Which of the following BEST ensures AI components are validated during disaster recovery testing?
An AI system that supports critical processes has deviated from expected performance and is producing biased outcomes. Which of the following is the BEST course of action?
The PRIMARY purpose of adopting and implementing AI architecture within an organizational AI program is to:
Which of the following controls BEST mitigates the inherent limitations of generative AI models?
How can an organization BEST protect itself from payment diversions caused by deepfake attacks impersonating management?
During red-team testing of an AI system used for lending decisions, which technique BEST simulates a data poisoning attack?
Which of the following is the BEST way to ensure an organization remains compliant with industry regulations when decommissioning an AI system used to record patient data?
When using AI as part of incident response, which of the following BEST ensures the automation aligns with regulatory and governance obligations?
When implementing a generative AI system, which of the following approaches will BEST prevent misalignment between the corporate risk appetite and tolerance?
Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?
Which of the following BEST enables an organization to strengthen information security controls around the use of generative AI applications?
Which strategy is MOST effective for penetration testers assessing an AI model against membership inference attacks?
A financial organization relies on AI-based identity verification and fraud detection services. Which of the following BEST integrates AI security risk into the business continuity plan (BCP)?
Within an incident handling process, which of the following would BEST help restore end user trust with an AI system?
An AI research team is developing a natural language processing model that relies on several open-source libraries. Which of the following is the team’s BEST course of action to ensure the integrity of the software packages used?
An organization is deploying a large language model (LLM) and is concerned that input manipulations may compromise its integrity. Which of the following is the MOST effective way to determine an acceptable risk threshold?
Which of the following is MOST important to monitor in order to ensure the effectiveness of an organization’s AI vendor management program?
When evaluating a third-party AI service provider, which master services agreement (MSA) provision is MOST critical for managing security risk?
A CISO must provide KPIs for the organization’s newly deployed AI chatbot. Which metrics are BEST?
A security assessment revealed that attackers could access sensitive company data through chat interface injection. What is the BEST mitigation?
An automotive manufacturer uses AI-enabled sensors on machinery to monitor variables such as vibration, temperature, and pressure. Which of the following BEST demonstrates how this approach contributes to operational resilience?
An organization is implementing an AI-based credit assessment engine using internal and third-party customer data. Which of the following BEST aligns with data management controls for the AI life cycle?
Which of the following would MOST effectively ensure an organization developing AI systems has comprehensive data classification and inventory management?
Which of the following controls would BEST help to prevent data poisoning in AI models?
A regulator warns of increased risk of AI re-identification attacks on anonymized datasets. What should the information security manager do FIRST?
When deriving statistical information from AI systems, which source of risk is MOST important to address?
Which of the following mitigation control strategies would BEST reduce the risk of introducing hidden backdoors during model fine-tuning via third-party components?
When robust input controls cannot prevent prompt injections in an LLM, what is the BEST compensating control?
An organization is evaluating a SaaS-based HR system that uses AI for resume vetting. Which control is MOST important?
An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:
Which of the following is MOST important for effective AI risk management?
An organization decides to contract a vendor to implement a new set of AI libraries. Which of the following is MOST important to address in the master service agreement to protect data used during the AI training process?
Which area of intellectual property law presents the GREATEST challenge in determining copyright protection for AI-generated content?
A financial services firm received a regulatory fine after a vendor switched its chatbot’s AI model without due diligence, resulting in unethical investment advice to the firm’s clients. Which of the following controls should be implemented by the firm to BEST prevent recurrence of this scenario?
An organization is designing an AI-based credit risk assessment system that will integrate with sensitive financial datasets. Which of the following would BEST support the implementation of security-by-design principles in the AI system’s architecture?
Which of the following is the BEST reason to immediately disable an AI system?
When evaluating a new AI tool for intrusion prevention, which is MOST important to ensure fit within the existing program architecture?
A global organization has experienced multiple incidents of staff copying confidential data into public chatbots and acting on the model outputs. Which of the following is MOST important to reduce short-term risk when launching an AI security awareness initiative?
An organization has implemented a natural language processing model to respond to customer questions when personnel are not available. A pre-implementation security assessment revealed attackers could access sensitive company data through a chat interface injection attack. Which of the following is the BEST way to prevent this attack?
When addressing privacy concerns related to AI, what is the GREATEST significance of user consent?
Secure aggregation enhances the security of federated learning systems by:
When preparing for an AI incident, which of the following should be done FIRST?
Which of the following is the PRIMARY purpose of a dedicated AI system policy?
Which AI data management technique involves creating validation and test data?
Which of the following is the MOST serious consequence of an AI system correctly guessing the personal information of individuals and drawing conclusions based on that information?
Which of the following is MOST important to ensure security throughout the AI data life cycle?
Which of the following BEST describes an adversarial attack on an AI model?
Which of the following is the MOST important course of action prior to placing an in-house developed AI solution into production?
Which of the following BEST ensures the integrity of data sets used to train AI models?
An organization develops and implements an AI-based plug-in for users that summarizes their individual emails. Which of the following is the GREATEST risk associated with this application?
A CISO has been tasked with providing key performance indicators (KPIs) on the organization’s newly launched AI chatbot. Which of the following are the BEST metrics for the CISO to recommend?
An organization is deploying an automated AI cybersecurity system. Which of the following would be the MOST effective strategy to minimize human error and improve overall security?
An organization uses an AI tool to scan social media for product reviews. Fraudulent social media accounts begin posting negative reviews attacking the organization's product. Which type of AI attack is MOST likely to have occurred?
AI developers often find it difficult to explain the processes inside deep learning systems PRIMARILY because:
Which of the following BEST represents a combination of quantitative and qualitative metrics that can be used to comprehensively evaluate AI transparency?
Which of the following involves documenting and monitoring the complete journey of data as it flows through an AI system?
Which of the following would BEST help to prevent the compromise of a facial recognition AI system through the use of alterations in facial appearance?
When preparing for an AI incident, which of the following should be done FIRST?
Which strategy BEST ensures generative AI tools do not expose company data?
An organization recently introduced a generative AI chatbot that can interact with users and answer their queries. Which of the following would BEST mitigate hallucination risk identified by the risk team?
Which of the following should be the MOST important consideration when conducting an AI impact assessment?
Which of the following AI data life cycle phases presents the GREATEST inherent risk?
An organization utilizes AI-enabled mapping software to plan routes for delivery drivers. A driver following the AI route drives the wrong way down a one-way street, despite numerous signs. Which of the following biases does this scenario demonstrate?
Which of the following BEST ensures AI components are validated as part of disaster recovery testing?
From a risk perspective, which of the following is the MOST important step when implementing an adoption strategy for AI systems?