Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

AAISM Exam Dumps - Isaca AI-Centric Security Management Questions and Answers

Question # 4

How can an organization BEST protect itself from payment diversions caused by deepfake attacks impersonating management?

Options:

A.

Require mandatory deepfake detection training for all employees

B.

Mandate that payments be sent only once per week

C.

Issue a security policy on deepfakes

D.

Implement resilient payment approval processes

Buy Now
Question # 5

An organization needs large data sets to perform application testing. Which of the following would BEST fulfill this need?

Options:

A.

Reviewing AI model cards

B.

Incorporating data from search content

C.

Using open-source data repositories

D.

Performing AI data augmentation

Buy Now
Question # 6

A large pharmaceutical company using a new AI solution to develop treatment regimens is concerned about potential hallucinations with the introduction of real-world data. Which of the following is MOST likely to reduce this risk?

Options:

A.

Penetration testing

B.

Human-in-the-loop

C.

AI impact analysis

D.

Data asset validation

Buy Now
Question # 7

Embedding unique identifiers into AI models would BEST help with:

Options:

A.

Preventing unauthorized access

B.

Tracking ownership

C.

Eliminating AI system biases

D.

Detecting adversarial attacks

Buy Now
Question # 8

A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?

Options:

A.

Privilege escalation

B.

Data poisoning

C.

Model inversion

D.

Evasion attack

Buy Now
Question # 9

The PRIMARY benefit of implementing moderation controls in generative AI applications is that it can:

Options:

A.

Increase the model’s ability to generate diverse and creative content

B.

Optimize the model’s response time

C.

Ensure the generated content adheres to privacy regulations

D.

Filter out harmful or inappropriate content

Buy Now
Question # 10

Which of the following is the BEST mitigation control for membership inference attacks on AI systems?

Options:

A.

Model ensemble techniques

B.

AI threat modeling

C.

Differential privacy

D.

Cybersecurity-oriented red teaming

Buy Now
Question # 11

Which of the following is the MOST important course of action prior to placing an in-house developed AI solution into production?

Options:

A.

Perform a privacy, security, and compliance gap analysis

B.

Deploy a prototype of the solution

C.

Obtain senior management sign-off

D.

Perform testing, evaluation, validation, and verification

Buy Now
Question # 12

Which of the following is MOST important for an organization to consider when implementing a preventive security safeguard into a new AI product?

Options:

A.

Input sanitization

B.

Model output monitoring

C.

Penetration testing

D.

Differential privacy

Buy Now
Question # 13

Which of the following would MOST effectively ensure an organization developing AI systems has comprehensive data classification and inventory management?

Options:

A.

Creating a centralized team to oversee the classification of data used in AI projects

B.

Conducting quarterly audits of AI data sets for anomalies and missing metadata

C.

Establishing a manual process to categorize data based on business needs and regulatory compliance

D.

Implementing an automated data cataloging tool that integrates with all organizational data repositories

Buy Now
Exam Code: AAISM
Exam Name: ISACA Advanced in AI Security Management (AAISM) Exam
Last Update: Sep 13, 2025
Questions: 90
AAISM pdf

AAISM PDF

$25.5  $84.99
AAISM Engine

AAISM Testing Engine

$28.5  $94.99
AAISM PDF + Engine

AAISM PDF + Testing Engine

$40.5  $134.99