Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > AI-Centric Security Management > AAISM

AAISM ISACA Advanced in AI Security Management (AAISM) Exam Question and Answers

Question # 4

An automotive manufacturer uses AI-enabled sensors on machinery to monitor variables such as vibration, temperature, and pressure. Which of the following BEST demonstrates how this approach contributes to operational resilience?

A.

Scheduling repairs for critical equipment based on real-time condition monitoring

B.

Performing regular maintenance based on manufacturer recommendations

C.

Conducting monthly manual reviews of maintenance schedules

D.

Automating equipment repairs without any human intervention

Full Access
Question # 5

A retail organization implements an AI-driven recommendation system that utilizes customer purchase history. Which of the following is the BEST way for the organization to ensure privacy and comply with regulatory standards?

A.

Conducting quarterly retraining of the AI model to maintain the accuracy of recommendations

B.

Maintaining a register of legal and regulatory requirements for privacy

C.

Establishing a governance committee to oversee AI privacy practices

D.

Storing customer data indefinitely to ensure the AI model has a complete history

Full Access
Question # 6

Which of the following types of testing can MOST effectively mitigate prompt hacking?

A.

Load

B.

Input

C.

Regression

D.

Adversarial

Full Access
Question # 7

The PRIMARY ethical concern of generative AI is that it may:

A.

Produce unexpected data that could lead to bias

B.

Cause information integrity issues

C.

Cause information to become unavailable

D.

Breach the confidentiality of information

Full Access
Question # 8

Which of the following is the MOST serious consequence of an AI system correctly guessing the personal information of individuals and drawing conclusions based on that information?

A.

The exposure of personal information may result in litigation

B.

The publicly available output of the model may include false or defamatory statements about individuals

C.

The output may reveal information about individuals or groups without their knowledge

D.

The exposure of personal information may lead to a decline in public trust

Full Access
Question # 9

Which of the following is the MOST effective use of AI in incident response?

A.

Streamlining incident response testing

B.

Automating incident response triage

C.

Improving incident response playbook

D.

Ensuring chain of custody

Full Access
Question # 10

An organization using an AI model for financial forecasting identifies inaccuracies caused by missing data. Which of the following is the MOST effective data cleaning technique to improve model performance?

A.

Increasing the frequency of model retraining with the existing data set

B.

Applying statistical methods to address missing data and reduce bias

C.

Deleting outlier data points to prevent unusual values impacting the model

D.

Tuning model hyperparameters to increase performance and accuracy

Full Access
Question # 11

An organization is facing a deepfake attack intended to manipulate stock prices. The organization’s crisis communication plan has been activated. Which of the following is MOST important to include in the initial response?

A.

Conduct employee awareness training on recognizing deepfake videos and audio

B.

Provide clarifying information in a pre-approved public statement

C.

Conduct a detailed forensic analysis to identify the source of the deepfake

D.

Engage with brand monitoring services to track social media activity

Full Access
Question # 12

Which of the following information is MOST important to include in a centralized AI inventory?

A.

Ownership and accountability of AI systems

B.

AI model use cases

C.

Training data sets

D.

Foundation model and package registry

Full Access
Question # 13

An organization utilizes AI-enabled mapping software to plan routes for delivery drivers. A driver following the AI route drives the wrong way down a one-way street, despite numerous signs. Which of the following biases does this scenario demonstrate?

A.

Selection

B.

Reporting

C.

Confirmation

D.

Automation

Full Access
Question # 14

Which of the following AI system vulnerabilities is MOST easily exploited by adversaries?

A.

Inaccurate generalizations from new data by the AI model

B.

Weak controls for access to the AI model

C.

Lack of protection against denial of service (DoS) attacks

D.

Inability to detect input modifications causing inappropriate AI outputs

Full Access
Question # 15

Which of the following key risk indicators (KRIs) is MOST relevant when evaluating the effectiveness of an organization’s AI risk management program?

A.

Number of AI models deployed into production

B.

Percentage of critical business systems with AI components

C.

Percentage of AI projects in compliance

D.

Number of AI-related training requests submitted

Full Access
Question # 16

Which of the following is MOST important to monitor in order to ensure the effectiveness of an organization’s AI vendor management program?

A.

Vendor compliance with AI-related requirements

B.

Vendor reviews of external AI threat reports

C.

Vendor results in compliance training programs

D.

Vendor participation in industry AI research

Full Access
Question # 17

Which of the following would MOST effectively ensure an organization developing AI systems has comprehensive data classification and inventory management?

A.

Creating a centralized team to oversee the classification of data used in AI projects

B.

Conducting quarterly audits of AI data sets for anomalies and missing metadata

C.

Establishing a manual process to categorize data based on business needs and regulatory compliance

D.

Implementing an automated data cataloging tool that integrates with all organizational data repositories

Full Access
Question # 18

An organization develops and implements an AI-based plug-in for users that summarizes their individual emails. Which of the following is the GREATEST risk associated with this application?

A.

Lack of application vulnerability scanning

B.

Data format incompatibility

C.

Insufficient rate limiting for APIs

D.

Inadequate controls over parameters

Full Access
Question # 19

Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?

A.

Health support system

B.

Credit risk modeling system

C.

Car navigation system

D.

Industrial control system

Full Access
Question # 20

Which of the following is the GREATEST benefit of implementing an AI tool to safeguard sensitive data and prevent unauthorized access?

A.

Timely analysis of endpoint activities

B.

Timely initiation of incident response

C.

Reduced number of false positives

D.

Reduced need for data classification

Full Access
Question # 21

An organization is reviewing an AI application to determine whether it is still needed. Engineers have been asked to analyze the number of incorrect predictions against the total number of predictions made. Which of the following is this an example of?

A.

Control self-assessment (CSA)

B.

Model validation

C.

Key performance indicator (KPI)

D.

Explainable decision-making

Full Access
Question # 22

An AI research team is developing a natural language processing model that relies on several open-source libraries. Which of the following is the team’s BEST course of action to ensure the integrity of the software packages used?

A.

Maintain a list of frequently used libraries to ensure consistent application in projects

B.

Scan the packages and libraries for malware prior to installation

C.

Use the latest version of all libraries from public repositories

D.

Retrain the model regularly to handle package and library updates

Full Access
Question # 23

During the creation of a new large language model (LLM), an organization procured training data from multiple sources. Which of the following is MOST likely to address the CISO's security and privacy concerns?

A.

Data augmentation

B.

Data minimization

C.

Data classification

D.

Data discovery

Full Access
Question # 24

Which of the following would BEST help mitigate vulnerabilities associated with hidden triggers in generative AI models?

A.

Regularly retraining the model using a diverse data set

B.

Applying differential privacy and masking sensitive patterns in the training data

C.

Incorporating adversarial training to expose and neutralize potential triggers

D.

Monitoring model outputs and suspicious patterns to detect trigger activations

Full Access
Question # 25

Embedding unique identifiers into AI models would BEST help with:

A.

Preventing unauthorized access

B.

Tracking ownership

C.

Eliminating AI system biases

D.

Detecting adversarial attacks

Full Access
Question # 26

A large pharmaceutical company using a new AI solution to develop treatment regimens is concerned about potential hallucinations with the introduction of real-world data. Which of the following is MOST likely to reduce this risk?

A.

Penetration testing

B.

Human-in-the-loop

C.

AI impact analysis

D.

Data asset validation

Full Access
Question # 27

Which of the following BEST enables an organization to maintain visibility to its AI usage?

A.

Ensuring the board approves the policies and standards that define corporate AI strategy

B.

Maintaining a monthly dashboard that captures all AI vendors

C.

Maintaining a comprehensive inventory of AI systems and business units that leverage them

D.

Measuring the impact of AI implementation using key performance indicators (KPIs)

Full Access