Exam Name: | ISACA Advanced in AI Security Management (AAISM) Exam | ||
Exam Code: | AAISM Dumps | ||
Vendor: | Isaca | Certification: | AI-Centric Security Management |
Questions: | 90 Q&A's | Shared By: | andrei |
When documenting information about machine learning (ML) models, which of the following artifacts BEST helps enhance stakeholder trust?
Which of the following is a key risk indicator (KRI) for an AI system used for threat detection?
When an attacker uses synthetic data to reverse engineer an organization’s AI model, it is an example of which of the following types of attack?
An attacker crafts inputs to a large language model (LLM) to exploit output integrity controls. Which of the following types of attacks is this an example of?