Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca AI-Centric Security Management AAISM Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

An organization decides to contract a vendor to implement a new set of AI libraries. Which of the following is MOST important to address in the master service agreement to protect data used during the AI training process?

Options:

A.

Data pseudonymization


B.

Continuous data monitoring


C.

Independent certification


D.

Right to audit


Expert Solution
Questions # 12:

A PRIMARY objective of responsibly providing AI services is to:

Options:

A.

Enable AI models to operate autonomously


B.

Ensure the confidentiality and integrity of data processed by AI models


C.

Build trust for decisions and predictions made by AI models


D.

Improve the ability of AI models to learn from new data


Expert Solution
Questions # 13:

Which of the following would BEST help mitigate vulnerabilities associated with hidden triggers in generative AI models?

Options:

A.

Regularly retraining the model using a diverse data set


B.

Applying differential privacy and masking sensitive patterns in the training data


C.

Incorporating adversarial training to expose and neutralize potential triggers


D.

Monitoring model outputs and suspicious patterns to detect trigger activations


Expert Solution
Questions # 14:

An AI system that supports critical processes has deviated from expected performance and is producing biased outcomes. Which of the following is the BEST course of action?

Options:

A.

Retrain the model with a new and expanded dataset


B.

Perform a root cause analysis to identify mitigation steps


C.

Conduct audits of the data and the model


D.

Activate the model kill switch


Expert Solution
Questions # 15:

A military contractor discovered that its large language model (LLM) is at high risk of being targeted by advanced persistent threat (APT) actors seeking to exploit the model to access confidential information. Which of the following attacks is the HIGHEST priority to protect against?

Options:

A.

Model inversion


B.

Data poisoning


C.

Unauthorized tuning


D.

Model distillation


Expert Solution
Questions # 16:

An organization plans to implement a new AI system. Which of the following is the MOST important factor in determining the level of risk monitoring activities required?

Options:

A.

The organization’s risk appetite


B.

The organization’s number of AI system users


C.

The organization’s risk tolerance


D.

The organization’s compensating controls


Expert Solution
Questions # 17:

Which of the following AI data management techniques involves creating validation and test data?

Options:

A.

Training


B.

Annotating


C.

Splitting


D.

Learning


Expert Solution
Questions # 18:

When documenting information about machine learning (ML) models, which of the following artifacts BEST helps enhance stakeholder trust?

Options:

A.

Hyperparameters


B.

Data quality controls


C.

Model card


D.

Model prototyping


Expert Solution
Questions # 19:

When implementing a generative AI system, which of the following approaches will BEST prevent misalignment between the corporate risk appetite and tolerance?

Options:

A.

Ensuring effective AI key performance indicators (KPIs)


B.

Performing an AI impact assessment


C.

Creating and maintaining an AI risk register


D.

Establishing and monitoring acceptable levels of AI system risk


Expert Solution
Questions # 20:

An organization has discovered that employees have started regularly utilizing open-source generative AI without formal guidance. Which of the following should be the CISO’s GREATEST concern?

Options:

A.

Lack of monitoring


B.

Policy violations


C.

Data leakage


D.

Model hallucinations


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions