Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CertNexus AIP-210 - CertNexus Certified Artificial Intelligence Practitioner (CAIP)

Page: 1 / 3
Total 90 questions

What is the primary benefit of the Federated Learning approach to machine learning?

A.

It does not require a labeled dataset to solve supervised learning problems.

B.

It protects the privacy of the user's data while providing well-trained models.

C.

It requires less computation to train the same model using a traditional approach.

D.

It uses large, centralized data stores to train complex machine learning models.

What is Word2vec?

A.

A bag of words.

B.

A matrix of how frequently words appear in a group of documents.

C.

A word embedding method that builds a one-hot encoded matrix from samples and the terms that appear in them.

D.

A word embedding method that finds characteristics of words in a very large number of documents.

Which of the following regressions will help when there is the existence of near-linear relationships among the independent variables (collinearity)?

A.

Clustering

B.

Linear regression

C.

Polynomial regression

D.

Ridge regression

Which of the following pieces of AI technology provides the ability to create fake videos?

A.

Generative adversarial networks (GAN)

B.

Long short-term memory (LSTM) networks

C.

Recurrent neural networks (RNN)

D.

Support-vector machines (SVM)

Which of the following text vectorization methods is appropriate and correctly defined for an English-to-Spanish translation machine?

A.

Using TF-IDF because in translation machines, we do not care about the order of the words.

B.

Using TF-IDF because in translation machines, we need to consider the order of the words.

C.

Using Word2vec because in translation machines, we do not care about the order of the words.

D.

Using Word2vec because in translation machines, we need to consider the order of the words.

Which of the following best describes distributed artificial intelligence?

A.

It does not require hyperparemeter tuning because the distributed nature accounts for the bias.

B.

It intelligently pre-distributes the weight of starting a neural network.

C.

It relies on a distributed system that performs robust computations across a network of unreliable nodes.

D.

It uses a centralized system to speak to decentralized nodes.

A big data architect needs to be cautious about personally identifiable information (PII) that may be captured with their new IoT system. What is the final stage of the Data Management Life Cycle, which the architect must complete in order to implement data privacy and security appropriately?

A.

De-Duplicate

B.

Destroy

C.

Detain

D.

Duplicate

Why do data skews happen in the ML pipeline?

A.

Test and evaluation data are designed incorrectly.

B.

There Is a mismatch between live input data and offline data.

C.

There is a mismatch between live output data and offline data.

D.

There is insufficient training data for evaluation.

In addition to understanding model performance, what does continuous monitoring of bias and variance help ML engineers to do?

A.

Detect hidden attacks

B.

Prevent hidden attacks

C.

Recover from hidden attacks

D.

Respond to hidden attacks

What is the open framework designed to help detect, respond to, and remediate threats in ML systems?

A.

Adversarial ML Threat Matrix

B.

MITRE ATT&CK® Matrix

C.

OWASP Threat and Safeguard Matrix

D.

Threat Susceptibility Matrix