AAISM ISACA Advanced in AI Security Management (AAISM) Exam Questions and Answers
An AI application development team has been given access to user information and now must format it to be readable by the AI model. During which phase of the data life cycle would this MOST likely occur?
An organization is updating its vendor arrangements to facilitate the safe adoption of AI technologies. Which of the following would be the PRIMARY challenge in delivering this initiative?
A post-incident investigation finds that an AI-powered anti-money laundering system inadvertently allowed suspicious transactions because certain risk signals were disabled to reduce false positives. Which of the following governance failures does this BEST demonstrate?
From a risk perspective, which of the following is the MOST important step when implementing an adoption strategy for AI systems?
A CISO has been tasked with providing key performance indicators (KPIs) on the organization’s newly launched AI chatbot. Which of the following are the BEST metrics for the CISO to recommend?
When robust input controls are not practical on a large language model (LLM) to prevent prompt injection attacks from external threats, which of the following would be the BEST compensating control to address the risk?
Which of the following BEST ensures the integrity of data sets used to train AI models?
An organization decides to contract a vendor to implement a new set of AI libraries. Which of the following is MOST important to address in the master service agreement to protect data used during the AI training process?
Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?
Which AI model is BEST suited to ensure explainability in an HR department’s pre-screening tool for candidate resumes?
Which of the following is the MOST effective defense against cyberattacks that alter input data to avoid detection by the model?
Which of the following controls would BEST help to prevent data poisoning in AI models?
Which of the following BEST addresses risk associated with hallucinations in AI systems?
Implementing which of the following would MOST effectively address bias in generative AI models?
When evaluating a new AI tool for intrusion prevention, which of the following is the MOST important consideration to ensure the tool fits within the existing program architecture?
Which of the following is the MOST important consideration when deciding how to compose an AI red team?
An organization is commissioning a third-party AI system using sensitive data. Which metric is MOST important to consider?
Which testing technique is BEST for determining how an AI model makes decisions?
Within an incident handling process, which of the following would BEST help restore end user trust with an AI system?
An organization is evaluating a SaaS-based HR system that uses AI for resume vetting. Which control is MOST important?
Employees are regularly using open-source generative AI without guidance. What should be the CISO’s GREATEST concern?
An organization plans to use AI to analyze the shopping patterns of its customers to predict interests and send targeted, customized marketing emails. Which of the following should be done FIRST?
During red-team testing of an AI system used to make lending decisions, which of the following techniques BEST simulates a data poisoning attack?
Which of the following is the BEST way to reduce the risk of misuse of an AI agent that has access to critical data and systems?
Which of the following should be the PRIMARY objective of implementing differential privacy techniques in AI models leveraging fraud detection systems?
Which of the following is the MAIN objective of the operational phase of AI life cycle management?
A global organization experienced multiple incidents of staff pasting confidential data into public chatbots. Which action is MOST important to reduce short-term risk?
A health services organization is developing a proprietary generative AI chatbot to assist patients with medical devices. Which of the following should be the organization’s HIGHEST priority?
In the context of generative AI, which of the following would be the MOST likely goal of penetration testing during a red-teaming exercise?
A global organization has experienced multiple incidents of staff copying confidential data into public chatbots and acting on the model outputs. Which of the following is MOST important to reduce short-term risk when launching an AI security awareness initiative?
Which of the following BEST strengthens information security controls around the use of generative AI applications?
Which of the following is the MOST critical success factor for an AI implementation project?
Which of the following is MOST important to consider when validating a third-party AI tool?
When robust input controls cannot prevent prompt injections in an LLM, what is the BEST compensating control?
Which of the following is the MOST important consideration when an organization is adopting generative AI for personalized advertising?
When integrating AI for innovation, which of the following can BEST help an organization manage security risk?
Which of the following AI data management techniques involves creating validation and test data?
An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:
When evaluating a new AI tool for intrusion prevention, which is MOST important to ensure fit within the existing program architecture?
Which of the following reviews MUST be conducted as part of an AI impact assessment?
A large financial services organization is integrating a third-party AI solution into its critical fraud detection system. Which of the following is the BEST way for the organization to reduce risk associated with AI vendor and supply chain dependencies?
Which of the following MOST effectively secures ongoing stakeholder support for AI initiatives?
Which of the following is the MOST critical key risk indicator (KRI) for an AI system?
When preparing for an AI incident, which of the following should be done FIRST?
An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?
An organization is planning to commission a third-party AI system to make decisions using sensitive data. Which of the following metrics is MOST important for the organization to consider?
When evaluating a third-party AI service provider, which master services agreement (MSA) provision is MOST critical for managing security risk?
Which of the following will BEST reduce data bias in machine learning (ML) algorithms?
A financial institution plans to deploy an AI system to provide credit risk assessments for loan applications. Which of the following should be given the HIGHEST priority in the system’s design to ensure ethical decision-making and prevent bias?
Within an incident handling process, which of the following would BEST help restore end-user trust in an AI system?
An AI system that supports critical processes has deviated from expected performance and is producing biased outcomes. Which of the following is the BEST course of action?
A data scientist creating categories and training the algorithm on large data sets is an example of which type of AI model learning technique?
An organization develops and implements an AI-based plug-in for users that summarizes their individual emails. Which of the following is the GREATEST risk associated with this application?
Which of the following is MOST important for an organization to consider when implementing a preventive security safeguard into a new AI product?
What is the GREATEST concern when a vendor enables generative AI features for an organization’s critical system?
A regulator warns of increased risk of AI re-identification attacks on anonymized datasets. What should the information security manager do FIRST?
An organization using an AI model for financial forecasting identifies inaccuracies caused by missing data. Which of the following is the MOST effective data cleaning technique to improve model performance?
Which of the following is the BEST way to ensure an organization remains compliant with industry regulations when decommissioning an AI system used to record patient data?
Which of the following is the BEST way to ensure role clarity and staff effectiveness when implementing AI-assisted security monitoring tools?
During the deployment of a generative AI platform, a risk assessment highlighted threats such as data leakage and prompt manipulation. Which of the following is the BEST way to ensure appropriate control selection?
An attack has occurred on an AI system that has been in use for two years. Which of the following would BEST mitigate the impact of the attack?
A financial services firm received a regulatory fine after a vendor switched its chatbot’s AI model without due diligence, resulting in unethical investment advice to the firm’s clients. Which of the following controls should be implemented by the firm to BEST prevent recurrence of this scenario?
A financial organization relies on AI-based identity verification and fraud detection services. Which of the following BEST integrates AI security risk into the business continuity plan (BCP)?
An organization is implementing an AI-based credit assessment engine using internal and third-party customer data. Which of the following BEST aligns with data management controls for the AI life cycle?