Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca AI-Centric Security Management AAISM Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

From a risk perspective, which of the following is the MOST important step when implementing an adoption strategy for AI systems?

Options:

A.

Benchmarking against peer organizations’ AI risk strategies


B.

Implementing a robust risk analysis methodology tailored to AI-specific tasks


C.

Conducting an AI risk assessment and updating the enterprise risk register


D.

Establishing a comprehensive AI risk assessment framework


Expert Solution
Questions # 22:

Which of the following involves documenting and monitoring the complete journey of data as it flows through an AI system?

Options:

A.

Lineage


B.

Transformation


C.

Origin


D.

Processing


Expert Solution
Questions # 23:

Which of the following BEST ensures the integrity of data sets used to train AI models?

Options:

A.

Collection and retention of only necessary data sets


B.

Tracking and verification of data sets via cryptographic controls


C.

Appropriate storage of data sets according to documented classification processes


D.

Clear documentation of data sources, types used, and processing steps


Expert Solution
Questions # 24:

Implementing which of the following would MOST effectively address bias in generative AI models?

Options:

A.

Data augmentation


B.

Data minimization


C.

Adversarial training


D.

Fairness constraints


Expert Solution
Questions # 25:

Which of the following is the MOST effective use of AI-enabled tools in a security operations center (SOC)?

Options:

A.

Employing AI-enabled tools to reduce false negatives by detecting subtle attack patterns


B.

Using AI-enabled tools exclusively to classify all types of security incidents


C.

Replacing human analysis with automated AI decision-making processes


D.

Assigning AI-enabled tools to triage non-critical alerts to preserve SOC resources


Expert Solution
Questions # 26:

Which of the following is the BEST control for preventing deepfakes?

Options:

A.

Output provenance verification


B.

Regular AI risk assessment


C.

AI governance policies


D.

System input validation


Expert Solution
Questions # 27:

When preparing for an AI incident, which of the following should be done FIRST?

Options:

A.

Establish recovery processes for AI system models and datasets


B.

Establish a cross-functional incident response team with AI knowledge


C.

Implement a clear communication channel to report AI incidents


D.

Create containment and eradication procedures for AI-related incidents


Expert Solution
Questions # 28:

Which of the following key risk indicators (KRIs) is MOST relevant when evaluating the effectiveness of an organization’s AI risk management program?

Options:

A.

Number of AI models deployed into production


B.

Percentage of critical business systems with AI components


C.

Percentage of AI projects in compliance


D.

Number of AI-related training requests submitted


Expert Solution
Questions # 29:

Which of the following types of testing can MOST effectively mitigate prompt hacking?

Options:

A.

Load


B.

Input


C.

Regression


D.

Adversarial


Expert Solution
Questions # 30:

Personal data used to train AI systems can BEST be protected by:

Options:

A.

Erasing personal data after training


B.

Ensuring the quality of personal data


C.

Anonymizing personal data


D.

Hashing personal data


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions