Which strategy is MOST effective for penetration testers assessing an AI model against membership inference attacks?
A. Generating synthetic training data
B. Analyzing AI model confidence scores
C. Disabling model logging
D. Measuring accuracy on the test set
A newly hired programmer suspects that the organization’s AI solution is inferring users’ sensitive information and using it to advise future decisions. Which of the following is the programmer’s BEST course of action?
A. Conduct a code review
B. Alert the CIO to the risk
C. Suggest fine-tuning the AI solution
D. Inform the governance panel
Which testing technique is BEST for determining how an AI model makes decisions?
A. Red team
B. Black box
C. White box
D. Blue team
Which of the following is the BEST mitigation control for membership inference attacks on AI systems?
A. Model ensemble techniques
B. AI threat modeling
C. Differential privacy
D. Cybersecurity-oriented red teaming
An organization implementing an LLM application sees unexpected cost increases due to excessive computational resource usage. Which vulnerability is MOST likely in need of mitigation?
A. Excessive agency
B. Sensitive information disclosure
C. Unbounded consumption
D. System prompt leakage
Which attack type is MOST likely to cause model drift?
A. Model stealing
B. Perfect knowledge
C. Data poisoning
D. Membership inference
In a new supply chain management system, AI models used by participating parties are interactively connected to generate advice in support of management decision making. Which of the following is the GREATEST challenge related to this architecture?
A. Establishing clear lines of responsibility for AI model outputs
B. Identifying hallucinations returned by AI models
C. Determining the aggregate risk of the system
D. Explaining the overall benefit of the system to stakeholders
Which of the following should be a PRIMARY consideration when defining recovery point objectives (RPOs) and recovery time objectives (RTOs) for generative AI solutions?
A. Preserving the most recent versions of data models to avoid inaccuracies in functionality
B. Prioritizing computational efficiency over data integrity to minimize downtime
C. Ensuring the backup system can restore training data sets within the defined RTO window
D. Maintaining consistent hardware configurations to prevent discrepancies during model restoration
When evaluating a new AI tool for intrusion prevention, which of the following is the MOST important consideration to ensure the tool fits within the existing program architecture?
A. Confirm tool capabilities align with the control objectives.
B. Select a tool that integrates with the existing SIEM.
C. Prioritize a tool that offers real-time anomaly detection.
D. Ensure automated response orchestration.
From a risk perspective, which of the following is the MOST important step when implementing an adoption strategy for AI systems?
A. Benchmarking against peer organizations’ AI risk strategies
B. Implementing a robust risk analysis methodology tailored to AI-specific tasks
C. Conducting an AI risk assessment and updating the enterprise risk register
D. Establishing a comprehensive AI risk assessment framework
An organization has requested a developer to apply AI algorithms to existing modules in order to improve customer service quality. At this stage, which of the following should be considered FIRST?
A. The developer may need to be held accountable for business inquiries raised by customers
B. IT management may need to revise the service agreement if AI behavior cannot be predefined
C. Project sponsors may need to agree on a phased approach in order to ensure safe release
D. The organization may need to explain the performance of the applied AI algorithm
A SaaS-based LLM system has risks including prompt injection, data poisoning, and model exfiltration. What is the BEST way to ensure consistent risk treatment?
A. Apply control baselines from a recognized industry standard
B. Implement an AI threat control matrix mapping threats to controls and assurance
C. Focus on post-deployment red teaming
D. Rely on vendor audit reports and SLAs
| Page 1 out of 21 Pages |
| 1234567 |
Real-World Scenario Mastery: Our AAISM practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before ISACA Advanced in AI Security Management (AAISM) Exam exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive AAISM practice exam questions pool covering all topics, the real exam feels like just another practice session.