Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

AAISM Exam Dumps - ISACA Advanced in AI Security Management (AAISM) Exam

Go to page:
Question # 17

When an attacker uses synthetic data to reverse engineer an organization’s AI model, it is an example of which of the following types of attack?

A.

Distillation

B.

Inversion

C.

Prompt

D.

Poisoning

Full Access
Question # 18

Which of the following factors is MOST important for preserving user confidence and trust in generative AI systems?

A.

Bias minimization

B.

Access controls and secure storage solutions

C.

Transparent disclosure and informed consent

D.

Data anonymization

Full Access
Question # 19

Which of the following AI system vulnerabilities is MOST easily exploited by adversaries?

A.

Inaccurate generalizations from new data by the AI model

B.

Weak controls for access to the AI model

C.

Lack of protection against denial of service (DoS) attacks

D.

Inability to detect input modifications causing inappropriate AI outputs

Full Access
Question # 20

Which of the following is a key risk indicator (KRI) for an AI system used for threat detection?

A.

Number of training epochs

B.

Training time of the model

C.

Number of layers in the neural network

D.

Number of system overrides by cyber analysts

Full Access
Question # 21

Which of the following is the GREATEST risk inherent to implementing generative AI?

A.

Lack of employee training

B.

Unidentified asset vulnerabilities

C.

Inadequate return on investment (ROI)

D.

Potential intellectual property violations

Full Access
Question # 22

Which of the following is the MOST critical key risk indicator (KRI) for an AI system?

A.

The accuracy rate of the model

B.

The amount of data in the model

C.

The response time of the model

D.

The rate of drift in the model

Full Access
Question # 23

A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?

A.

Privilege escalation

B.

Data poisoning

C.

Model inversion

D.

Evasion attack

Full Access
Question # 24

Which of the following is the MOST important factor to consider when selecting industry frameworks to align organizational AI governance with business objectives?

A.

Risk tolerance

B.

Risk threshold

C.

Risk register

D.

Risk appetite

Full Access
Go to page: