Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca AI-Centric Security Management AAISM Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

During red-team testing of an AI system used to make lending decisions, which of the following techniques BEST simulates a data poisoning attack?

Options:

A.

Inputting encrypted data into the model


B.

Adding noise to output predictions


C.

Stealing model weights from a deployed API


D.

Corrupting training data sets to manipulate outcomes


Expert Solution
Questions # 52:

An organization is planning to commission a third-party AI system to make decisions using sensitive data. Which of the following metrics is MOST important for the organization to consider?

Options:

A.

Model response time


B.

Service availability


C.

Accessibility rating


D.

Accuracy thresholds


Expert Solution
Questions # 53:

Which of the following controls BEST mitigates the risk of bias in AI models?

Options:

A.

Robust access control techniques


B.

Regular data reconciliation


C.

Cryptographic hash functions


D.

Diverse data sourcing strategies


Expert Solution
Questions # 54:

Which of the following reviews MUST be conducted as part of an AI impact assessment?

Options:

A.

Evaluation of model reproducibility


B.

Testing, evaluation, validation, and verification


C.

Security control self-assessment (CSA)


D.

Identification of environmental and societal consequences


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions