Faculty members at a university are concerned about potential inherent bias and inconsistency in one department’s AI plagiarism detection service.
Which of the following principles will most likely to address their concerns?
A data set containing medical information is put into a machine learning (ML) model that is designed to predict specific illnesses for a population. In the process of verifying the reliability of the system, the compliance officer realizes that the system cannot reliably predict illnesses for certain segments of the population. Which of the following types of risk is most applicable to this case?
ABias
BConsistency
CTransparency
DInclusiveness
A penetration tester is assessing the controls of a deployed AI system that is designed to search and return the contents of files. The tester runs the following:
Which of the following is the best control to prevent abuse of the system?
AImplementing custom detection rules for anomalous model behavior
BSegmenting the workload into a separate virtual private cloud (VPC)
CAdding a large language model (LLM) guardrails library to the application code
DReducing the privilege scope of the service account
A line of business wants to onboard an application that uses a custom AI model for employee assessments. The Chief Information Officer (CIO) agrees to allow the engagement to proceed but first wants a threat model. Which of the following is the most appropriate to use for an AI threat model?
AResponsible AI
BAdversarial Threat Landscape for AI Systems (ATLAS)
COrganization for Economic Co-operation and Development (OECD)
DInternational Organization for Standardization (ISO)
An organization recently developed an AI-powered product and discovers that it is vulnerable to attacks in which malicious actors can alter the input, causing the system to recommend inappropriate information. Which of the following techniques is the most effective way to secure the system against manipulation attacks?
ACross-validation
BFeature regularization
CFeature scaling
DGuardrails
Question 6
AI governance, risk, and compliance
0
Question 7
Securing AI systems
Question 8
Basic AI concepts related to cybersecurity
Question 9
Securing AI systems
Question 10
Securing AI systems
Question 11
Securing AI systems
Question 12
Securing AI systems
Question 13
Securing AI systems
Question 14
Securing AI systems
Question 15
AI-assisted security
Question 16
Securing AI systems
Question 17
Securing AI systems
Question 18
Securing AI systems
Question 19
Securing AI systems
Question 20
AI-assisted security
Question 21
AI governance, risk, and compliance
Question 22
Basic AI concepts related to cybersecurity
Question 23
Basic AI concepts related to cybersecurity
Question 24
Securing AI systems
Question 25
Basic AI concepts related to cybersecurity
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
An AI security team must assess the probability of an attack on its new system and the impact associated with such an attack. Which of the following threat-modeling resources best addresses the threat landscape for machine learning (ML)?
ACommon Vulnerabilities and Exposures (CVE) AI working group
BMITRE Adversarial Threat Landscape for AI Systems (ATLAS)
CMassachusetts Institute of Technology (MIT) risk repository
An AI security administrator notices that the information referenced by the model is incorrectly formatted and missing values. Which of the following job roles would most likely be responsible for correcting this error?
APlatform engineer
BMachine learning operations (MLOps) engineer
CData engineer
DAI architect
Which of the following describe the practice of providing examples in a prompt? (Choose two.)
AUser prompt
BSystem prompt
CPrompt template
DQuantization
EOne-shot
FMulti-shot
An organization develops a chatbot with the following requirements:
Does not provide harmful or explicit responses
Must use clean and professional language
Ensures that responses are accurate
Which of the following should the organization conduct after the chatbot is fully developed but before a customer-facing deployment?
AData labeling and classification
BModel auditing and evaluation
CGuardrail testing and validation
DRegression modeling and minimization
Customer feedback for an AI chatbot has a high-rate of non-answers, which is causing higher central processing unit (CPU) utilization. Which of the following should be implemented?
AGuardrails
BResponse confidence level
CPrompt logging
DCost monitoring
A security analyst is aware of an active penetration test in the environment. The analyst examines security information and event management (SIEM) log data and notices the following output from the AI system:
Which of the following is the vulnerability that has occurred and the control the analyst should implement?
AThe vulnerability is prompt injection, and the analyst should use endpoint detection response (EDR).
BThe vulnerability is model hallucinations, and the analyst should develop output validations.
CThe vulnerability is jailbreaking, and the analyst should utilize role-based access control.
DThe vulnerability is sensitive information disclosure, and the analyst should employ masking.
EThe vulnerability is role impersonation, and the analyst should use validation.
A security consultant needs to detect attacks across a large language model (LLM) firewall. Which of the following techniques should the consultant use?
ASignature matching
BDistributed denial-of-service
CTranslation analysis
DVulnerability enumeration
Which of the following is most resistant to AI manipulation?
APayloads
BAI-generated content
CApplication programming interface (API) gateway
DAttack surface reduction
EAntivirus
A team of data scientists is ready to release a model for enterprise use. The team wants to protect the model from unintentional changes or tampering. Which of the following is the most appropriate action?
AChange the model to a large language model (LLM) for interactive features with guardrails.
BProvide secure copies of the model for local runtime usage.
CRestrict access to only IT professionals in the organization.
DIntegrate an application programming interface (API) with identity and access management (IAM) roles to interact with the model.
A social media company with more than a million lines of code wants to reduce the mean time to fix bugs and issues. Which of the following is the most balanced AI strategy to automate the vulnerability management flow?
AUsing AI to triage discovered issues and create tickets, but having a software engineer merge software
BHaving security analysts triage discovered issues and create tickets, but using AI to merge software
CHaving security analysts triage discovered issues and create tickets, but having a software engineer merge software
DUsing AI to triage discovered issues, create tickets, and merge software fixes
Which of the following is required first in order to send a prompt query and response in a language model (LLM) system when authentication is enabled?
AFront-end web proxy gateway
BEndpoint access control
CApplication programming interface gateway
DBack-end access gateway
An architect is creating a threat model for an agentic system. Which of the following should the architect do first?
AApply compensating controls based on exposure findings.
BIdentify the trust boundary between the components.
CCalculate the risk to resources based on data sensitivity.
DScan for vulnerabilities from the Open Worldwide Application Security Project (OWASP) Top 10.
A recently deployed AI system becomes persistently unavailable. A restart temporarily fixes the issue, but the issue happens again. Upon examination of application programming interface (API) logs, an analyst finds that external calls continued to use system resources after the action completed.
Which of the following is the best way to improve availability of the system?
ACreating token limits
BEnforcing session expiration
CIncreasing system memory
DImplementing multifactor authentication (MFA)
HOTSPOT -
Instructions -
Use the drop-down menus to define two appropriate security controls for each component of the AI system. Each control may be used only once.
If at any time you would like to bring back the initial state of the simulation please click the Reset All button.
An engineer is deploying a new AI system and wants to integrate it into the core system through an API.
Which of the following attacks would be the best to automate with AI during dynamic application software testing (DAST)?
ADistributed denial-of-service (DDoS)
BData poisoning
CPayload creation
DThreat modeling
A company uses human review for software development validation and wants to add another validation layer. Which of the following should a security administrator use to accomplish task?
AAI-assisted approval
BLow-code plug-in
CAutomated rollback
DRegression testing
Which of the following is the primary purpose of validating data for an AI system?
ATo automate the process
BTo reduce consumption of resources
CTo optimize the storage databases
DTo ensure bias-free outcomes
A cybersecurity analyst wants to choose a machine learning (ML) model to classify log entries while providing the best explainability. Which of the following models should the analyst use?
ALarge language model (LLM)
BNeural networks
CDecision trees
DGenerative adversarial network (GAN)
A security administrator must provide access controls for AI systems to list tables. Which of the following should the administrator implement?
AAgentic AI access
BNetwork access control list (NACL)
CModel access
DData access
A manufacturing company wants to use AI within its operations to improve the efficiency and accuracy of its processes. Which of the following should the organization do first to enable adoption and achieve the business objectives?
AAchieve International Organization for Standardization (ISO) 42001 certification.
BHire a data and AI architect.
CSelect a large language model (LLM).
DIntroduce a generative adversarial network (GAN).