Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

AAISM Exam Dumps - Isaca AI-Centric Security Management Questions and Answers

Question # 14

Which of the following BEST describes the role of risk documentation in an AI governance program?

Options:

A.

Providing a record of past AI-related incidents for audits

B.

Outlining the acceptable levels of risk for AI-related initiatives

C.

Offering detailed analyses of technical risk and vulnerabilities

D.

Demonstrating governance, risk, and compliance (GRC) for external stakeholders

Buy Now
Question # 15

Which of the following MOST effectively minimizes the attack surface when securing AI agent components during their development and deployment?

Options:

A.

Deploy pre-trained models directly into production.

B.

Consolidate event logs for correlation and centralized analysis.

C.

Schedule periodic manual code reviews.

D.

Implement compartmentalization with least privilege enforcement.

Buy Now
Question # 16

Which of the following is the MOST effective use of AI in incident response?

Options:

A.

Streamlining incident response testing

B.

Automating incident response triage

C.

Improving incident response playbook

D.

Ensuring chain of custody

Buy Now
Question # 17

An organization plans to implement a new AI system. Which of the following is the MOST important factor in determining the level of risk monitoring activities required?

Options:

A.

The organization’s risk appetite

B.

The organization’s number of AI system users

C.

The organization’s risk tolerance

D.

The organization’s compensating controls

Buy Now
Question # 18

Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?

Options:

A.

Health support system

B.

Credit risk modeling system

C.

Car navigation system

D.

Industrial control system

Buy Now
Question # 19

Which of the following AI system vulnerabilities is MOST easily exploited by adversaries?

Options:

A.

Inaccurate generalizations from new data by the AI model

B.

Weak controls for access to the AI model

C.

Lack of protection against denial of service (DoS) attacks

D.

Inability to detect input modifications causing inappropriate AI outputs

Buy Now
Question # 20

To ensure AI tools do not jeopardize ethical principles, it is MOST important to validate that:

Options:

A.

The organization has implemented a responsible development policy

B.

Outputs of AI tools do not perpetuate adverse biases

C.

Stakeholders have approved alignment with company values

D.

AI tools are evaluated by the privacy department before implementation

Buy Now
Question # 21

An organization has requested a developer to apply AI algorithms to existing modules in order to improve customer service quality. At this stage, which of the following should be considered FIRST?

Options:

A.

The developer may need to be held accountable for business inquiries raised by customers

B.

IT management may need to revise the service agreement if AI behavior cannot be predefined

C.

Project sponsors may need to agree on a phased approach in order to ensure safe release

D.

The organization may need to explain the performance of the applied AI algorithm

Buy Now
Question # 22

As organizations increasingly rely on vendors to develop AI systems, which of the following is the MOST effective way to monitor vendors and ensure compliance with ethical and security standards?

Options:

A.

Conducting regular audits of vendor processes and adherence to AI development guidelines

B.

Requiring vendors to monitor their adherence to ethics and security standards

C.

Mandating that vendors share source code and AI documentation with the contracting party

D.

Allowing vendors to self-attest ethical AI compliance and implement benchmark monitoring

Buy Now
Question # 23

Which of the following recommendations would BEST help a service provider mitigate the risk of lawsuits arising from generative AI’s access to and use of internet data?

Options:

A.

Activate filtering logic to exclude intellectual property flags

B.

Disclose service provider policies to declare compliance with regulations

C.

Appoint a data steward specialized in AI to strengthen security governance

D.

Review log information that records how data was collected

Buy Now
Exam Code: AAISM
Exam Name: ISACA Advanced in AI Security Management (AAISM) Exam
Last Update: Sep 14, 2025
Questions: 90
AAISM pdf

AAISM PDF

$25.5  $84.99
AAISM Engine

AAISM Testing Engine

$28.5  $94.99
AAISM PDF + Engine

AAISM PDF + Testing Engine

$40.5  $134.99