IsacaIsaca
AAISM · Question #228
AAISM Question #228: Real Exam Question with Answer & Explanation
Sign in or unlock AAISM to reveal the answer and full explanation for question #228. The question stem and answer options stay visible for context.
AI Security Design and Implementation
Question
Which of the following AI system vulnerabilities is MOST easily exploited by adversaries?
Options
- AInaccurate generalizations from new data by the AI model
- BWeak controls for access to the AI model
- CLack of protection against denial of service (DoS) attacks
- DInability to detect input modifications causing inappropriate AI outputs
Unlock AAISM to see the answer
You've previewed enough free AAISM questions. Unlock AAISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Access Control#Vulnerability Management#AI System Security#Exploitation