| Exam Name: | ISACA Advanced in AI Security Management (AAISM) Exam | ||
| Exam Code: | AAISM Dumps | ||
| Vendor: | Isaca | Certification: | AI-Centric Security Management |
| Questions: | 255 Q&A's | Shared By: | alessio |
A newly hired programmer suspects that the organization’s AI solution is inferring users’ sensitive information and using it to advise future decisions. Which of the following is the programmer’s BEST course of action?
Which of the following would BEST help mitigate vulnerabilities associated with hidden triggers in generative AI models?
An organization implementing an LLM application sees unexpected cost increases due to excessive computational resource usage. Which vulnerability is MOST likely in need of mitigation?
Which of the following strategies is the MOST effective way to protect against AI data poisoning?