A regulator warns of increased risk of AI re-identification attacks on anonymized datasets. What should the information security manager do FIRST?
A. Assume anonymization is permanent and continue operations
B. Immediately delete anonymized datasets and suspend AI services
C. Implement a monitoring program including privacy audits and adversarial testing
D. Establish strong access controls for services using anonymized data
An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network (GAN)–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:
A. Validation data sets to enable highly realistic AI decisions
B. Classified real intrusion data based on labeled data
C. Automated rule creation to increase model performance
D. Synthetic intrusion data to train the tool’s components
An organization is planning to commission a third-party AI system to make decisions using sensitive data. Which of the following metrics is MOST important for the organization to consider?
A. Model response time
B. Service availability
C. Accessibility rating
D. Accuracy thresholds
Within an incident handling process, which of the following would BEST help restore end user trust with an AI system?
A. The AI model prioritizes incidents based on business impact
B. AI is being used to monitor incident detection and alerts
C. The AI model’s outputs are validated by team members
D. Remediation of the AI system based on lessons learned
Which of the following is MOST important to consider when validating a third-party AI tool?
A. Terms and conditions
B. Right to audit
C. Industry analysis and certifications
D. Roundtable testing
Which of the following BEST describes an adversarial attack on an AI model?
A. Attacking the underlying hardware of the AI system
B. Providing inputs that mislead the AI model into incorrect predictions
C. Reverse engineering the AI model using social engineering techniques
D. Conducting denial-of-service (DoS) attacks against AI APIs
An organization is looking to purchase an AI application from a vendor but is concerned about the security of its data. Which of the following is the MOST effective way to address this concern?
A. Mandate an AI security audit by an external auditor before procurement
B. Initiate discussions between the organization’s and the vendor’s legal teams
C. Ensure vendors disclose how the application uses the organization’s data
D. Assess the vendor’s publicly available AI usage policy
Which of the following AI data life cycle phases presents the GREATEST inherent risk?
A. Training
B. Maintenance
C. Monitoring
D. Preparation
Which of the following is a key risk indicator (KRI) for an AI system used for threat detection?
A. Number of training epochs
B. Training time of the model
C. Number of layers in the neural network
D. Number of system overrides by cyber analysts
An organization utilizes AI-enabled mapping software to plan routes for delivery drivers. A driver following the AI route drives the wrong way down a one-way street, despite numerous signs. Which of the following biases does this scenario demonstrate?
A. Selection
B. Reporting
C. Confirmation
D. Automation
A financial institution plans to deploy an AI system to provide credit risk assessments for loan applications. Which of the following should be given the HIGHEST priority in the system’s design to ensure ethical decision-making and prevent bias?
A. Regularly update the model with new customer data to improve prediction accuracy.
B. Integrate a mechanism for customers to appeal decisions directly within the system.
C. Train the system to provide advisory outputs with final decisions made by human experts.
D. Restrict the model’s decision-making criteria to objective financial metrics only.
A financial organization is concerned about AI data poisoning. Which control BEST mitigates this risk?
A. Implementing a break-glass policy
B. Transparency with customers about data sources
C. Using training data from multiple sources
D. Delivering AI-specific security awareness training
| Page 8 out of 21 Pages |
| 567891011 |
| AAISM Practice Test Home |
Real-World Scenario Mastery: Our AAISM practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before ISACA Advanced in AI Security Management (AAISM) Exam exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive AAISM practice exam questions pool covering all topics, the real exam feels like just another practice session.