Which of the following should be the PRIMARY objective of implementing differential privacy techniques in AI models leveraging fraud detection systems?
Which of the following BEST ensures the integrity of data sets used to train AI models?
An attack has occurred on an AI system that has been in use for two years. Which of the following would BEST mitigate the impact of the attack?
Which testing technique is BEST for determining how an AI model makes decisions?
AI developers often find it difficult to explain the processes inside deep learning systems PRIMARILY because:
Which of the following would BEST protect trade secrets related to AI technologies during their life cycle?
Which of the following is BEST for analyzing true positives, true negatives, false positives, and false negatives produced by an AI model?
Which of the following information is MOST important to include in a centralized AI inventory?
Which of the following employee awareness topics would MOST likely be revised to account for AI-enabled cyber risk?
Within an incident handling process, which of the following would BEST help restore end-user trust in an AI system?
What BEST protects trade secrets related to AI technologies during their life cycle?
After implementing a third-party generative AI tool, an organization learns about new regulations related to how organizations use AI. Which of the following would be the BEST justification for the organization to decide not to comply?
An organization is implementing AI agent development across multiple engineering teams. Which of the following is the MOST important focus of AI-specific security training for developers?
An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?
How can an organization BEST protect itself from payment diversions caused by deepfake attacks impersonating management?
A financial institution plans to deploy an AI system to provide credit risk assessments for loan applications. Which of the following should be given the HIGHEST priority in the system’s design to ensure ethical decision-making and prevent bias?
A financial services firm received a regulatory fine after a vendor switched its chatbot’s AI model without due diligence, resulting in unethical investment advice to the firm’s clients. Which of the following controls should be implemented by the firm to BEST prevent recurrence of this scenario?
Which of the following BEST enables an organization to strengthen information security controls around the use of generative AI applications?
Which of the following AI-driven systems should have the MOST stringent recovery time objective (RTO)?
Which of the following will BEST reduce data bias in machine learning (ML) algorithms?
Which of the following is the GREATEST benefit of performing AI security risk assessments?
Which of the following should be the MOST important consideration when conducting an AI impact assessment?
A CISO has been tasked with providing key performance indicators (KPIs) on the organization’s newly launched AI chatbot. Which of the following are the BEST metrics for the CISO to recommend?
Which of the following is MOST important to ensure security throughout the AI data life cycle?
An organization utilizes AI-enabled mapping software to plan routes for delivery drivers. A driver following the AI route drives the wrong way down a one-way street, despite numerous signs. Which of the following biases does this scenario demonstrate?
During the deployment of a generative AI platform, a risk assessment highlighted threats such as data leakage and prompt manipulation. Which of the following is the BEST way to ensure appropriate control selection?
A newly hired programmer suspects that the organization’s AI solution is inferring users’ sensitive information and using it to advise future decisions. Which of the following is the programmer’s BEST course of action?
An organization plans to leverage AI in the software development process to speed up coding. Which of the following should the information security manager do FIRST?
Which of the following is the GREATEST concern when a vendor enables generative AI features for an organization's critical system?
How can an organization best remain compliant when decommissioning an AI system that recorded patient data?
Which of the following BEST ensures AI components are validated during disaster recovery testing?
An AI research team is developing a natural language processing model that relies on several open-source libraries. Which of the following is the team’s BEST course of action to ensure the integrity of the software packages used?
Which of the following is the MOST important consideration when an organization is adopting generative AI for personalized advertising?
An organization plans to implement a new AI system. Which of the following is the MOST important factor in determining the level of risk monitoring activities required?
Within an incident handling process, which of the following would BEST help restore end user trust with an AI system?
The PRIMARY reason to conduct a privacy impact assessment (PIA) on an AI system is to:
Which of the following mitigation control strategies would BEST reduce the risk of introducing hidden backdoors during model fine-tuning via third-party components?
Which of the following controls BEST mitigates the inherent limitations of generative AI models?
An organization is implementing AI agent development across engineering teams. What should AI-specific training focus on?
Which of the following should be done FIRST when developing an acceptable use policy for generative AI?
AI developers often find deep learning systems difficult to explain PRIMARILY because:
Which defense is MOST effective against cyberattacks that alter input data to avoid detection?
Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?
When implementing a generative AI system, which of the following approaches will BEST prevent misalignment between the corporate risk appetite and tolerance?
An organization is implementing an AI-based credit assessment engine using internal and third-party customer data. Which of the following BEST aligns with data management controls for the AI life cycle?
An organization decides to use an anomaly-based intrusion detection system (IDS) integrated with a generative adversarial network (GAN)–enabled AI tool. The integrated tool would MOST effectively detect intrusions by leveraging:
What is the GREATEST concern when a vendor enables generative AI features for an organization’s critical system?
Which of the following would BEST help an organization align its AI initiatives with business objectives?
A large pharmaceutical company using a new AI solution to develop treatment regimens is concerned about potential hallucinations with the introduction of real-world data. Which of the following is MOST likely to reduce this risk?
A school district contracts a third-party provider for AI-based curriculum recommendations. Which of the following is the BEST way to ensure the vendor uses AI responsibly?
Which of the following is the MOST effective strategy for penetration testers assessing the security of an AI model against membership inference attacks?
Which of the following is the BEST way to ensure role clarity and staff effectiveness when implementing AI-assisted security monitoring tools?
A financial organization relies on AI-based identity verification and fraud detection services. Which of the following BEST integrates AI security risk into the business continuity plan (BCP)?
An organization concerned about the ethical and responsible use of a newly developed AI product should consider implementing:
Which of the following is the MAIN objective of the operational phase of AI life cycle management?
A SaaS-based LLM system has risks including prompt injection, data poisoning, and model exfiltration. What is the BEST way to ensure consistent risk treatment?
Who is responsible for implementing recommendations in a final report after an external AI compliance audit?
An organization is deploying an automated AI cybersecurity system. Which of the following would be the MOST effective strategy to minimize human error and improve overall security?
When deriving statistical information generated by AI systems, which of the following types of risk is MOST important to address?