Pass the CertNexus Certified AI Practitioner AIP-210 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which database is designed to better anticipate and avoid risks of AI systems causing safety, fairness, or other ethical problems?

Options:

A.

Asset


B.

Code Repository


C.

Configuration Management


D.

Incident


Questions # 2:

An HR solutions firm is developing software for staffing agencies that uses machine learning.

The team uses training data to teach the algorithm and discovers that it generates lower employability scores for women. Also, it predicts that women, especially with children, are less likely to get a high-paying job.

Which type of bias has been discovered?

Options:

A.

Automation


B.

Emergent


C.

Preexisting


D.

Technical


Questions # 3:

What is Word2vec?

Options:

A.

A bag of words.


B.

A matrix of how frequently words appear in a group of documents.


C.

A word embedding method that builds a one-hot encoded matrix from samples and the terms that appear in them.


D.

A word embedding method that finds characteristics of words in a very large number of documents.


Questions # 4:

The following confusion matrix is produced when a classifier is used to predict labels on a test dataset. How precise is the classifier?

Question # 4

Options:

A.

48/(48+37)


B.

37/(37+8)


C.

37/(37+7)


D.

(48+37)/100


Questions # 5:

Which two of the following criteria are essential for machine learning models to achieve before deployment? (Select two.)

Options:

A.

Complexity


B.

Data size


C.

Explainability


D.

Portability


E.

Scalability


Questions # 6:

Which two of the following decrease technical debt in ML systems? (Select two.)

Options:

A.

Boundary erosion


B.

Design anti-patterns


C.

Documentation readability


D.

Model complexity


E.

Refactoring


Questions # 7:

What is the open framework designed to help detect, respond to, and remediate threats in ML systems?

Options:

A.

Adversarial ML Threat Matrix


B.

MITRE ATT&CK® Matrix


C.

OWASP Threat and Safeguard Matrix


D.

Threat Susceptibility Matrix


Questions # 8:

Which of the following tools would you use to create a natural language processing application?

Options:

A.

AWS DeepRacer


B.

Azure Search


C.

DeepDream


D.

NLTK


Questions # 9:

You are implementing a support-vector machine on your data, and a colleague suggests you use a polynomial kernel. In what situation might this help improve the prediction of your model?

Options:

A.

When it is necessary to save computational time.


B.

When the categories of the dependent variable are not linearly separable.


C.

When the distribution of the dependent variable is Gaussian.


D.

When there is high correlation among the features.


Questions # 10:

Which of the following can benefit from deploying a deep learning model as an embedded model on edge devices?

Options:

A.

A more complex model


B.

Guaranteed availability of enough space


C.

Increase in data bandwidth consumption


D.

Reduction in latency


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions