Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca AI-Centric Security Management AAISM Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

When an attacker uses synthetic data to reverse engineer an organization’s AI model, it is an example of which of the following types of attack?

Options:

A.

Distillation


B.

Inversion


C.

Prompt


D.

Poisoning


Expert Solution
Questions # 2:

Security and assurance requirements for AI systems should FIRST be embedded in the:

Options:

A.

Model design phase


B.

Model training phase


C.

Model testing phase


D.

Model deployment phase


Expert Solution
Questions # 3:

An organization implementing a large language model (LLM) application notices significant and unexpected cost increases due to excessive computational resource usage. Which vulnerability is MOST likely in need of mitigation?

Options:

A.

Excessive agency


B.

Sensitive information disclosure


C.

System prompt leakage


D.

Unbounded consumption


Expert Solution
Questions # 4:

Embedding unique identifiers into AI models would BEST help with:

Options:

A.

Preventing unauthorized access


B.

Tracking ownership


C.

Eliminating AI system biases


D.

Detecting adversarial attacks


Expert Solution
Questions # 5:

A data scientist creating categories and training the algorithm on large data sets is an example of which type of AI model learning technique?

Options:

A.

Reinforcement


B.

Unsupervised


C.

Machine learning (ML)


D.

Supervised


Expert Solution
Questions # 6:

Which of the following is the MOST important factor to consider when selecting industry frameworks to align organizational AI governance with business objectives?

Options:

A.

Risk tolerance


B.

Risk threshold


C.

Risk register


D.

Risk appetite


Expert Solution
Questions # 7:

Which of the following would BEST protect trade secrets related to AI technologies during their life cycle?

Options:

A.

Patenting AI algorithms along with data sets


B.

Enforcing trademark rights in AI systems


C.

Introducing watermarks when generating AI output


D.

Restricting access to sensitive data


Expert Solution
Questions # 8:

Which of the following information is MOST important to include in a centralized AI inventory?

Options:

A.

Ownership and accountability of AI systems


B.

AI model use cases


C.

Training data sets


D.

Foundation model and package registry


Expert Solution
Questions # 9:

After deployment, an AI model’s output begins to drift outside of the expected range. Which of the following is the development team’s BEST course of action?

Options:

A.

Take the AI model offline


B.

Adjust the hyperparameters of the AI model


C.

Create an emergency change request to correct the issue


D.

Return to an earlier phase in the AI life cycle


Expert Solution
Questions # 10:

Which of the following is the MOST effective defense against cyberattacks that alter input data to avoid detection by the model?

Options:

A.

Conducting periodic monitoring activities on the model’s decisions


B.

Enhancing model robustness through adversarial training


C.

Implementing restricted access to the model’s internal parameters


D.

Applying differential privacy controls on training datasets


Expert Solution
Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions