A security operations center (SOC) analyst needs to automate multiple security tasks by breaking them down into smaller parts. Which of the following AI tools is the best for this task?
Answer : A
Which of the following responsible AI standards refers to a principle that clearly states the reasons behind the decisions for a particular conclusion?
Answer : D
A detection engineering team wants to use AI to automatically prevent vulnerable code from reaching production. Which of the following is the most effective way to accomplish this task?
Answer : C
A penetration tester is assessing the controls of a deployed AI system that is designed to search and return the contents of files. The tester runs the following:
Which of the following is the best control to prevent abuse of the system?
Answer : D
A customer-facing, AI-powered chatbot has been jailbroken through prompt injections. As a result, the AI model is offering a 99% discount on the purchase of a new vehicle. Which of the following should be implemented to enhance the model’s robustness against such attacks?
Answer : D
User experience is declining since the launch of a large language model (LLM) in internal networks. Which of the following should be the highest priority for the prompt engineers?
Answer : C
A data set containing medical information is put into a machine learning (ML) model that is designed to predict specific illnesses for a population. In the process of verifying the reliability of the system, the compliance officer realizes that the system cannot reliably predict illnesses for certain segments of the population. Which of the following types of risk is most applicable to this case?
Answer : A
An organization is concerned with the exposure of sensitive data. Which of the following is the most relevant security concern?
Answer : B
Faculty members at a university are concerned about potential inherent bias and inconsistency in one department’s AI plagiarism detection service.
Which of the following principles will most likely to address their concerns?
Answer : C
A security administrator must provide access controls for AI systems to list tables. Which of the following should the administrator implement?
Answer : D
A machine learning (ML) engineer is working with a security engineer to identify the best practices for securing a system with various AI models.
Which of the following actions should the engineers suggest?
Answer : B
Which of the following is an example of how a security analyst uses generative AI in the triage process?
Answer : C
A company develops an AI model to diagnose patients. Hospitals access the model through an integrated application programming interface (API). The security team performs a denial-of-service (DoS) attack via brute force on the model. Which of the following controls would have prevented this issue?
Answer : C
A security team is using an AI-based tool to try to bypass organizational boundaries. The team uses AI to look at the current state and suggest different attack vectors based on the outcome of the previous ones. Which of the following techniques is the team most likely using?
Answer : D
Which of the following attacks would be the best to automate with AI during dynamic application software testing (DAST)?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us