Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

AIP-210 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

AIP-210 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CertNexus Certified Artificial Intelligence Practitioner (CAIP)
  • Last Update: May 8, 2024
  • Questions and Answers: 90
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

AIP-210 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

AIP-210 Practice Exam Questions with Answers CertNexus Certified Artificial Intelligence Practitioner (CAIP) Certification

Question # 6

Which database is designed to better anticipate and avoid risks of AI systems causing safety, fairness, or other ethical problems?

A.

Asset

B.

Code Repository

C.

Configuration Management

D.

Incident

Full Access
Question # 7

Workflow design patterns for the machine learning pipelines:

A.

Aim to explain how the machine learning model works.

B.

Represent a pipeline with directed acyclic graph (DAG).

C.

Seek to simplify the management of machine learning features.

D.

Separate inputs from features.

Full Access
Question # 8

Which of the following is a privacy-focused law that an AI practitioner should adhere to while designing and adapting an AI system that utilizes personal data?

A.

General Data Protection Regulation (GDPR)

B.

ISO/IEC 27001

C.

PCIDSS

D.

Sarbanes Oxley (SOX)

Full Access
Question # 9

Which two of the following decrease technical debt in ML systems? (Select two.)

A.

Boundary erosion

B.

Design anti-patterns

C.

Documentation readability

D.

Model complexity

E.

Refactoring

Full Access
Question # 10

Your dependent variable Y is a count, ranging from 0 to infinity. Because Y is approximately log-normally distributed, you decide to log-transform the data prior to performing a linear regression.

What should you do before log-transforming Y?

A.

Add 1 to all of the Y values.

B.

Divide all the Y values by the standard deviation of Y.

C.

Explore the data for outliers.

D.

Subtract the mean of Y from all the Y values.

Full Access
Question # 11

An AI system recommends New Year's resolutions. It has an ML pipeline without monitoring components. What retraining strategy would be BEST for this pipeline?

A.

Periodically before New Year's Day and after New Year's Day

B.

Periodically every year

C.

When concept drift is detected

D.

When data drift is detected

Full Access
Question # 12

Which of the following sentences is true about model evaluation and model validation in ML pipelines?

A.

Model evaluation and validation are the same.

B.

Model evaluation is defined as an external component.

C.

Model validation is defined as a set of tasks to confirm the model performs as expected.

D.

Model validation occurs before model evaluation.

Full Access
Question # 13

Which three security measures could be applied in different ML workflow stages to defend them against malicious activities? (Select three.)

A.

Disable logging for model access.

B.

Launch ML Instances In a virtual private cloud (VPC).

C.

Monitor model degradation.

D.

Use data encryption.

E.

Use max privilege to control access to ML artifacts.

F.

Use Secrets Manager to protect credentials.

Full Access
Question # 14

What is the open framework designed to help detect, respond to, and remediate threats in ML systems?

A.

Adversarial ML Threat Matrix

B.

MITRE ATT&CK® Matrix

C.

OWASP Threat and Safeguard Matrix

D.

Threat Susceptibility Matrix

Full Access
Question # 15

A big data architect needs to be cautious about personally identifiable information (PII) that may be captured with their new IoT system. What is the final stage of the Data Management Life Cycle, which the architect must complete in order to implement data privacy and security appropriately?

A.

De-Duplicate

B.

Destroy

C.

Detain

D.

Duplicate

Full Access
Question # 16

For a particular classification problem, you are tasked with determining the best algorithm among SVM, random forest, K-nearest neighbors, and a deep neural network. Each of the algorithms has similar accuracy on your data. The stakeholders indicate that they need a model that can convey each feature's relative contribution to the model's accuracy. Which is the best algorithm for this use case?

A.

Deep neural network

B.

K-nearest neighbors

C.

Random forest

D.

SVM

Full Access
Question # 17

A classifier has been implemented to predict whether or not someone has a specific type of disease. Considering that only 1% of the population in the dataset has this disease, which measures will work the BEST to evaluate this model?

A.

Mean squared error

B.

Precision and accuracy

C.

Precision and recall

D.

Recall and explained variance

Full Access
Question # 18

A change in the relationship between the target variable and input features is

A.

concept drift.

B.

covariate shift.

C.

data drift.

D.

model decay.

Full Access
Question # 19

You are building a prediction model to develop a tool that can diagnose a particular disease so that individuals with the disease can receive treatment. The treatment is cheap and has no side effects. Patients with the disease who don't receive treatment have a high risk of mortality.

It is of primary importance that your diagnostic tool has which of the following?

A.

High negative predictive value

B.

High positive predictive value

C.

Low false negative rate

D.

Low false positive rate

Full Access
Question # 20

Which of the following is the definition of accuracy?

A.

(True Positives + False Positives) / Total Predictions

B.

(True Positives + True Negatives) / Total Predictions

C.

True Positives / (True Positives + False Negatives)

D.

True Positives / (True Positives + False Positives)

Full Access
Question # 21

When should the model be retrained in the ML pipeline?

A.

A new monitoring component is added.

B.

Concept drift is detected in the pipeline.

C.

More data become available for the training phase.

D.

Some outliers are detected in live data.

Full Access
Question # 22

Which of the following sentences is TRUE about the definition of cloud models for machine learning pipelines?

A.

Data as a Service (DaaS) can host the databases providing backups, clustering, and high availability.

B.

Infrastructure as a Service (IaaS) can provide CPU, memory, disk, network and GPU.

C.

Platform as a Service (PaaS) can provide some services within an application such as payment applications to create efficient results.

D.

Software as a Service (SaaS) can provide AI practitioner data science services such as Jupyter notebooks.

Full Access
Question # 23

Which of the following pieces of AI technology provides the ability to create fake videos?

A.

Generative adversarial networks (GAN)

B.

Long short-term memory (LSTM) networks

C.

Recurrent neural networks (RNN)

D.

Support-vector machines (SVM)

Full Access
Question # 24

Which of the following is the primary purpose of hyperparameter optimization?

A.

Controls the learning process of a given algorithm

B.

Makes models easier to explain to business stakeholders

C.

Improves model interpretability

D.

Increases recall over precision

Full Access
Question # 25

Which of the following approaches is best if a limited portion of your training data is labeled?

A.

Dimensionality reduction

B.

Probabilistic clustering

C.

Reinforcement learning

D.

Semi-supervised learning

Full Access