Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

AAISM Questions and Answers

Question # 6

Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?

A.

F1 score

B.

Recall

C.

Precision

D.

Specificity

Full Access
Question # 7

Which of the following is the BEST mitigation control for membership inference attacks on AI systems?

A.

Model ensemble techniques

B.

AI threat modeling

C.

Differential privacy

D.

Cybersecurity-oriented red teaming

Full Access
Question # 8

Which of the following factors is MOST important for preserving user confidence and trust in generative AI systems?

A.

Bias minimization

B.

Access controls and secure storage solutions

C.

Transparent disclosure and informed consent

D.

Data anonymization

Full Access
Question # 9

A large language model (LLM) has been manipulated to provide advice that serves an attacker’s objectives. Which of the following attack types does this situation represent?

A.

Privilege escalation

B.

Data poisoning

C.

Model inversion

D.

Evasion attack

Full Access
Question # 10

Which of the following should be a PRIMARY consideration when defining recovery point objectives (RPOs) and recovery time objectives (RTOs) for generative AI solutions?

A.

Preserving the most recent versions of data models to avoid inaccuracies in functionality

B.

Prioritizing computational efficiency over data integrity to minimize downtime

C.

Ensuring the backup system can restore training data sets within the defined RTO window

D.

Maintaining consistent hardware configurations to prevent discrepancies during model restoration

Full Access
Question # 11

Which of the following types of testing can MOST effectively mitigate prompt hacking?

A.

Load

B.

Input

C.

Regression

D.

Adversarial

Full Access
Question # 12

Which of the following is the MOST important consideration for an organization that has decided to adopt AI to leverage its competitive advantage?

A.

Develop a comprehensive strategic roadmap for AI integration

B.

Develop a comprehensive risk management process to address AI-related issues

C.

Develop internal training programs on AI governance, risk, and compliance (GRC)

D.

Develop a business case for the procurement of AI monitoring tools

Full Access
Question # 13

An organization is reviewing an AI application to determine whether it is still needed. Engineers have been asked to analyze the number of incorrect predictions against the total number of predictions made. Which of the following is this an example of?

A.

Control self-assessment (CSA)

B.

Model validation

C.

Key performance indicator (KPI)

D.

Explainable decision-making

Full Access
Question # 14

Which of the following BEST describes the role of risk documentation in an AI governance program?

A.

Providing a record of past AI-related incidents for audits

B.

Outlining the acceptable levels of risk for AI-related initiatives

C.

Offering detailed analyses of technical risk and vulnerabilities

D.

Demonstrating governance, risk, and compliance (GRC) for external stakeholders

Full Access
Question # 15

An organization uses an AI tool to scan social media for product reviews. Fraudulent social media accounts begin posting negative reviews attacking the organization's product. Which type of AI attack is MOST likely to have occurred?

A.

Model inversion

B.

Deepfake

C.

Availability attack

D.

Data poisoning

Full Access
Question # 16

Which of the following security framework elements BEST helps to safeguard the integrity of outputs generated by AI algorithms?

A.

Risk exposure due to bias in AI outputs is kept within an acceptable range

B.

Ethical standards are incorporated into security awareness programs

C.

Management is prepared to disclose AI system architecture to stakeholders

D.

Responsibility is defined for legal actions related to AI regulatory requirements

Full Access
Question # 17

Which of the following recommendations would BEST help a service provider mitigate the risk of lawsuits arising from generative AI’s access to and use of internet data?

A.

Activate filtering logic to exclude intellectual property flags

B.

Disclose service provider policies to declare compliance with regulations

C.

Appoint a data steward specialized in AI to strengthen security governance

D.

Review log information that records how data was collected

Full Access
Question # 18

Which of the following is the MOST serious consequence of an AI system correctly guessing the personal information of individuals and drawing conclusions based on that information?

A.

The exposure of personal information may result in litigation

B.

The publicly available output of the model may include false or defamatory statements about individuals

C.

The output may reveal information about individuals or groups without their knowledge

D.

The exposure of personal information may lead to a decline in public trust

Full Access
Question # 19

A financial institution plans to deploy an AI system to provide credit risk assessments for loan applications. Which of the following should be given the HIGHEST priority in the system’s design to ensure ethical decision-making and prevent bias?

A.

Regularly update the model with new customer data to improve prediction accuracy.

B.

Integrate a mechanism for customers to appeal decisions directly within the system.

C.

Train the system to provide advisory outputs with final decisions made by human experts.

D.

Restrict the model’s decision-making criteria to objective financial metrics only.

Full Access
Question # 20

A PRIMARY objective of responsibly providing AI services is to:

A.

Enable AI models to operate autonomously

B.

Ensure the confidentiality and integrity of data processed by AI models

C.

Build trust for decisions and predictions made by AI models

D.

Improve the ability of AI models to learn from new data

Full Access
Question # 21

Which of the following is the MOST effective use of AI in incident response?

A.

Streamlining incident response testing

B.

Automating incident response triage

C.

Improving incident response playbook

D.

Ensuring chain of custody

Full Access
Question # 22

Which of the following is MOST important to consider when validating a third-party AI tool?

A.

Terms and conditions

B.

Right to audit

C.

Industry analysis and certifications

D.

Roundtable testing

Full Access
Question # 23

Which of the following is the BEST reason to immediately disable an AI system?

A.

Excessive model drift

B.

Slow model performance

C.

Overly detailed model outputs

D.

Insufficient model training

Full Access
Question # 24

Which of the following controls BEST mitigates the risk of data poisoning?

A.

Data set restoration

B.

Data validation

C.

Digital watermarking

D.

Intrusion detection

Full Access
Question # 25

As organizations increasingly rely on vendors to develop AI systems, which of the following is the MOST effective way to monitor vendors and ensure compliance with ethical and security standards?

A.

Conducting regular audits of vendor processes and adherence to AI development guidelines

B.

Requiring vendors to monitor their adherence to ethics and security standards

C.

Mandating that vendors share source code and AI documentation with the contracting party

D.

Allowing vendors to self-attest ethical AI compliance and implement benchmark monitoring

Full Access
Question # 26

To ensure AI tools do not jeopardize ethical principles, it is MOST important to validate that:

A.

The organization has implemented a responsible development policy

B.

Outputs of AI tools do not perpetuate adverse biases

C.

Stakeholders have approved alignment with company values

D.

AI tools are evaluated by the privacy department before implementation

Full Access
Question # 27

After deployment, an AI model’s output begins to drift outside of the expected range. Which of the following is the development team’s BEST course of action?

A.

Take the AI model offline

B.

Adjust the hyperparameters of the AI model

C.

Create an emergency change request to correct the issue

D.

Return to an earlier phase in the AI life cycle

Full Access