Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca AAIA - ISACA Advanced in AI Audit (AAIA)

Page: 3 / 3
Total 90 questions

Which of the following is an IS auditor's MOST important course of action when determining whether source data should be entered into approved generative AI tools to assist with an audit?

A.

Validate that the tool is leveraging the latest model.

B.

Validate that the tool provides a privacy notice.

C.

Determine whether any AI model hallucinations have occurred.

D.

Determine whether the information is reliable.

When auditing a machine learning (ML) solution, false positives can BEST be assessed by examining the level of:

A.

Precision

B.

Completeness

C.

Accuracy

D.

Recall

Which of the following is the MOST effective way an IS auditor could use generative AI to plan an audit of a new database storing transactional data?

A.

Identifying separation of duties conflicts for database data changes

B.

Developing architecture diagrams

C.

Identifying technology-specific risk and considerations

D.

Summarizing meeting transcripts from interviews with database administrators (DBAs)

Which of the following should be done FIRST when an attacker exfiltrates sensitive information from an AI model?

A.

Implement rate limiting and query restrictions to reduce exploitation attempts.

B.

Isolate impacted systems until the attack vector is identified.

C.

Rebuild the AI model using a more secure architecture.

D.

Inform regulators and affected stakeholders of a potential data breach.

An organization uses an AI-powered tool to detect and respond to cybersecurity threats in real time. An IS auditor finds that the tool produces excessive false positives, increasing the workload of the security team. Which of the following techniques should the auditor recommend to BEST evaluate the tool's effectiveness in managing this issue?

A.

Use a log analysis tool to examine the types and frequency of alerts generated.

B.

Implement a benchmarking tool to compare the system's alerting capability with industry standards.

C.

Conduct penetration testing to assess the system's ability to detect genuine threats.

D.

Deploy a machine learning (ML) validation tool to increase the model's accuracy and performance.

A digital bank utilizes an AI system to generate credit scores. Which of the following would BEST mitigate the risk of sudden and unexplained changes in a borrower’s credit score?

A.

Ensuring the system is periodically reviewed and calibrated by human experts to maintain stability in predictions

B.

Using only data from the last six months to one year to avoid outdated information affecting the credit score

C.

Allowing the AI to operate fully autonomously to prevent processing delays

D.

Obtaining and validating the credit scores from third-party agencies to cross-check AI-generated results

Which use case for an AI model to be used by a food delivery service would pose ethical risk to the organization?

A.

Correlating time, cost, delivery distance, and customer satisfaction metrics to issue coupons to customers receiving substandard service

B.

Basing driver retention and termination decisions on the number of delivered orders per total hours worked as compared to an industry benchmark

C.

Comparing total food preparation and delivery time to an industry benchmark to set key performance and risk indicators for individual restaurants

D.

Using customer service metrics for service speed and food quality to predict customer retention and forecast revenue