Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Isaca > Advanced in AI Audit > AAIA

AAIA ISACA Advanced in AI Audit (AAIA) Question and Answers

Question # 4

A healthcare organization uses data clustering to group patients by medical history for personalized treatment recommendations. Which of the following is the GREATEST privacy risk associated with this practice?

A.

The clustering requires more data, increasing the risk of a privacy breach.

B.

Clustering increases the complexity of the model, making data harder to anonymize.

C.

Irrelevant features in the data may result in inaccurate or biased treatments.

D.

Clusters can reveal sensitive personal information depending on how the information is presented.

Full Access
Question # 5

An IS auditor is performing an inventory audit for a manufacturing organization. Which of the following would BEST enable the auditor to identify types of products without assistance from organizational staff?

A.

Natural language processing

B.

Speech modeling

C.

Robotic process automation (RPA)

D.

Computer vision

Full Access
Question # 6

Which of the following is MOST important to have in place when initially populating data into a data frame for an AI model?

A.

The box charts, histograms, scatterplots, and Venn diagrams that identify correlations and outliers

B.

The code for separating data into training and testing data sets

C.

An analysis of exploratory data that checks for incorrect data types, null values, and duplicate entries

D.

An approved risk assessment for including, excluding, or subsequently dropping data attributes from the model

Full Access
Question # 7

An IS auditor uses an internally developed generative AI tool to prepare a status update for audit stakeholders. Which of the following is the auditor’s MOST appropriate course of action?

A.

Compare results with a publicly available generative AI tool to ensure outputs are similar.

B.

Assess whether the information provided is complete and accurate.

C.

Regenerate the results to ensure similar outputs are provided.

D.

Share and review the results with management.

Full Access
Question # 8

Which of the following should be done FIRST when an attacker exfiltrates sensitive information from an AI model?

A.

Implement rate limiting and query restrictions to reduce exploitation attempts.

B.

Isolate impacted systems until the attack vector is identified.

C.

Rebuild the AI model using a more secure architecture.

D.

Inform regulators and affected stakeholders of a potential data breach.

Full Access
Question # 9

Which of the following testing techniques would BEST validate whether an organization's data governance program effectively ensures data quality and integrity for AI model training and deployment?

A.

Performing a business impact analysis (BIA) to assess the consequences of AI model failure

B.

Reviewing the organization’s AI software development life cycle documentation

C.

Conducting a penetration test to identify vulnerabilities in the model

D.

Assessing data lineage to verify the traceability of data sources

Full Access
Question # 10

Which of the following is the PRIMARY benefit of implementing a robust data governance framework specific to AI solutions in an organization?

A.

It focuses on enhancing the accuracy and reliability of AI model predictions.

B.

It accelerates AI implementation timelines by fully automating data preparation processes.

C.

It fosters adherence to industry regulations while minimizing the risk of data breaches and privacy violations.

D.

It reduces the need for human oversight, ensuring seamless and autonomous data governance.

Full Access
Question # 11

A retail organization uses an AI model to analyze customers' purchase history in order to offer personalized discounts. Which of the following practices represents the MOST ethical use of customer data?

A.

Utilizing customer purchase data only after obtaining explicit consent and allowing customers to opt out

B.

Retaining and analyzing all available customer data to ensure unbiased recommendations

C.

Providing the public with access to review and audit the data set of collected customer information

D.

Sharing customer purchase data with third-party vendors to improve advertising and communication

Full Access
Question # 12

Which of the following is MOST important to consider when auditing an organization's AI procedures?

A.

Frequency of AI system updates to enhance security

B.

Employee training on recognized AI best practices

C.

Backup and recovery in the event of an AI data breach

D.

AI data validation and filtration to prevent data poisoning

Full Access
Question # 13

When using off-the-shelf AI models, which of the following is the MOST appropriate way for organizations to approach vendor management?

A.

Ensure a minimum of three quotes have been obtained for market research and comparison.

B.

Establish responsibility and clear terms for model updates and support.

C.

Only use models from vendors with globally recognized accreditation.

D.

Use the vendor only if the contract has been reviewed by the information security department.

Full Access
Question # 14

When auditing a research agency's use of generative AI models for analyzing scientific data, which of the following is MOST critical to evaluate in order to prevent hallucinatory results and ensure the accuracy of outputs?

A.

The effectiveness of data anonymization processes that help preserve data quality

B.

The algorithms for generative AI models designed to detect and correct data bias before processing

C.

The frequency of data audits verifying the integrity and accuracy of inputs

D.

The measures in place to ensure the appropriateness and relevance of input data for generative AI models

Full Access
Question # 15

Which of the following is an IS auditor's MOST important course of action when determining whether source data should be entered into approved generative AI tools to assist with an audit?

A.

Validate that the tool is leveraging the latest model.

B.

Validate that the tool provides a privacy notice.

