Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

AAISM ISACA Advanced in AI Security Management (AAISM) Exam Questions and Answers

Questions 4

An organization plans to apply an AI system to its business, but developers find it difficult to predict system results due to lack of visibility to the inner workings of the AI model. Which of the following is the GREATEST challenge associated with this situation?

Options:

A.

Gaining the trust of end users through explainability and transparency

B.

Assigning a risk owner who is responsible for system uptime and performance

C.

Determining average turnaround time for AI transaction completion

D.

Continuing operations to meet expected AI security requirements

Buy Now
Questions 5

An organization develops and implements an AI-based plug-in for users that summarizes their individual emails. Which of the following is the GREATEST risk associated with this application?

Options:

A.

Lack of application vulnerability scanning

B.

Data format incompatibility

C.

Insufficient rate limiting for APIs

D.

Inadequate controls over parameters

Buy Now
Questions 6

How can an organization BEST protect itself from payment diversions caused by deepfake attacks impersonating management?

Options:

A.

Require mandatory deepfake detection training for all employees

B.

Mandate that payments be sent only once per week

C.

Issue a security policy on deepfakes

D.

Implement resilient payment approval processes

Buy Now
Questions 7

Which area of intellectual property law presents the GREATEST challenge in determining copyright protection for AI-generated content?

Options:

A.

Enforcing trademark rights associated with AI systems

B.

Determining the rightful ownership of AI-generated creations

C.

Protecting trade secrets in AI technologies

D.

Establishing licensing frameworks for AI-generated works

Buy Now
Questions 8

A large pharmaceutical company using a new AI solution to develop treatment regimens is concerned about potential hallucinations with the introduction of real-world data. Which of the following is MOST likely to reduce this risk?

Options:

A.

Penetration testing

B.

Human-in-the-loop

C.

AI impact analysis

D.

Data asset validation

Buy Now
Questions 9

When documenting information about machine learning (ML) models, which of the following artifacts BEST helps enhance stakeholder trust?

Options:

A.

Hyperparameters

B.

Data quality controls

C.

Model card

D.

Model prototyping

Buy Now
Questions 10

An organization concerned about the ethical and responsible use of a newly developed AI product should consider implementing:

Options:

A.

Model cards

B.

Vendor monitoring

C.

An accountability model

D.

Security by design

Buy Now
Questions 11

Which of the following controls BEST mitigates the risk of data poisoning?

Options:

A.

Data set restoration

B.

Data validation

C.

Digital watermarking

D.

Intrusion detection

Buy Now
Questions 12

Which of the following MOST effectively minimizes the attack surface when securing AI agent components during their development and deployment?

Options:

A.

Deploy pre-trained models directly into production.

B.

Consolidate event logs for correlation and centralized analysis.

C.

Schedule periodic manual code reviews.

D.

Implement compartmentalization with least privilege enforcement.

Buy Now
Questions 13

Which of the following BEST ensures the integrity of data sets used to train AI models?

Options:

A.

Collection and retention of only necessary data sets

B.

Tracking and verification of data sets via cryptographic controls

C.

Appropriate storage of data sets according to documented classification processes

D.

Clear documentation of data sources, types used, and processing steps

Buy Now
Questions 14

Which of the following should be done FIRST when developing an acceptable use policy for generative AI?

Options:

A.

Determine the scope and intended use of AI

B.

Review AI regulatory requirements

C.

Consult with risk management and legal

D.

Review existing company policies

Buy Now
Questions 15

Which of the following should be the PRIMARY consideration for an organization concerned about liabilities associated with unforeseen behavior from agentic AI systems?

Options:

A.

Model dependencies

B.

Approved base models

C.

Accountability model

D.

Acceptable risk level

Buy Now
Questions 16

An AI research team is developing a natural language processing model that relies on several open-source libraries. Which of the following is the team’s BEST course of action to ensure the integrity of the software packages used?

Options:

A.

Maintain a list of frequently used libraries to ensure consistent application in projects

B.

Scan the packages and libraries for malware prior to installation

C.

Use the latest version of all libraries from public repositories

D.

Retrain the model regularly to handle package and library updates

Buy Now
Questions 17

Which of the following BEST describes the role of risk documentation in an AI governance program?

Options:

A.

Providing a record of past AI-related incidents for audits

B.

Outlining the acceptable levels of risk for AI-related initiatives

C.

Offering detailed analyses of technical risk and vulnerabilities

D.

Demonstrating governance, risk, and compliance (GRC) for external stakeholders

Buy Now
Questions 18

An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?

Options:

A.

Prompt injection

B.

Jailbreaking

C.

Remote code execution

D.

Evasion

Buy Now
Questions 19

The PRIMARY ethical concern of generative AI is that it may:

Options:

A.

Produce unexpected data that could lead to bias

B.

Cause information integrity issues

C.

Cause information to become unavailable

D.

Breach the confidentiality of information

Buy Now
Questions 20

Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?

Options:

A.

F1 score

B.

Recall

C.

Precision

D.

Specificity

Buy Now
Questions 21

An organization is facing a deepfake attack intended to manipulate stock prices. The organization’s crisis communication plan has been activated. Which of the following is MOST important to include in the initial response?

Options:

A.

Conduct employee awareness training on recognizing deepfake videos and audio

B.

Provide clarifying information in a pre-approved public statement

C.

Conduct a detailed forensic analysis to identify the source of the deepfake

D.

Engage with brand monitoring services to track social media activity

Buy Now
Questions 22

In a new supply chain management system, AI models used by participating parties are interactively connected to generate advice in support of management decision making. Which of the following is the GREATEST challenge related to this architecture?

Options:

A.

Establishing clear lines of responsibility for AI model outputs

B.

Identifying hallucinations returned by AI models

C.

Determining the aggregate risk of the system

D.

Explaining the overall benefit of the system to stakeholders

Buy Now
Questions 23

An organization needs large data sets to perform application testing. Which of the following would BEST fulfill this need?

Options:

A.

Reviewing AI model cards

B.

Incorporating data from search content

C.

Using open-source data repositories

D.

Performing AI data augmentation

Buy Now
Questions 24

The PRIMARY reason to conduct a privacy impact assessment (PIA) on an AI system is to:

Options:

A.

Identify applicable regulations

B.

Determine whether personal data is poisoned

C.

Build customer confidence

D.

Analyze how personal data is handled

Buy Now
Questions 25

Which of the following is the MOST effective use of AI in incident response?

Options:

A.

Streamlining incident response testing

B.

Automating incident response triage

C.

Improving incident response playbook

D.

Ensuring chain of custody

Buy Now
Questions 26

Which of the following is MOST important to monitor in order to ensure the effectiveness of an organization’s AI vendor management program?

Options:

A.

Vendor compliance with AI-related requirements

B.

Vendor reviews of external AI threat reports

C.

Vendor results in compliance training programs

D.

Vendor participation in industry AI research

Buy Now
Questions 27

An organization's CIO provided the AI steering committee with a list of AI technologies in use and tasked them with categorizing the technologies by risk. Which of the following should the committee do FIRST?

Options:

A.

Begin grouping similar AI products and solutions together

B.

Identify vulnerabilities related to the technologies in use

C.

Ensure the AI technologies are included in the asset inventory

D.

Assess risk levels based on risk appetite and regulatory requirements

Buy Now
Exam Code: AAISM
Exam Name: ISACA Advanced in AI Security Management (AAISM) Exam
Last Update: Sep 8, 2025
Questions: 90

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now AAISM testing engine

PDF (Q&A)

$36.75  $104.99
buy now AAISM pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 08 Sep 2025