tool to safeguard sensitive data and prevent unauthorized access?

Options:

A.

Timely analysis of endpoint activities

B.

Timely initiation of incident response

C.

Reduced number of false positives

D.

Reduced need for data classification

Question 68

Cybersecurity teams should FIRST be embedded in the:

Options:

A.

Model testing phase

B.

Model deployment phase

C.

Model training phase

D.

Model design phase

Question 69

A large financial institution is integrating a third-party AI solution into its fraud detection system. Which is the BEST way to reduce AI vendor/supply chain risk?

Options:

A.

Conduct annual vulnerability assessments after integration

B.

Establish contractual agreements requiring evidence of secure development practices

C.

Use isolated virtual environments to validate integration

D.

Focus on performance testing

Question 70

Which AI data management technique involves creating validation and test data?

Options:

A.

Learning

B.

Splitting

C.

Training

D.

Annotating

Question 71

Which of the following is the MOST effective action an organization can take to address data security risk when using generative AI features in an application?

Options:

A.

Rely on the AI provider’s independent third-party audit reports for assurance

B.

Establish policies and awareness training for acceptable use of AI

C.

Require opt-out provisions for data usage in service agreements

D.

Establish guidelines and best practices with third parties for intellectual property ownership

Question 72

Which of the following factors is MOST important for preserving user confidence and trust in generative AI systems?

Options:

A.

Bias minimization

B.

Access controls and secure storage solutions

C.

Transparent disclosure and informed consent

D.

Data anonymization

Question 73

A large financial services organization is integrating a third-party AI solution into its critical fraud detection system. Which of the following is the BEST way for the organization to reduce risk associated with AI vendor and supply chain dependencies?

Options:

A.

Conducting annual vulnerability assessments of the fraud detection system after integration

B.

Focusing on performance testing to ensure the solution meets operational requirements

C.

Establishing contractual agreements requiring vendors to provide evidence of secure development practices

D.

Implementing isolated virtual environments to validate the integration of the fraud detection system with the solution

Question 74

An organization is deploying a large language model (LLM) and is concerned that input manipulations may compromise its integrity. Which of the following is the MOST effective way to determine an acceptable risk threshold?

Options:

A.

Restrict all user inputs containing special characters

B.

Deploy a real-time logging and monitoring system

C.

Implement a static risk threshold by limiting LLM outputs

D.

Assess the business impact of known threats

Question 75

AI developers often find it difficult to explain the processes inside deep learning systems PRIMARILY because:

Options:

A.

Training data input for learning is spread throughout the public domain and continues to change

B.

Generated knowledge dynamically changes in memory without being tracked by change history logs

C.

Applied algorithms are based on probability theories to improve system performance

D.

Neural network architectures can include statistical methods that are not fully understood

Question 76

Which of the following BEST strengthens information security controls around the use of generative AI applications?

Options:

A.

Ensuring controls exceed industry benchmarks

B.

Monitoring AI outputs against policy

C.

Implementing a kill switch

D.

Validating AI model training data

Page: 1 / 26
Total 255 questions