New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

AAISM Exam Dumps - Isaca AI-Centric Security Management Questions and Answers

Question # 4

Which of the following types of data is used to tune hyperparameters?

Options:

A.

Validation

B.

Configuration

C.

Training

D.

Test

Buy Now
Question # 5

An organization plans to leverage AI in the software development process to speed up coding. Which of the following should the information security manager do FIRST?

Options:

A.

Conduct an impact assessment

B.

Train developers to verify AI output

C.

Update the security policy to include AI controls

D.

Perform a cost-benefit analysis

Buy Now
Question # 6

Which of the following is the MOST effective strategy for penetration testers assessing the security of an AI model against membership inference attacks?

Options:

A.

Disabling AI model logging to reduce noise during testing

B.

Measuring AI model accuracy on the test set

C.

Analyzing AI model confidence scores to indicate training data

D.

Generating synthetic data to replace the training data

Buy Now
Question # 7

A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?

Options:

A.

Privilege escalation

B.

Data poisoning

C.

Model inversion

D.

Evasion attack

Buy Now
Question # 8

A large corporation has received an influx of sophisticated credential-phishing emails and wants to leverage an AI solution to detect and quarantine these messages before they reach employees. Which of the following blue-team AI features is BEST suited to this task?

Options:

A.

Large language model (LLM)

B.

Natural language processing (NLP)

C.

Natural language generation (NLG)

D.

Retrieval-augmented generation (RAG)

Buy Now
Question # 9

An organization is adopting an agentic AI solution from an external vendor to support internal IT operations. Which of the following provides the MOST reliable and independently verifiable evidence of implemented security controls?

Options:

A.

Industry benchmarking peer review

B.

Third-party audit reports

C.

Internal red-team testing reports

D.

General AI security whitepapers

Buy Now
Question # 10

When deriving statistical information from AI systems, which source of risk is MOST important to address?

Options:

A.

Presence of hallucinations

B.

Incomplete outputs

C.

Lack of data normalization

D.

Systemic bias in data sets

Buy Now
Question # 11

A military contractor discovered that its large language model (LLM) is at high risk of being targeted by advanced persistent threat (APT) actors seeking to exploit the model to access confidential information. Which of the following attacks is the HIGHEST priority to protect against?

Options:

A.

Model inversion

B.

Data poisoning

C.

Unauthorized tuning

D.

Model distillation

Buy Now
Question # 12

Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?

Options:

A.

Health support system

B.

Credit risk modeling system

C.

Car navigation system

D.

Industrial control system

Buy Now
Question # 13

An organization is implementing AI agent development across multiple engineering teams. Which of the following is the MOST important focus of AI-specific security training for developers?

Options:

A.

Prompt injection, agent memory control, and insecure tool execution

B.

Dataset bias, explainability, and fairness in model decisions

C.

Output moderation, hallucination handling, and policy alignment

D.

API abuse, data leakage, and third-party plug-in risk

Buy Now
Exam Code: AAISM
Exam Name: ISACA Advanced in AI Security Management (AAISM) Exam
Last Update: Dec 13, 2025
Questions: 255
AAISM pdf

AAISM PDF

$25.5  $84.99
AAISM Engine

AAISM Testing Engine

$28.5  $94.99
AAISM PDF + Engine

AAISM PDF + Testing Engine

$40.5  $134.99