C.

Determine whether any AI model hallucinations have occurred.

D.

Determine whether the information is reliable.

Full Access
Question # 16

Which of the following do supervised AI learning models PRIMARILY use to train algorithms?

A.

Unlabeled data sets

B.

Clustered data sets

C.

Labeled data sets

D.

Randomized data sets

Full Access
Question # 17

Which of the following is the MOST important task when gathering data during the AI system development process?

A.

Stratifying the data

B.

Isolating the system

C.

Cleaning the data

D.

Training the system

Full Access
Question # 18

An organization uses an AI-powered tool to detect and respond to cybersecurity threats in real time. An IS auditor finds that the tool produces excessive false positives, increasing the workload of the security team. Which of the following techniques should the auditor recommend to BEST evaluate the tool's effectiveness in managing this issue?

A.

Use a log analysis tool to examine the types and frequency of alerts generated.

B.

Implement a benchmarking tool to compare the system's alerting capability with industry standards.

C.

Conduct penetration testing to assess the system's ability to detect genuine threats.

D.

Deploy a machine learning (ML) validation tool to increase the model's accuracy and performance.

Full Access
Question # 19

An IS auditor is interviewing management about implemented controls around machine learning (ML) models deployed in the production environment. Which of the following schedules for reviewing the performance of a deployed model would be of GREATEST concern to the auditor?

A.

After changes to hardware and software platforms

B.

After functionality changes

C.

One time prior to migrating to production

D.

On an annual recurring basis

Full Access
Question # 20

When converting data categories before training an AI model, which of the following scenarios represents the GREATEST risk?

A.

One-hot encoding the data attribute car colors for the options red, blue, green, black, white

B.

Creating dummy variables for the data attribute dog breed for the options labrador, terrier, beagle

C.

One-hot encoding the data attribute customer rewards category for the options economy, business, first class

D.

Creating dummy variables for the data attribute product flavor for the options vanilla, chocolate, strawberry, banana

Full Access
Question # 21

Which of the following is the MOST important reason to perform regular ethical reviews of AI systems?

A.

To improve the accuracy and performance of the systems

B.

To align AI system development with organizational values and principles

C.

To ensure the systems align with the preservation of individual rights

D.

To identify and mitigate potential data drift within models

Full Access
Question # 22

Which use case for an AI model to be used by a food delivery service would pose ethical risk to the organization?

A.

Correlating time, cost, delivery distance, and customer satisfaction metrics to issue coupons to customers receiving substandard service

B.

Basing driver retention and termination decisions on the number of delivered orders per total hours worked as compared to an industry benchmark

C.

Comparing total food preparation and delivery time to an industry benchmark to set key performance and risk indicators for individual restaurants

D.

Using customer service metrics for service speed and food quality to predict customer retention and forecast revenue

Full Access
Question # 23

During an audit of an investment organization's AI-powered software, an IS auditor identifies a potential security risk. What is the GREATEST risk associated with staff exfiltrating organizational data to a generative AI tool?

A.

Data contamination due to biased AI model outputs

B.

Unauthorized data disclosure

C.

Potential business disruptions

D.

Excessive reliance on AI-generated insights

Full Access
Question # 24

An organization uses an AI image generation platform to create promotional materials. An IS auditor identifies that the platform includes copyrighted images in its training data. Which of the following is the auditor's BEST recommendation to address this issue?

A.

Implement a manual review process to ensure no copyrighted images are used in generated outputs.

B.

Use a platform that certifies the provenance and licensing of its training data.

C.

Label all AI-generated images to disclaim the possibility of third-party content.

D.

Suspend the use of the platform until the training data is sanitized.

Full Access
Question # 25

An IS auditor is looking to expedite reporting for an audit with complex issues. Which of the following would be the MOST effective way for the auditor to use generative AI?

A.

Developing action items discussed in closing meetings for management action plans

B.

Developing a draft of an executive summary based on detailed findings and audit scope

C.

Revising audit conclusions with precise verbiage to describe the audit observations

D.

Revising audit background and scope information based on new information from management

Full Access
Question # 26

A car manufacturer uses an AI model to predict maintenance needs for its vehicles. Which of the following techniques can an IS auditor apply to MOST effectively verify the AI model's decisions to stakeholders?

A.

Using neural network visualization to show how the AI model processes data through its layers

B.

Using K-means algorithms to group vehicles based on mileage or engine temperature for maintenance patterns

C.

Utilizing support vector machines (SVM) to classify vehicles based on maintenance urgency

D.

Using local interpretable model-agnostic explanation (LIME) to analyze how specific features contribute to predictions

Full Access
Question # 27

The BEST way to prevent sensitive information disclosure by large language model (LLM) chatbots is through:

A.

Manual monitoring

B.

Access controls

C.

Data sanitization

D.

Data masking

Full Access