New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

AAISM Exam Dumps - ISACA Advanced in AI Security Management (AAISM) Exam

Searching for workable clues to ace the Isaca AAISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s AAISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 49

Which of the following is the MOST effective way to identify and address security risk in an AI model?

A.

Assign staff to review AI model outputs for accuracy

B.

Conduct threat modeling to identify vulnerabilities and possible attack methods

C.

Encrypt the training data and model parameters to prevent unauthorized access

D.

Add more data to the model to increase its accuracy and reduce errors

Full Access
Question # 50

Which of the following BEST ensures AI components are validated during disaster recovery testing?

A.

Running simulated data-loss scenarios by deleting test feature-store records

B.

Disconnecting model training clusters to test retraining workflows

C.

Simulating DoS attacks on AI APIs

D.

Monitoring model performance during failover and recovery

Full Access
Question # 51

Which of the following AI data management techniques involves creating validation and test data?

A.

Training

B.

Annotating

C.

Splitting

D.

Learning

Full Access
Question # 52

The PRIMARY benefit of implementing moderation controls in generative AI applications is that it can:

A.

Increase the model’s ability to generate diverse and creative content

B.

Optimize the model’s response time

C.

Ensure the generated content adheres to privacy regulations

D.

Filter out harmful or inappropriate content

Full Access
Question # 53

An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?

A.

Prompt injection

B.

Jailbreaking

C.

Remote code execution

D.

Evasion

Full Access
Question # 54

An organization is reviewing an AI application to determine whether it is still needed. Engineers have been asked to analyze the number of incorrect predictions against the total number of predictions made. Which of the following is this an example of?

A.

Control self-assessment (CSA)

B.

Model validation

C.

Key performance indicator (KPI)

D.

Explainable decision-making

Full Access
Question # 55

An organization develops and implements an AI-based plug-in for users that summarizes their individual emails. Which of the following is the GREATEST risk associated with this application?

A.

Lack of application vulnerability scanning

B.

Data format incompatibility

C.

Insufficient rate limiting for APIs

D.

Inadequate controls over parameters

Full Access
Question # 56

Which of the following strategies is the MOST effective way to protect against AI data poisoning?

A.

Ensuring the model is trained on diverse data sources

B.

Increasing model complexity

C.

Using robust data validation techniques and anomaly detection

D.

Incorporating more features and data into model training

Full Access
Go to page: