An organization plans to leverage AI in the software development process to speed up coding. Which of the following should the information security manager do FIRST?
Which of the following is the MOST effective strategy for penetration testers assessing the security of an AI model against membership inference attacks?
A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?
A large corporation has received an influx of sophisticated credential-phishing emails and wants to leverage an AI solution to detect and quarantine these messages before they reach employees. Which of the following blue-team AI features is BEST suited to this task?
An organization is adopting an agentic AI solution from an external vendor to support internal IT operations. Which of the following provides the MOST reliable and independently verifiable evidence of implemented security controls?
When deriving statistical information from AI systems, which source of risk is MOST important to address?
A military contractor discovered that its large language model (LLM) is at high risk of being targeted by advanced persistent threat (APT) actors seeking to exploit the model to access confidential information. Which of the following attacks is the HIGHEST priority to protect against?
Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?
An organization is implementing AI agent development across multiple engineering teams. Which of the following is the MOST important focus of AI-specific security training for developers?