Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca AI-Centric Security Management AAISM Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following should be a PRIMARY consideration when defining recovery point objectives (RPOs) and recovery time objectives (RTOs) for generative AI solutions?

Options:

A.

Preserving the most recent versions of data models to avoid inaccuracies in functionality


B.

Prioritizing computational efficiency over data integrity to minimize downtime


C.

Ensuring the backup system can restore training data sets within the defined RTO window


D.

Maintaining consistent hardware configurations to prevent discrepancies during model restoration


Expert Solution
Questions # 62:

When creating a use case for an AI model that provides sensitive decisions affecting end users, which of the following is the GREATEST benefit of using model cards?

Options:

A.

Ethical considerations of the model are documented


B.

Technical instructions for model deployment are created


C.

Data collection requirements are reduced


D.

Model type selection is documented


Expert Solution
Questions # 63:

Implementing which of the following would MOST effectively address bias in generative AI models?

Options:

A.

Data augmentation


B.

Data minimization


C.

Adversarial training


D.

Fairness constraints


Expert Solution
Questions # 64:

Which of the following technologies can be used to manage deepfake risk?

Options:

A.

Systematic data tagging


B.

Multi-factor authentication (MFA)


C.

Blockchain


D.

Adaptive authentication


Expert Solution
Questions # 65:

A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?

Options:

A.

Privilege escalation


B.

Data poisoning


C.

Model inversion


D.

Evasion attack


Expert Solution
Questions # 66:

How can an organization best remain compliant when decommissioning an AI system that recorded patient data?

Options:

A.

Perform a post-destruction risk assessment


B.

Ensure backups are tested and access controls are audited


C.

Update governance policies based on lessons learned


D.

Ensure a certificate of destruction is received and archived


Expert Solution
Questions # 67:

An organization plans to use an open-source foundational AI model. Which of the following is MOST important for the AI governance committee to consider when approving its use?

Options:

A.

Confidential data leakage


B.

AI model accuracy


C.

AI model support


D.

Employee privacy rights


Expert Solution
Questions # 68:

An organization is deploying a large language model (LLM) and is concerned that input manipulations may compromise its integrity. Which of the following is the MOST effective way to determine an acceptable risk threshold?

Options:

A.

Restrict all user inputs containing special characters


B.

Deploy a real-time logging and monitoring system


C.

Implement a static risk threshold by limiting LLM outputs


D.

Assess the business impact of known threats


Expert Solution
Questions # 69:

An organization is adopting an agentic AI solution from an external vendor to support internal IT operations. Which of the following provides the MOST reliable and independently verifiable evidence of implemented security controls?

Options:

A.

Industry benchmarking peer review


B.

Third-party audit reports


C.

Internal red-team testing reports


D.

General AI security whitepapers


Expert Solution
Questions # 70:

A financial organization uses AI to detect potential fraudulent activities but is concerned about the impact of potential data poisoning. Which of the following controls would BEST mitigate this risk?

Options:

A.

Being transparent with customers about the data sources


B.

Implementing an updated and tested break-glass policy


C.

Delivering AI-specific security awareness training


D.

Using training data from multiple sources


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions