Try 12 ISACA Advanced in AI Security Management (AAISM) sample questions on AI threat modeling, data protection, model access, prompt risk, monitoring, incident response, and secure AI governance, then use the Notify me form for IT Mastery practice updates.
ISACA Advanced in AI Security Management (AAISM) is a focused route for professionals managing AI security risk, controls, monitoring, and incident response.
These original questions preview the decision style a full IT Mastery route should use. They are not official ISACA exam questions.
Topic: prompt injection
A customer-facing AI assistant follows user instructions that override system rules and expose internal policy text. What is the primary risk?
Best answer: B
Explanation: Prompt injection attempts to manipulate the model into ignoring intended instructions or revealing restricted information. Mitigations include input controls, grounding, output filtering, and privilege boundaries.
Topic: data leakage
Developers want to paste production customer records into a public AI tool for troubleshooting. What should security require first?
Best answer: D
Explanation: Sensitive data should not be placed into AI tools without approved handling, privacy, contractual, and security controls.
Topic: model access
An AI model can call backend tools that update customer records. What control is most important?
Best answer: A
Explanation: When AI can invoke tools, security must control what actions are allowed, under which identity, with what authorization, and with what evidence.
Topic: AI incident response
An AI agent sent unauthorized account-change instructions to several users. What should happen first?
Best answer: C
Explanation: AI incidents need containment and evidence preservation. Logs, prompts, outputs, tool calls, and data access records can be critical.
Topic: threat modeling
Which scenario should be included in an AI threat model?
Best answer: B
Explanation: AI threat models should include prompt manipulation, data exfiltration, model abuse, tool misuse, and insecure integrations.
Topic: supply chain
A business team wants to adopt a third-party model API. What should security review?
Best answer: D
Explanation: AI supply-chain risk includes data processing, confidentiality, availability, model behavior, contractual protections, and security posture.
Topic: monitoring
After deployment, the model begins producing responses outside approved policy. What monitoring signal matters most?
Best answer: A
Explanation: AI security monitoring should detect policy violations, unsafe outputs, tool misuse, abnormal access, and drift from approved behavior.
Topic: least privilege
An AI service account has broad read and write access across systems it does not use. What is the best remediation?
Best answer: C
Explanation: Least privilege applies to AI services and tool integrations. Excessive permissions increase blast radius if the model, prompt, or integration is abused.
Topic: model change control
A vendor silently changes the model version used by a regulated workflow. What should the organization require?
Best answer: B
Explanation: Model version changes can affect behavior and risk. Secure management requires notification, validation, approval, and contingency planning.
Topic: human oversight
An AI system recommends high-impact decisions. What control reduces risk?
Best answer: D
Explanation: Human oversight can provide accountability and risk control when outputs affect people, finances, compliance, or safety.
Topic: red teaming
Why run adversarial tests against an AI assistant before launch?
Best answer: A
Explanation: Red-team testing helps identify weaknesses before release. It reduces risk but does not eliminate the need for governance and monitoring.
Topic: governance
Which artifact best supports secure AI operations over time?
Best answer: C
Explanation: An AI inventory or register helps security teams understand exposure, assign accountability, and review controls as systems change.