New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

AAISM Exam Dumps - Isaca AI-Centric Security Management Questions and Answers

Question # 44

Which of the following is the BEST mitigation control for membership inference attacks on AI systems?

Options:

A.

Model ensemble techniques

B.

AI threat modeling

C.

Differential privacy

D.

Cybersecurity-oriented red teaming

Buy Now
Question # 45

AI developers often find it difficult to explain the processes inside deep learning systems PRIMARILY because:

Options:

A.

Training data input for learning is spread throughout the public domain and continues to change

B.

Generated knowledge dynamically changes in memory without being tracked by change history logs

C.

Applied algorithms are based on probability theories to improve system performance

D.

Neural network architectures can include statistical methods that are not fully understood

Buy Now
Question # 46

Which of the following MOST effectively secures ongoing stakeholder support for AI initiatives?

Options:

A.

Quantifying and communicating the value of AI solutions

B.

Conducting periodic staff training

C.

Addressing and optimizing AI-related risk

D.

Developing and monitoring an AI strategic roadmap

Buy Now
Question # 47

Personal data used to train AI systems can BEST be protected by:

Options:

A.

Erasing personal data after training

B.

Ensuring the quality of personal data

C.

Anonymizing personal data

D.

Hashing personal data

Buy Now
Question # 48

Which of the following should be the PRIMARY objective of implementing differential privacy techniques in AI models leveraging fraud detection systems?

Options:

A.

Enhancing the accuracy of predictions to desired levels

B.

Increasing model training speed for an efficient launch

C.

Protecting individual data contributions while allowing statistical analysis

D.

Reducing computational resources required for the model training phase

Buy Now
Question # 49

Which of the following is the MOST likely cause of model drift?

Options:

A.

Data poisoning

B.

Perfect knowledge

C.

Membership inference

D.

Model stealing

Buy Now
Question # 50

Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?

Options:

A.

F1 score

B.

Recall

C.

Precision

D.

Specificity

Buy Now
Question # 51

A large pharmaceutical company using a new AI solution to develop treatment regimens is concerned about potential hallucinations with the introduction of real-world data. Which of the following is MOST likely to reduce this risk?

Options:

A.

Penetration testing

B.

Human-in-the-loop

C.

AI impact analysis

D.

Data asset validation

Buy Now
Question # 52

Which of the following is the BEST control for preventing deepfakes?

Options:

A.

Output provenance verification

B.

Regular AI risk assessment

C.

AI governance policies

D.

System input validation

Buy Now
Question # 53

In the context of generative AI, which of the following would be the MOST likely goal of penetration testing during a red-teaming exercise?

Options:

A.

Generate outputs that are unexpected using adversarial inputs

B.

Stress test the model’s decision-making process

C.

Degrade the model’s performance for existing use cases

D.

Replace the model’s outputs with entirely random content

Buy Now
Exam Code: AAISM
Exam Name: ISACA Advanced in AI Security Management (AAISM) Exam
Last Update: Dec 15, 2025
Questions: 255
AAISM pdf

AAISM PDF

$25.5  $84.99
AAISM Engine

AAISM Testing Engine

$28.5  $94.99
AAISM PDF + Engine

AAISM PDF + Testing Engine

$40.5  $134.99