During red-team testing of an AI system used for lending decisions, which technique BEST simulates a data poisoning attack?
A. Adding noise to output predictions
B. Stealing model weights
C. Inputting encrypted data
D. Corrupting training datasets to manipulate outcomes
When documenting information about machine learning (ML) models, which of the following artifacts BEST helps enhance stakeholder trust?
A. Hyperparameters
B. Data quality controls
C. Model card
D. Model prototyping
Which of the following is the BEST way to reduce the risk of misuse of an AI agent that has access to critical data and systems?
A. Validate agent compliance with output restrictions
B. Allow users to configure the agent for productivity
C. Prohibit users from manipulating agent behavior
D. Limit human review of AI decisions
When deriving statistical information generated by AI systems, which of the following types of risk is MOST important to address?
A. Systemic bias in data
B. Incomplete outputs
C. Lack of data normalization
D. Presence of hallucinations
When integrating AI for innovation, which of the following can BEST help an organization manage security risk?
A. Re-evaluating the risk appetite
B. Seeking third-party advice
C. Evaluating compliance requirements
D. Adopting a phased approach
Which of the following BEST reduces the risk of exposing sensitive data through the output of large language models (LLMs) in applications?
A. Encrypting data in transit and at rest
B. Conducting adversarial testing
C. Implementing data sanitization techniques
D. Enforcing least privilege access
What BEST ensures a proper business continuity plan (BCP) for an AI solution?
A. Enhancing monitoring for model failure
B. Testing AI infrastructure failover mechanisms
C. Implementing access controls
D. Increasing backup restoration detail
Which BEST describes the role of model cards in AI solutions?
A. They visualize AI model performance
B. They document training data and AI model use cases
C. They help developers create synthetic data
D. They automatically fine-tune AI models
An organization plans to use an open-source foundational AI model. Which of the following is MOST important for the AI governance committee to consider when approving its use?
A. Confidential data leakage
B. AI model accuracy
C. AI model support
D. Employee privacy rights
An organization needs large data sets to perform application testing. Which of the following would BEST fulfill this need?
A. Reviewing AI model cards
B. Incorporating data from search content
C. Using open-source data repositories
D. Performing AI data augmentation
Which of the following is the BEST way to ensure role clarity and staff effectiveness when implementing AI-assisted security monitoring tools?
A. Delay implementation until more data scientists are hired
B. Increase budgets for AI certifications
C. Update the security program to include cross-functional AI-specific responsibilities
D. Transition responsibilities to external consultants
AI developers often find deep learning systems difficult to explain PRIMARILY because:
A. Knowledge dynamically changes without logs
B. Neural network architectures include statistical methods not fully understood
C. Algorithms rely on probability theories
D. Training data is spread across public domains
| Page 6 out of 21 Pages |
| 3456789 |
| AAISM Practice Test Home |
Real-World Scenario Mastery: Our AAISM practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before ISACA Advanced in AI Security Management (AAISM) Exam exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive AAISM practice exam questions pool covering all topics, the real exam feels like just another practice session.