New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

AAISM Exam Dumps - ISACA Advanced in AI Security Management (AAISM) Exam

Searching for workable clues to ace the Isaca AAISM Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s AAISM PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 65

When robust input controls cannot prevent prompt injections in an LLM, what is the BEST compensating control?

A.

Fine-tune the system to validate inputs

B.

Implement identity and access management (IAM)

C.

Conduct human reviews of AI system inputs

D.

Review and annotate the AI system's outputs

Full Access
Question # 66

As organizations increasingly rely on vendors to develop AI systems, which of the following is the MOST effective way to monitor vendors and ensure compliance with ethical and security standards?

A.

Conducting regular audits of vendor processes and adherence to AI development guidelines

B.

Requiring vendors to monitor their adherence to ethics and security standards

C.

Mandating that vendors share source code and AI documentation with the contracting party

D.

Allowing vendors to self-attest ethical AI compliance and implement benchmark monitoring

Full Access
Question # 67

Which of the following mitigation control strategies would BEST reduce the risk of introducing hidden backdoors during model fine-tuning via third-party components?

A.

Leveraging open-source models and packages

B.

Performing threat modeling and integrity checks

C.

Disabling runtime logs during model training

D.

Implementing unsupervised learning methods

Full Access
Question # 68

A school district contracts a third-party provider for AI-based curriculum recommendations. Which of the following is the BEST way to ensure the vendor uses AI responsibly?

A.

Confirming the AI solution supports single sign-on (SSO)

B.

Verifying the vendor has updated terms of service

C.

Requiring the vendor to provide the model card

D.

Ensuring the vendor offers 24/7 technical support

Full Access
Question # 69

The PRIMARY reason to conduct a privacy impact assessment (PIA) on an AI system is to:

A.

Identify applicable regulations

B.

Determine whether personal data is poisoned

C.

Build customer confidence

D.

Analyze how personal data is handled

Full Access
Question # 70

Which of the following BEST describes an adversarial attack on an AI model?

A.

Attacking underlying hardware

B.

Providing inputs that mislead the model into incorrect predictions

C.

Reverse-engineering the model using social engineering

D.

Conducting denial-of-service attacks on AI APIs

Full Access
Question # 71

Which of the following recommendations would BEST help a service provider mitigate the risk of lawsuits arising from generative AI’s access to and use of internet data?

A.

Activate filtering logic to exclude intellectual property flags

B.

Disclose service provider policies to declare compliance with regulations

C.

Appoint a data steward specialized in AI to strengthen security governance

D.

Review log information that records how data was collected

Full Access
Question # 72

When evaluating a third-party AI service provider, which of the following master services agreement provisions is MOST critical for managing security risk?

A.

Prohibiting the use of customer data for model training

B.

Restricting query volume thresholds

C.

Sharing real-time log information

D.

Guaranteeing unlimited model retraining requests

Full Access
Go to page: