Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca AI-Centric Security Management AAISM Questions and answers with CertsForce

Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following BEST describes the role of risk documentation in an AI governance program?

Options:

A.

Providing a record of past AI-related incidents for audits


B.

Outlining the acceptable levels of risk for AI-related initiatives


C.

Offering detailed analyses of technical risk and vulnerabilities


D.

Demonstrating governance, risk, and compliance (GRC) for external stakeholders


Expert Solution
Questions # 72:

Which of the following is the MOST critical success factor for an AI implementation project?

Options:

A.

Developing and using model cards


B.

Ensuring AI risk is captured in the risk register


C.

Mapping data throughout the life cycle


D.

Obtaining senior management buy-in


Expert Solution
Questions # 73:

Which of the following strategies BEST ensures generative AI tools do not expose company data?

Options:

A.

Conducting an independent AI data audit


B.

Testing AI tools before implementation


C.

Implementing a solution to prohibit the input of sensitive data


D.

Ensuring AI tools are compliant with local regulations


Expert Solution
Questions # 74:

Which of the following is the GREATEST benefit of implementing an AI tool to safeguard sensitive data and prevent unauthorized access?

Options:

A.

Timely analysis of endpoint activities


B.

Timely initiation of incident response


C.

Reduced number of false positives


D.

Reduced need for data classification


Expert Solution
Questions # 75:

An aerospace manufacturer prioritizing accuracy and security wants to use generative AI. Which LLM adoption plan BEST aligns with its risk appetite?

Options:

A.

Developing a private LLM to automate non-critical functions


B.

Contracting LLM access from a reputable third-party provider


C.

Developing a public LLM to automate critical functions


D.

Purchasing an LLM dataset on the open market


Expert Solution
Questions # 76:

A security assessment revealed that attackers could access sensitive company data through chat interface injection. What is the BEST mitigation?

Options:

A.

Conducting regular security audits


B.

Manually reviewing AI model outputs


C.

Implementing input validation and templates


D.

Ensuring continuous monitoring and tagging


Expert Solution
Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions