New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

AAISM Exam Dumps - ISACA Advanced in AI Security Management (AAISM) Exam

Searching for workable clues to ace the Isaca AAISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s AAISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

When creating a use case for an AI model that provides sensitive decisions affecting end users, which of the following is the GREATEST benefit of using model cards?

A.

Ethical considerations of the model are documented

B.

Technical instructions for model deployment are created

C.

Data collection requirements are reduced

D.

Model type selection is documented

Full Access
Question # 34

During red-team testing of an AI system used to make lending decisions, which of the following techniques BEST simulates a data poisoning attack?

A.

Inputting encrypted data into the model

B.

Adding noise to output predictions

C.

Stealing model weights from a deployed API

D.

Corrupting training data sets to manipulate outcomes

Full Access
Question # 35

Which of the following is the MOST effective action an organization can take to address data security risk when using generative AI features in an application?

A.

Rely on the AI provider’s independent third-party audit reports for assurance

B.

Establish policies and awareness training for acceptable use of AI

C.

Require opt-out provisions for data usage in service agreements

D.

Establish guidelines and best practices with third parties for intellectual property ownership

Full Access
Question # 36

Which of the following is the MAIN objective of the operational phase of AI life cycle management?

A.

Optimize the model’s algorithms

B.

Align the model to business needs

C.

Monitor model performance

D.

Obtain end-user feedback

Full Access
Question # 37

Within an incident handling process, which of the following would BEST help restore end user trust with an AI system?

A.

The AI model prioritizes incidents based on business impact

B.

AI is being used to monitor incident detection and alerts

C.

The AI model’s outputs are validated by team members

D.

Remediation of the AI system based on lessons learned

Full Access
Question # 38

Which of the following MOST effectively secures ongoing stakeholder support for AI initiatives?

A.

Quantifying and communicating the value of AI solutions

B.

Conducting periodic staff training

C.

Addressing and optimizing AI-related risk

D.

Developing and monitoring an AI strategic roadmap

Full Access
Question # 39

A financial organization is concerned about AI data poisoning. Which control BEST mitigates this risk?

A.

Implementing a break-glass policy

B.

Transparency with customers about data sources

C.

Using training data from multiple sources

D.

Delivering AI-specific security awareness training

Full Access
Question # 40

Which of the following is MOST important to ensure security throughout the AI data life cycle?

A.

Leveraging selected open-source models

B.

Conducting periodic data reviews

C.

Restricting use of data in third-party models

D.

Maintaining a complete inventory with data lineage records

Full Access
Go to page: