Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca AI-Centric Security Management AAISM Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following is MOST important to monitor in order to ensure the effectiveness of an organization’s AI vendor management program?

Options:

A.

Vendor compliance with AI-related requirements


B.

Vendor reviews of external AI threat reports


C.

Vendor results in compliance training programs


D.

Vendor participation in industry AI research


Expert Solution
Questions # 32:

An organization is implementing AI agent development across engineering teams. What should AI-specific training focus on?

Options:

A.

Prompt injection, agent memory control, insecure tool execution


B.

Dataset bias, explainability, fairness


C.

Output moderation, hallucination handling, policy alignment


D.

API abuse, data leakage, third-party plug-in risk


Expert Solution
Questions # 33:

Which of the following BEST strengthens information security controls around the use of generative AI applications?

Options:

A.

Ensuring controls exceed industry benchmarks


B.

Monitoring AI outputs against policy


C.

Implementing a kill switch


D.

Validating AI model training data


Expert Solution
Questions # 34:

An organization implementing a large language model (LLM) application notices significant and unexpected cost increases due to excessive computational resource usage. Which vulnerability is MOST likely in need of mitigation?

Options:

A.

Excessive agency


B.

Sensitive information disclosure


C.

System prompt leakage


D.

Unbounded consumption


Expert Solution
Questions # 35:

An organization is planning to commission a third-party AI system to make decisions using sensitive data. Which of the following metrics is MOST important for the organization to consider?

Options:

A.

Model response time


B.

Service availability


C.

Accessibility rating


D.

Accuracy thresholds


Expert Solution
Questions # 36:

Which of the following is the BEST way to ensure role clarity and staff effectiveness when implementing AI-assisted security monitoring tools?

Options:

A.

Defer implementation until the security team can be expanded with data scientists.


B.

Update the security program to include cross-functional AI-specific responsibilities.


C.

Transition responsibilities for AI tools to external consultants for improved scalability.


D.

Increase training budgets for business staff to obtain vendor-neutral AI certifications.


Expert Solution
Questions # 37:

Which of the following BEST describes the role of model cards in AI solutions?

Options:

A.

They are primarily used to visualize the performance of AI models


B.

They are used to automatically fine-tune AI models by adjusting hyperparameters based on user feedback


C.

They provide a standardized way to document the training data and AI model use cases


D.

They help developers create synthetic data and train AI models


Expert Solution
Questions # 38:

Which of the following AI data management techniques involves creating validation and test data?

Options:

A.

Training


B.

Annotating


C.

Splitting


D.

Learning


Expert Solution
Questions # 39:

An organization implementing an LLM application sees unexpected cost increases due to excessive computational resource usage. Which vulnerability is MOST likely in need of mitigation?

Options:

A.

Excessive agency


B.

Sensitive information disclosure


C.

Unbounded consumption


D.

System prompt leakage


Expert Solution
Questions # 40:

A post-incident investigation finds that an AI-powered anti-money laundering system inadvertently allowed suspicious transactions because certain risk signals were disabled to reduce false positives. Which of the following governance failures does this BEST demonstrate?

Options:

A.

Lack of sufficient computing resources for the AI system


B.

Insufficient model validation and change control processes


C.

Excessive reliance on external consultants for model design


D.

Absence of metrics and dashboard for analysts


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions