New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > AI-Centric Security Management > AAISM

AAISM ISACA Advanced in AI Security Management (AAISM) Exam Question and Answers

Question # 4

Which of the following BEST ensures AI components are validated during disaster recovery testing?

A.

Running simulated data-loss scenarios by deleting test feature-store records

B.

Disconnecting model training clusters to test retraining workflows

C.

Simulating DoS attacks on AI APIs

D.

Monitoring model performance during failover and recovery

Full Access
Question # 5

An AI system that supports critical processes has deviated from expected performance and is producing biased outcomes. Which of the following is the BEST course of action?

A.

Retrain the model with a new and expanded dataset

B.

Perform a root cause analysis to identify mitigation steps

C.

Conduct audits of the data and the model

D.

Activate the model kill switch

Full Access
Question # 6

The PRIMARY purpose of adopting and implementing AI architecture within an organizational AI program is to:

A.

Deploy fast and cost-efficient AI systems

B.

Provide a basis for identifying threats and vulnerabilities

C.

Align AI system components with business goals

D.

Ensure powerful and scalable AI systems

Full Access
Question # 7

Which of the following controls BEST mitigates the inherent limitations of generative AI models?

A.

Ensuring human oversight

B.

Adopting AI-specific regulations

C.

Classifying and labeling AI systems

D.

Reverse engineering the models

Full Access
Question # 8

How can an organization BEST protect itself from payment diversions caused by deepfake attacks impersonating management?

A.

Require mandatory deepfake detection training for all employees

B.

Mandate that payments be sent only once per week

C.

Issue a security policy on deepfakes

D.

Implement resilient payment approval processes

Full Access
Question # 9

During red-team testing of an AI system used for lending decisions, which technique BEST simulates a data poisoning attack?

A.

Adding noise to output predictions

B.

Stealing model weights

C.

Inputting encrypted data

D.

Corrupting training datasets to manipulate outcomes

Full Access
Question # 10

Which of the following is the BEST way to ensure an organization remains compliant with industry regulations when decommissioning an AI system used to record patient data?

A.

Ensure backups are tested and access controls are recorded and audited to ensure compliance

B.

Update governance policies based on lessons learned and ensure a feedback loop exists

C.

Perform a post-destruction risk assessment to verify that there is no residual exposure of data

D.

Ensure the certificate of destruction is received and archived in line with data retention policies

Full Access
Question # 11

When using AI as part of incident response, which of the following BEST ensures the automation aligns with regulatory and governance obligations?

A.

Use deep learning models to autonomously classify all incidents

B.

Train the AI incident response platform to mirror legacy response workflows and log containment

C.

Apply anomaly detection models to filter incoming threats and automate containment

D.

Implement a tiered automation strategy where severity ratings inform the need for human oversight

Full Access
Question # 12

When implementing a generative AI system, which of the following approaches will BEST prevent misalignment between the corporate risk appetite and tolerance?

A.

Ensuring effective AI key performance indicators (KPIs)

B.

Performing an AI impact assessment

C.

Creating and maintaining an AI risk register

D.

Establishing and monitoring acceptable levels of AI system risk

Full Access
Question # 13

Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?

A.

F1 score

B.

Recall

C.

Precision

D.

Specificity

Full Access
Question # 14

Which of the following BEST enables an organization to strengthen information security controls around the use of generative AI applications?

A.

Ensuring controls exceed industry benchmarks

B.

Monitoring AI outputs against policy

C.

Validating AI model training data

D.

Implementing a kill switch

Full Access
Question # 15

Which strategy is MOST effective for penetration testers assessing an AI model against membership inference attacks?

A.

Generating synthetic training data

B.

Analyzing AI model confidence scores

C.

Disabling model logging

D.

Measuring accuracy on the test set

Full Access
Question # 16

A financial organization relies on AI-based identity verification and fraud detection services. Which of the following BEST integrates AI security risk into the business continuity plan (BCP)?

A.

Using explainable AI to document decision paths

B.

Periodic retraining using pre-labeled data

C.

Including AI model supporting infrastructure in disaster recovery scenarios

D.

Duplicating AI microservices across multiple availability zones

Full Access
Question # 17

Within an incident handling process, which of the following would BEST help restore end user trust with an AI system?

A.

The AI model prioritizes incidents based on business impact

B.

AI is being used to monitor incident detection and alerts

C.

The AI model’s outputs are validated by team members

D.

Remediation of the AI system based on lessons learned

Full Access
Question # 18

An AI research team is developing a natural language processing model that relies on several open-source libraries. Which of the following is the team’s BEST course of action to ensure the integrity of the software packages used?

A.

Maintain a list of frequently used libraries to ensure consistent application in projects

B.

Scan the packages and libraries for malware prior to installation

C.

Use the latest version of all libraries from public repositories

D.

Retrain the model regularly to handle package and library updates

Full Access
Question # 19

An organization is deploying a large language model (LLM) and is concerned that input manipulations may compromise its integrity. Which of the following is the MOST effective way to determine an acceptable risk threshold?

A.

Restrict all user inputs containing special characters

B.

Deploy a real-time logging and monitoring system

C.

Implement a static risk threshold by limiting LLM outputs

D.

Assess the business impact of known threats

Full Access
Question # 20

Which of the following is MOST important to monitor in order to ensure the effectiveness of an organization’s AI vendor management program?

A.

Vendor compliance with AI-related requirements

B.

Vendor reviews of external AI threat reports

C.

Vendor results in compliance training programs

D.

Vendor participation in industry AI research

Full Access
Question # 21

When evaluating a third-party AI service provider, which master services agreement (MSA) provision is MOST critical for managing security risk?

A.

Guaranteeing unlimited model retraining requests

B.

Sharing real-time log information

C.

Prohibiting the use of customer data for model training

D.

Restricting query volume thresholds

Full Access
Question # 22

A CISO must provide KPIs for the organization’s newly deployed AI chatbot. Which metrics are BEST?

A.

Response time and throughput

B.

Error rate and bias detection

C.

Customer effort score and user retention

D.

Explainability and F1 score

Full Access
Question # 23

A security assessment revealed that attackers could access sensitive company data through chat interface injection. What is the BEST mitigation?

A.

Conducting regular security audits

B.

Manually reviewing AI model outputs

C.

Implementing input validation and templates

D.

Ensuring continuous monitoring and tagging

Full Access
Question # 24

An automotive manufacturer uses AI-enabled sensors on machinery to monitor variables such as vibration, temperature, and pressure. Which of the following BEST demonstrates how this approach contributes to operational resilience?

A.

Scheduling repairs for critical equipment based on real-time condition monitoring

B.

Performing regular maintenance based on manufacturer recommendations

C.

Conducting monthly manual reviews of maintenance schedules

D.

Automating equipment repairs without any human intervention

Full Access
Question # 25

Which of the following approaches BEST helps to reduce model bias?

A.

Increasing the number of labels per instance

B.

Decreasing the frequency of model updates

C.

Utilizing a more complex model architecture

D.

Ensuring diversity in training data sources

Full Access
Question # 26

An organization is implementing an AI-based credit assessment engine using internal and third-party customer data. Which of the following BEST aligns with data management controls for the AI life cycle?

A.

Documented procedures for data sourcing, lineage tracking, and quality validation

B.

Use of hashed identifiers to anonymize datasets used for model validation and internal analytics

C.

Encrypted isolation and dynamic access controls on training data pipelines

D.

Limitation of model training to structured data from vetted sources to minimize ingestion risk

Full Access
Question # 27

Which of the following would MOST effectively ensure an organization developing AI systems has comprehensive data classification and inventory management?

A.

Creating a centralized team to oversee the classification of data used in AI projects

B.

Conducting quarterly audits of AI data sets for anomalies and missing metadata

C.

Establishing a manual process to categorize data based on business needs and regulatory compliance

D.

Implementing an automated data cataloging tool that integrates with all organizational data repositories

Full Access
Question # 28

Which of the following controls would BEST help to prevent data poisoning in AI models?

A.

Increasing the size of the training data set

B.

Implementing a strict data validation mechanism

C.

Establishing continuous monitoring

D.

Regularly updating the foundational model

Full Access
Question # 29

Personal data used to train AI systems can BEST be protected by:

A.

Erasing personal data after training

B.

Ensuring the quality of personal data

C.

Anonymizing personal data

D.

Hashing personal data

Full Access
Question # 30

A regulator warns of increased risk of AI re-identification attacks on anonymized datasets. What should the information security manager do FIRST?

A.

Assume anonymization is permanent and continue operations

B.

Immediately delete anonymized datasets and suspend AI services

C.

Implement a monitoring program including privacy audits and adversarial testing

D.

Establish strong access controls for services using anonymized data

Full Access
Question # 31

When deriving statistical information from AI systems, which source of risk is MOST important to address?

A.

Presence of hallucinations

B.

Incomplete outputs

C.

Lack of data normalization

D.

Systemic bias in data sets

Full Access
Question # 32

Which of the following mitigation control strategies would BEST reduce the risk of introducing hidden backdoors during model fine-tuning via third-party components?

A.

Leveraging open-source models and packages

B.

Performing threat modeling and integrity checks

C.

Disabling runtime logs during model training

D.

Implementing unsupervised learning methods

Full Access
Question # 33

When robust input controls cannot prevent prompt injections in an LLM, what is the BEST compensating control?

A.

Fine-tune the system to validate inputs

B.

Implement identity and access management (IAM)

C.

Conduct human reviews of AI system inputs

D.

Review and annotate the AI system's outputs

Full Access
Question # 34

An organization is evaluating a SaaS-based HR system that uses AI for resume vetting. Which control is MOST important?

A.

Inclusion of diverse and representative training data

B.

Availability of backups

C.

Vendor conformity assessments

D.

Encryption and isolation of customer data

Full Access
Question # 35

An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:

A.

synthetic intrusion data to train the tool’s components

B.

validation data sets to enable highly realistic AI decisions

C.

automated rule creation to increase model performance

D.

classified real intrusion data based on labeled data

Full Access
Question # 36

Which of the following approaches BEST helps reduce model bias?

A.

Ensuring diversity in training data sources

B.

Utilizing a more complex architecture

C.

Decreasing frequency of model updates

D.

Increasing the number of labels per instance

Full Access
Question # 37

Which of the following is MOST important for effective AI risk management?

A.

Utilization of best practice AI risk management frameworks

B.

Internal stakeholder participation in AI risk management processes

C.

Risk measurement during an early stage of the AI system life cycle

D.

Creation of separate risk management processes for AI-specific risk

Full Access
Question # 38

An organization decides to contract a vendor to implement a new set of AI libraries. Which of the following is MOST important to address in the master service agreement to protect data used during the AI training process?

A.

Data pseudonymization

B.

Continuous data monitoring

C.

Independent certification

D.

Right to audit

Full Access
Question # 39

Which area of intellectual property law presents the GREATEST challenge in determining copyright protection for AI-generated content?

A.

Enforcing trademark rights associated with AI systems

B.

Determining the rightful ownership of AI-generated creations

C.

Protecting trade secrets in AI technologies

D.

Establishing licensing frameworks for AI-generated works

Full Access
Question # 40

A financial services firm received a regulatory fine after a vendor switched its chatbot’s AI model without due diligence, resulting in unethical investment advice to the firm’s clients. Which of the following controls should be implemented by the firm to BEST prevent recurrence of this scenario?

A.

Master services agreement

B.

Shared responsibility model

C.

Data minimization

D.

Change management

Full Access
Question # 41

Which BEST describes the role of model cards in AI solutions?

A.

They visualize AI model performance

B.

They document training data and AI model use cases

C.

They help developers create synthetic data

D.

They automatically fine-tune AI models

Full Access
Question # 42

An organization is designing an AI-based credit risk assessment system that will integrate with sensitive financial datasets. Which of the following would BEST support the implementation of security-by-design principles in the AI system’s architecture?

A.

Segmenting AI services across containers to manage resource constraints

B.

Restricting access to AI models using IP allow lists to reduce public exposure

C.

Integrating differential privacy mechanisms into model training to limit data leakage

D.

Applying threat modeling specific to AI components before deployment

Full Access
Question # 43

Which of the following is the BEST reason to immediately disable an AI system?

A.

Excessive model drift

B.

Slow model performance

C.

Overly detailed model outputs

D.

Insufficient model training

Full Access
Question # 44

When evaluating a new AI tool for intrusion prevention, which is MOST important to ensure fit within the existing program architecture?

A.

Ensure automated response orchestration

B.

Prioritize real-time anomaly detection

C.

Confirm tool capabilities align with control objectives

D.

Select a tool that integrates with the SIEM

Full Access
Question # 45

Which BEST addresses hallucination risk in AI systems?

A.

Human oversight

B.

Recursive chunking

C.

Automated output validation

D.

Content enrichment

Full Access
Question # 46

A global organization has experienced multiple incidents of staff copying confidential data into public chatbots and acting on the model outputs. Which of the following is MOST important to reduce short-term risk when launching an AI security awareness initiative?

A.

Blocking access to public large language models (LLMs) at the network perimeter

B.

Requiring employees to complete an annual generic phishing and deepfake awareness module

C.

Delivering role-based and scenario-driven AI security training mapped to policy and job functions

D.

Publishing an AI acceptable use policy and collecting e-signatures of employees

Full Access
Question # 47

An organization has implemented a natural language processing model to respond to customer questions when personnel are not available. A pre-implementation security assessment revealed attackers could access sensitive company data through a chat interface injection attack. Which of the following is the BEST way to prevent this attack?

A.

Ensuring continuous monitoring and data tagging

B.

Manually reviewing AI model outputs

C.

Implementing input validation and templates

D.

Conducting regular information security audits

Full Access
Question # 48

When addressing privacy concerns related to AI, what is the GREATEST significance of user consent?

A.

It prevents unauthorized access to data

B.

It enables deletion/modification of personal data

C.

It allows the organization to process user data in the AI system

D.

It helps detect bias and ensure fairness

Full Access
Question # 49

Secure aggregation enhances the security of federated learning systems by:

A.

Processing client updates in isolation to reduce the risk of exposing sensitive information

B.

Applying differential privacy techniques to mask sensitive information in training data

C.

Encrypting individual model updates during transmission to ensure only the server can access the data

D.

Ensuring individual client contributions remain confidential even if the server is compromised

Full Access
Question # 50

When preparing for an AI incident, which of the following should be done FIRST?

A.

Implement a communication channel to report AI incidents

B.

Establish a cross-functional incident response team with AI knowledge

C.

Establish recovery processes for AI system models and data sets

D.

Create containment and eradication procedures for AI-related incidents

Full Access
Question # 51

Which of the following is the PRIMARY purpose of a dedicated AI system policy?

A.

Ensuring environmental impact is minimized

B.

Optimizing AI accuracy

C.

Providing a framework to set AI objectives

D.

Complying with external regulations

Full Access
Question # 52

Which AI data management technique involves creating validation and test data?

A.

Learning

B.

Splitting

C.

Training

D.

Annotating

Full Access
Question # 53

Which of the following is the MOST serious consequence of an AI system correctly guessing the personal information of individuals and drawing conclusions based on that information?

A.

The exposure of personal information may result in litigation

B.

The publicly available output of the model may include false or defamatory statements about individuals

C.

The output may reveal information about individuals or groups without their knowledge

D.

The exposure of personal information may lead to a decline in public trust

Full Access
Question # 54

Which of the following BEST describes the role of transparency in AI?

A.

Talking through a decision tree to better understand how the algorithm made each of its choices

B.

Publishing AI mechanisms, data sources, and decision-making processes while making them openly available

C.

Explaining the AI system in an understandable and logical way so reasons for decisions can be given

D.

Persuading someone that the AI tool in use is beneficial and operates as expected

Full Access
Question # 55

Which of the following is MOST important to ensure security throughout the AI data life cycle?

A.

Leveraging selected open-source models

B.

Conducting periodic data reviews

C.

Restricting use of data in third-party models

D.

Maintaining a complete inventory with data lineage records

Full Access
Question # 56

Which of the following BEST describes an adversarial attack on an AI model?

A.

Attacking underlying hardware

B.

Providing inputs that mislead the model into incorrect predictions

C.

Reverse-engineering the model using social engineering

D.

Conducting denial-of-service attacks on AI APIs

Full Access
Question # 57

Which of the following is the MOST important course of action prior to placing an in-house developed AI solution into production?

A.

Perform a privacy, security, and compliance gap analysis

B.

Deploy a prototype of the solution

C.

Obtain senior management sign-off

D.

Perform testing, evaluation, validation, and verification

Full Access
Question # 58

Which of the following BEST ensures the integrity of data sets used to train AI models?

A.

Collection and retention of only necessary data sets

B.

Tracking and verification of data sets via cryptographic controls

C.

Appropriate storage of data sets according to documented classification processes

D.

Clear documentation of data sources, types used, and processing steps

Full Access
Question # 59

Which of the following datasets is used to tune hyperparameters?

A.

Validation

B.

Test

C.

Configuration

D.

Training

Full Access
Question # 60

An organization develops and implements an AI-based plug-in for users that summarizes their individual emails. Which of the following is the GREATEST risk associated with this application?

A.

Lack of application vulnerability scanning

B.

Data format incompatibility

C.

Insufficient rate limiting for APIs

D.

Inadequate controls over parameters

Full Access
Question # 61

A CISO has been tasked with providing key performance indicators (KPIs) on the organization’s newly launched AI chatbot. Which of the following are the BEST metrics for the CISO to recommend?

A.

Explainability and F1 score

B.

Customer effort score and user retention rate

C.

Response time and throughput

D.

Error rate and bias detection

Full Access
Question # 62

An organization is deploying an automated AI cybersecurity system. Which of the following would be the MOST effective strategy to minimize human error and improve overall security?

A.

Conducting periodic penetration testing

B.

Using historical data to train AI detection software

C.

Utilizing machine learning (ML) algorithms to ensure responsible use

D.

Implementing manual monitoring of potential alerts

Full Access
Question # 63

An organization uses an AI tool to scan social media for product reviews. Fraudulent social media accounts begin posting negative reviews attacking the organization's product. Which type of AI attack is MOST likely to have occurred?

A.

Model inversion

B.

Deepfake

C.

Availability attack

D.

Data poisoning

Full Access
Question # 64

AI developers often find it difficult to explain the processes inside deep learning systems PRIMARILY because:

A.

Training data input for learning is spread throughout the public domain and continues to change

B.

Generated knowledge dynamically changes in memory without being tracked by change history logs

C.

Applied algorithms are based on probability theories to improve system performance

D.

Neural network architectures can include statistical methods that are not fully understood

Full Access
Question # 65

Which of the following BEST represents a combination of quantitative and qualitative metrics that can be used to comprehensively evaluate AI transparency?

A.

AI system availability and downtime metrics

B.

AI model complexity and accuracy metrics

C.

AI explainability reports and bias metrics

D.

AI ethical impact and user feedback metrics

Full Access
Question # 66

Which of the following involves documenting and monitoring the complete journey of data as it flows through an AI system?

A.

Lineage

B.

Transformation

C.

Origin

D.

Processing

Full Access
Question # 67

Which of the following would BEST help to prevent the compromise of a facial recognition AI system through the use of alterations in facial appearance?

A.

Enhancing training data to increase variance

B.

Monitoring the system for misuse cases

C.

Fine-tuning the AI model to decrease hallucinations

D.

Implementing a secondary AI system to confirm images

Full Access
Question # 68

When preparing for an AI incident, which of the following should be done FIRST?

A.

Establish recovery processes for AI system models and datasets

B.

Establish a cross-functional incident response team with AI knowledge

C.

Implement a clear communication channel to report AI incidents

D.

Create containment and eradication procedures for AI-related incidents

Full Access
Question # 69

Which strategy BEST ensures generative AI tools do not expose company data?

A.

Conducting an independent AI data audit

B.

Implementing a solution prohibiting input of sensitive data

C.

Testing AI tools before implementation

D.

Ensuring AI tools comply with local regulations

Full Access
Question # 70

An organization recently introduced a generative AI chatbot that can interact with users and answer their queries. Which of the following would BEST mitigate hallucination risk identified by the risk team?

A.

Performing model testing and validation

B.

Training the foundational model on large data sets

C.

Ensuring model developers have been trained in AI risk

D.

Fine-tuning the foundational model

Full Access
Question # 71

The PRIMARY goal of data poisoning attacks is to:

A.

compromise the confidentiality of output data from the model

B.

compromise the confidentiality of model input data

C.

manipulate the behavior of the model during development

D.

undermine the integrity of the AI system’s outputs

Full Access
Question # 72

Which of the following should be the MOST important consideration when conducting an AI impact assessment?

A.

Achieve business objectives

B.

Effect on employee retention

C.

Security awareness training

D.

Reputation of the organization

Full Access
Question # 73

Which of the following AI data life cycle phases presents the GREATEST inherent risk?

A.

Training

B.

Maintenance

C.

Monitoring

D.

Preparation

Full Access
Question # 74

An organization utilizes AI-enabled mapping software to plan routes for delivery drivers. A driver following the AI route drives the wrong way down a one-way street, despite numerous signs. Which of the following biases does this scenario demonstrate?

A.

Selection

B.

Reporting

C.

Confirmation

D.

Automation

Full Access
Question # 75

Which of the following BEST ensures AI components are validated as part of disaster recovery testing?

A.

Disconnecting primary model training clusters to test retraining workflow during extended outages

B.

Simulating denial of service (DoS) attacks against AI APIs to evaluate detection capabilities

C.

Running simulated data loss scenarios by erasing test records from the AI system’s feature store

D.

Monitoring model performance metrics during failover and recovery to assess system stability

Full Access
Question # 76

From a risk perspective, which of the following is the MOST important step when implementing an adoption strategy for AI systems?

A.

Benchmarking against peer organizations’ AI risk strategies

B.

Implementing a robust risk analysis methodology tailored to AI-specific tasks

C.

Conducting an AI risk assessment and updating the enterprise risk register

D.

Establishing a comprehensive AI risk assessment framework

Full Access