View Mode
Q: 11
Integration of a Generative AI agent within a corporate Slack environment allows it to manage project permissions and modify Jira tickets based on natural language requests. During a security audit, logs indicate that the agent upgraded an external contractor's access to Project Admin status after receiving an indirect prompt injection embedded in a shared document. This event highlights a failure in restricting the agent's autonomous capabilities within the production environment. Which of the following mitigation strategies BEST addresses the underlying risk of Excessive Agency in this scenario?
Options
Q: 12
A financial services organization is establishing a Security Operations Center (SOC) strategy for monitoring AI-related threats. The compliance team is specifically concerned about the accidental data leakage of customer financial records through the various stages of the Machine Learning (ML) pipeline and deployment. Which of the following represent common vectors for accidental data leakage in AI systems? (Select TWO).
Options
Q: 13

Several core activities define the eeicacy of AI-facilitated threat modeling within an enterprise environment. Consider the following tasks:

I. Automated identification of trust boundaries. II. Generation of attack trees based on architectural inputs. III. Real-time patching of bueer overflow vulnerabilities. IV. Prioritization of threats using established frameworks like DREAD. Which of these tasks can be eeectively facilitated by current AI-enabled threat modeling tools?

Options
Q: 14
Deployment of a new microservices architecture requires frequent Infrastructure-as-Code (IaC) updates, leading to a high volume of change requests. The security team integrates a specialized machine learning model into the CI/CD pipeline to perform automated impact analysis on these proposed modifications before they reach production. The model is trained on historical incident data and baseline configuration telemetry to identify high-risk patterns. Which of the following represents the PRIMARY security benefit of utilizing AI-driven predictive modeling in this change management context?
Options
Q: 15
Social media backlash occurs after a customer-facing LLM produces biased medical advice, leading to a significant drop in user trust and brand equity. The incident highlights a failure in the organization's AI TRiSM strategy during the deployment of Generative AI tools. Which of the following actions BEST addresses the long-term mitigation of this Reputational Loss?
Options
Q: 16
Security researchers investigating a newly deployed internal developer assistant notice that the model frequently suggests non-existent libraries and deprecated cryptographic functions when asked to generate secure Python code. The system currently relies on a Large Language Model (LLM) without any external data connections, leading to confident but factually incorrect outputs that could introduce vulnerabilities into the production pipeline. Which of the following architectural changes would BEST mitigate the risk of these hallucinations while ensuring the model provides up-to-date security recommendations?
Options
Q: 17

Consider the following statements regarding the evaluation of Machine Learning models used for threat detection.

I. Precision measures the ratio of True Positives to the total number of positive predictions. II. Recall measures the model’s ability to identify all actual instances of a threat within a dataset. III. Accuracy is always the most reliable metric for evaluating models on imbalanced security datasets. IV. The Confusion Matrix is a tool used to visualize the performance of a classification model. Which of the following combinations of statements is correct?

Options
Q: 18

Evaluate the following statements regarding the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) framework:

I. It is modeled after the MITRE ATT&CK framework structure to facilitate cross-domain threat analysis. II. It includes tactics such as ML Model Access and Exfiltration to describe AI-specific attack goals. III. It focuses solely on the defense of Generative AI and Large Language Models (LLMs). Which of the following combinations is correct?

Options
Q: 19
Integrating automated adversarial robustness testing within a CI/CD pipeline allows a security team to evaluate if an AI model is susceptible to evasion attacks by programmatically injecting perturbed samples during the build process to verify the model's defensive accuracy before deployment. Is the statement above true or false?
Options
Q: 20
When implementing AI cost monitoring for Processing, an organization decides to rely exclusively on the Cloud Service Provider's (CSP) monthly billing reports to detect adversarial prompt injections that trigger infinite recursive loops in an autonomous agent. Is this monitoring strategy sueicient to detect and mitigate the security risk in a timely manner?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE