New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

AAISM Exam Dumps - Isaca AI-Centric Security Management Questions and Answers

Question # 64

Which of the following is the MOST important factor to consider when selecting industry frameworks to align organizational AI governance with business objectives?

Options:

A.

Risk tolerance

B.

Risk threshold

C.

Risk register

D.

Risk appetite

Buy Now
Question # 65

Which of the following is the MOST critical success factor for an AI implementation project?

Options:

A.

Developing and using model cards

B.

Ensuring AI risk is captured in the risk register

C.

Mapping data throughout the life cycle

D.

Obtaining senior management buy-in

Buy Now
Question # 66

Which of the following would BEST help mitigate vulnerabilities associated with hidden triggers in generative AI models?

Options:

A.

Regularly retraining the model using a diverse data set

B.

Applying differential privacy and masking sensitive patterns in the training data

C.

Incorporating adversarial training to expose and neutralize potential triggers

D.

Monitoring model outputs and suspicious patterns to detect trigger activations

Buy Now
Question # 67

An AI system that supports critical processes has deviated from expected performance and is producing biased outcomes. Which of the following is the BEST course of action?

Options:

A.

Retrain the model with a new and expanded dataset

B.

Perform a root cause analysis to identify mitigation steps

C.

Conduct audits of the data and the model

D.

Activate the model kill switch

Buy Now
Question # 68

When integrating AI for innovation, which of the following can BEST help an organization manage security risk?

Options:

A.

Re-evaluating the risk appetite

B.

Seeking third-party advice

C.

Evaluating compliance requirements

D.

Adopting a phased approach

Buy Now
Question # 69

A financial organization is concerned about the risk of prompt injection attacks on its customer service chatbot. Which of the following controls BEST addresses this concern?

Options:

A.

Human-in-the-loop

B.

Input validation

C.

Increasing model parameters

D.

Continuous monitoring

Buy Now
Question # 70

The PRIMARY goal of data poisoning attacks is to:

Options:

A.

compromise the confidentiality of output data from the model

B.

compromise the confidentiality of model input data

C.

manipulate the behavior of the model during development

D.

undermine the integrity of the AI system’s outputs

Buy Now
Question # 71

Which of the following datasets is used to tune hyperparameters?

Options:

A.

Validation

B.

Test

C.

Configuration

D.

Training

Buy Now
Question # 72

Which of the following reviews MUST be conducted as part of an AI impact assessment?

Options:

A.

Testing, evaluation, validation, and verification

B.

Evaluation of model reproducibility

C.

Security control self-assessment (CSA)

D.

Identification of environmental and societal consequences

Buy Now
Question # 73

Which of the following is the BEST way to ensure role clarity and staff effectiveness when implementing AI-assisted security monitoring tools?

Options:

A.

Delay implementation until more data scientists are hired

B.

Increase budgets for AI certifications

C.

Update the security program to include cross-functional AI-specific responsibilities

D.

Transition responsibilities to external consultants

Buy Now
Exam Code: AAISM
Exam Name: ISACA Advanced in AI Security Management (AAISM) Exam
Last Update: Dec 15, 2025
Questions: 255
AAISM pdf

AAISM PDF

$25.5  $84.99
AAISM Engine

AAISM Testing Engine

$28.5  $94.99
AAISM PDF + Engine

AAISM PDF + Testing Engine

$40.5  $134.99