Big Halloween Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CertNexus AIP-210 Practice Exam with Questions & Answers | Set: 3

Questions 21

You train a neural network model with two layers, each layer having four nodes, and realize that the model is underfit. Which of the actions below will NOT work to fix this underfitting?

Options:
A.

Add features to training data

B.

Get more training data

C.

Increase the complexity of the model

D.

Train the model for more epochs

CertNexus AIP-210 Premium Access
Questions 22

Which of the following items should be included in a handover to the end user to enable them to use and run a trained model on their own system? (Select three.)

Options:
A.

Information on the folder structure in your local machine

B.

Intermediate data files

C.

Link to a GitHub repository of the codebase

D.

README document

E.

Sample input and output data files

Questions 23

Which of the following is a privacy-focused law that an AI practitioner should adhere to while designing and adapting an AI system that utilizes personal data?

Options:
A.

General Data Protection Regulation (GDPR)

B.

ISO/IEC 27001

C.

PCIDSS

D.

Sarbanes Oxley (SOX)

Questions 24

Which of the following is TRUE about SVM models?

Options:
A.

They can be used only for classification.

B.

They can be used only for regression.

C.

They can take the feature space into higher dimensions to solve the problem.

D.

They use the sigmoid function to classify the data points.

Questions 25

Which three security measures could be applied in different ML workflow stages to defend them against malicious activities? (Select three.)

Options:
A.

Disable logging for model access.

B.

Launch ML Instances In a virtual private cloud (VPC).

C.

Monitor model degradation.

D.

Use data encryption.

E.

Use max privilege to control access to ML artifacts.

F.

Use Secrets Manager to protect credentials.

Questions 26

A big data architect needs to be cautious about personally identifiable information (PII) that may be captured with their new IoT system. What is the final stage of the Data Management Life Cycle, which the architect must complete in order to implement data privacy and security appropriately?

Options:
A.

De-Duplicate

B.

Destroy

C.

Detain

D.

Duplicate

Questions 27

Which of the following describes a benefit of machine learning for solving business problems?

Options:
A.

Increasing the quantity of original data

B.

Increasing the speed of analysis

C.

Improving the constraint of the problem

D.

Improving the quality of original data