ISACA AAISM Exam (page: 2)
ISACA Advanced in AI Security Management
Updated on: 12-Feb-2026

Viewing Page 2 of 13

Which of the following is the BEST approach for minimizing risk when integrating acceptable use policies for AI foundation models into business operations?

  1. Limit model usage to predefined scenarios specified by the developer
  2. Rely on the developer's enforcement mechanisms
  3. Establish AI model life cycle policy and procedures
  4. Implement responsible development training and awareness

Answer(s): C

Explanation:

The AAISM guidance defines risk minimization for AI deployment as requiring a formalized AI model life cycle policy and associated procedures. This ensures oversight from design to deployment, covering data handling, bias testing, monitoring, retraining, decommissioning, and acceptable use. Limiting usage to developer-defined scenarios or relying on vendor mechanisms transfers responsibility away from the organization and fails to meet governance expectations. Training and awareness support cultural alignment but cannot substitute for structured lifecycle controls. Therefore, the establishment of a documented lifecycle policy and procedures is the most comprehensive way to minimize operational, compliance, and ethical risks in integrating foundation models.


Reference:

AAISM Study Guide ­ AI Governance and Program Management (Model Lifecycle Governance)

ISACA AI Security Guidance ­ Policies and Lifecycle Management



Which of the following metrics BEST evaluates the ability of a model to correctly identify all true positive instances?

  1. F1 score
  2. Recall
  3. Precision
  4. Specificity

Answer(s): B

Explanation:

AAISM technical coverage identifies recall as the metric that specifically measures a model's ability to capture all true positive cases out of the total actual positives. A high recall means the system minimizes false negatives, ensuring that relevant instances are not overlooked. Precision instead measures correctness among predicted positives, specificity focuses on true negatives, and the F1 score balances precision and recall but does not by itself indicate the completeness of capturing positives. The official study guide defines recall as the most direct metric for evaluating how well a model identifies all relevant positive cases, making it the correct answer.


Reference:

AAISM Study Guide ­ AI Technologies and Controls (Evaluation Metrics and Model Performance)

ISACA AI Security Management ­ Model Accuracy and Completeness Assessments



An organization uses an AI tool to scan social media for product reviews. Fraudulent social media accounts begin posting negative reviews attacking the organization's product.
Which type of AI attack is MOST likely to have occurred?

  1. Model inversion
  2. Deepfake
  3. Availability attack
  4. Data poisoning

Answer(s): C

Explanation:

The AAISM materials classify availability attacks as attempts to disrupt or degrade the functioning of an AI system so that its outputs become unreliable or unusable. In this scenario, the fraudulent social media accounts are deliberately overwhelming the AI tool with misleading negative reviews, undermining its ability to deliver accurate sentiment analysis. This aligns directly with the concept of an availability attack. Model inversion relates to reconstructing training data from outputs, deepfakes involve synthetic content generation, and data poisoning corrupts the training set rather than manipulating inputs at runtime. Therefore, the fraudulent review campaign is most accurately identified as an availability attack.


Reference:

AAISM Study Guide ­ AI Risk Management (Adversarial Threats and Availability Risks)

ISACA AI Security Management ­ Attack Classifications



An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls.
Which of the following types of attacks is this an example of?

  1. Prompt injection
  2. Jailbreaking
  3. Remote code execution
  4. Evasion

Answer(s): A

Explanation:

According to the AAISM framework, prompt injection is the act of deliberately crafting malicious or manipulative inputs to override, bypass, or exploit the model's intended controls. In this case, the attacker is targeting the integrity of the model's outputs by exploiting weaknesses in how it interprets and processes prompts. Jailbreaking is a subtype of prompt injection specifically designed to override safety restrictions, while evasion attacks target classification boundaries in other ML contexts, and remote code execution refers to system-level exploitation outside of the AI inference context. The most accurate classification of this attack is prompt injection.


Reference:

AAISM Exam Content Outline ­ AI Technologies and Controls (Prompt Security and Input Manipulation)

AI Security Management Study Guide ­ Threats to Output Integrity



An organization using an AI model for financial forecasting identifies inaccuracies caused by missing data.
Which of the following is the MOST effective data cleaning technique to improve model performance?

  1. Increasing the frequency of model retraining with the existing data set
  2. Applying statistical methods to address missing data and reduce bias
  3. Deleting outlier data points to prevent unusual values impacting the model
  4. Tuning model hyperparameters to increase performance and accuracy

Answer(s): B

Explanation:

The AAISM study content emphasizes that data quality management is a central pillar of AI risk reduction. Missing data introduces bias and undermines predictive accuracy if not addressed systematically. The most effective remediation is to apply statistical imputation and related methods to fill in or adjust for missing values in a way that minimizes bias and preserves data integrity. Retraining on flawed data does not solve the underlying issue. Deleting outliers may harm model robustness, and hyperparameter tuning optimizes model mechanics but cannot resolve missing information. Therefore, the proper corrective technique for missing data is the application of statistical methods to reduce bias.


Reference:

AAISM Study Guide ­ AI Risk Management (Data Integrity and Quality Controls)

ISACA AI Governance Guidance ­ Data Preparation and Bias Mitigation



Which of the following is MOST important to consider when validating a third-party AI tool?

  1. Terms and conditions
  2. Right to audit
  3. Industry analysis and certifications
  4. Roundtable testing

Answer(s): B

Explanation:

The AAISM framework specifies that when adopting third-party AI tools, the right to audit is the most critical contractual and governance safeguard. This ensures that the organization can independently verify compliance with security, privacy, and ethical requirements throughout the lifecycle of the tool. Terms and conditions provide general usage guidance but often limit liability rather than ensuring transparency. Industry certifications may indicate good practice but do not substitute for direct verification. Roundtable testing is useful for evaluation but lacks enforceability. Only the contractual right to audit provides formal assurance that the tool operates in accordance with organizational policies and external regulations.


Reference:

AAISM Exam Content Outline ­ AI Governance and Program Management (Third-Party Governance)

AI Security Management Study Guide ­ Vendor Oversight and Audit Rights



Which of the following is the BEST mitigation control for membership inference attacks on AI systems?

  1. Model ensemble techniques
  2. AI threat modeling
  3. Differential privacy
  4. Cybersecurity-oriented red teaming

Answer(s): C

Explanation:

Membership inference attacks attempt to determine whether a particular data point was part of a model's training set, which risks violating privacy. The AAISM study guide highlights differential privacy as the most effective mitigation because it introduces mathematical noise that obscures individual contributions without significantly degrading model performance. Ensemble methods improve robustness but do not specifically protect privacy. Threat modeling and red teaming help identify risks but are not direct controls. The explicit mitigation control aligned with privacy preservation for membership inference is differential privacy.


Reference:

AAISM Study Guide ­ AI Technologies and Controls (Privacy-Preserving Techniques)

ISACA AI Security Management ­ Membership Inference Mitigations



Which of the following types of testing can MOST effectively mitigate prompt hacking?

  1. Load
  2. Input
  3. Regression
  4. Adversarial

Answer(s): D

Explanation:

Prompt hacking manipulates large language models by injecting adversarial instructions into inputs to bypass or override safeguards. The AAISM framework identifies adversarial testing as the most effective way to simulate such manipulative attempts, expose vulnerabilities, and improve the resilience of controls. Load testing evaluates performance, input testing checks format validation, and regression testing validates functionality after changes. None of these directly address the manipulation of natural language inputs. Adversarial testing is therefore the correct approach to mitigate prompt hacking risks.


Reference:

AAISM Exam Content Outline ­ AI Risk Management (Testing and Assurance Practices)

AI Security Management Study Guide ­ Adversarial Testing Against Prompt Manipulation



Viewing Page 2 of 13



Share your comments for ISACA AAISM exam with other users:

Sonbir 8/8/2023 1:04:00 PM

how to get system serial number using intune
Anonymous


Manju 10/19/2023 1:19:00 PM

is it really helpful to pass the exam
Anonymous


LeAnne Hair 8/24/2023 12:47:00 PM

#229 in incorrect - all the customers require an annual review
UNITED STATES


Abdul SK 9/28/2023 11:42:00 PM

kindy upload
Anonymous


Aderonke 10/23/2023 12:53:00 PM

fantastic assessment on psm 1
UNITED KINGDOM


SAJI 7/20/2023 2:51:00 AM

56 question correct answer a,b
Anonymous


Raj Kumar 10/23/2023 8:52:00 PM

thank you for providing the q bank
CANADA


piyush keshari 7/7/2023 9:46:00 PM

true quesstions
Anonymous


B.A.J 11/6/2023 7:01:00 AM

i can“t believe ms asks things like this, seems to be only marketing material.
Anonymous


Guss 5/23/2023 12:28:00 PM

hi, could you please add the last update of ns0-527
Anonymous


Rond65 8/22/2023 4:39:00 PM

question #3 refers to vnet4 and vnet5. however, there is no vnet5 listed in the case study (testlet 2).
UNITED STATES


Cheers 12/13/2023 9:55:00 AM

sometimes it may be good some times it may be
GERMANY


Sumita Bose 7/21/2023 1:01:00 AM

qs 4 answer seems wrong- please check
AUSTRALIA


Amit 9/7/2023 12:53:00 AM

very detailed explanation !
HONG KONG


FisherGirl 5/16/2022 10:36:00 PM

the interactive nature of the test engine application makes the preparation process less boring.
NETHERLANDS


Chiranthaka 9/20/2023 11:15:00 AM

very useful.
Anonymous


SK 7/15/2023 3:51:00 AM

complete question dump should be made available for practice.
Anonymous


Gamerrr420 5/25/2022 9:38:00 PM

i just passed my first exam. i got 2 exam dumps as part of the 50% sale. my second exam is under work. once i write that exam i report my result. but so far i am confident.
AUSTRALIA


Kudu hgeur 9/21/2023 5:58:00 PM

nice create dewey stefen
CZECH REPUBLIC


Anorag 9/6/2023 9:24:00 AM

i just wrote this exam and it is still valid. the questions are exactly the same but there are about 4 or 5 questions that are answered incorrectly. so watch out for those. best of luck with your exam.
CANADA


Nathan 1/10/2023 3:54:00 PM

passed my exam today. this is a good start to 2023.
UNITED STATES


1 10/28/2023 7:32:00 AM

great sharing
Anonymous


Anand 1/20/2024 10:36:00 AM

very helpful
UNITED STATES


Kumar 6/23/2023 1:07:00 PM

thanks.. very helpful
FRANCE


User random 11/15/2023 3:01:00 AM

i registered for 1z0-1047-23 but dumps qre available for 1z0-1047-22. help me with this...
UNITED STATES


kk 1/17/2024 3:00:00 PM

very helpful
UNITED STATES


Raj 7/24/2023 10:20:00 AM

please upload oracle 1z0-1110-22 exam pdf
INDIA


Blessious Phiri 8/13/2023 11:58:00 AM

becoming interesting on the logical part of the cdbs and pdbs
Anonymous


LOL what a joke 9/10/2023 9:09:00 AM

some of the answers are incorrect, i would be wary of using this until an admin goes back and reviews all the answers
UNITED STATES


Muhammad Rawish Siddiqui 12/9/2023 7:40:00 AM

question # 267: federated operating model is also correct.
SAUDI ARABIA


Mayar 9/22/2023 4:58:00 AM

its helpful alot.
Anonymous


Sandeep 7/25/2022 11:58:00 PM

the questiosn from this braindumps are same as in the real exam. my passing mark was 84%.
INDIA


Eman Sawalha 6/10/2023 6:09:00 AM

it is an exam that measures your understanding of cloud computing resources provided by aws. these resources are aligned under 6 categories: storage, compute, database, infrastructure, pricing and network. with all of the services and typees of services under each category
GREECE


Mars 11/16/2023 1:53:00 AM

good and very useful
TAIWAN PROVINCE OF CHINA