An AI architect reviews AI utilization and wants to improve the user experience. Which of the following should the architect review within the logs?
Answer(s): B
To improve user experience, the architect should review model accuracy in the logs. High accuracy ensures users receive relevant, reliable responses, directly impacting satisfaction and effectiveness of the AI system.
A human resources officer is using AI to evaluate resumes and help select candidates that meet minimum criteria. To improve the results, the human resources officer adjusts the query parameters and includes an example resume that matches a successful candidate. Which if the following best describes this query?
Answer(s): C
One-shot prompting provides the model with a single example (in this case, a successful resume) to guide how it should process future inputs. This technique helps the AI better align its output with the desired evaluation criteria.
A line of business wants to onboard an application that uses a custom AI model for employee assessments.The Chief Information Officer (CIO) agrees to allow the engagement to proceed but first wants a threat model. Which of the following is the most appropriate to use for an AI threat model?
ATLAS is specifically designed for creating AI threat models. It catalogs adversarial techniques, tactics, and use cases that target AI systems, making it the most appropriate framework for assessing risks to a custom AI model in employee assessments.
A security analyst finds that the AI system is under a denial-of-wallet attack. Which of the following should the analyst enforce to protect the company? (Choose two.)
Answer(s): E,F
API rate controls limit the number of requests within a set timeframe, preventing attackers from overloading the system and driving up costs.Output token controls restrict the length of responses, reducing unnecessary token usage that attackers might exploit in a denial-of-wallet attack.
A financial organization implements a new AI-based fraud detection system to flag suspicious transactions. A security analyst discovers that it occasionally blocks legitimate transactions. Which of the following is the best recommendation?
Answer(s): A
False positives occur when the AI model lacks sufficient or representative training data. Retraining the model with more diverse and recent transaction patterns improves accuracy, reducing the chance of legitimate transactions being incorrectly flagged.
Which of the following technologies is used in deepfake?
Deepfakes are primarily created using GANs, where two neural networks (a generator and a discriminator) compete to produce highly realistic synthetic media, such as manipulated videos or images.
During the selection of a machine learning (ML)-based threat classification model, a cybersecurity administrator verifies that label distribution is highly unbalanced. Which of the following processing techniques should the engineer use to balance the model?
When label distribution is highly unbalanced, data augmentation generates additional synthetic samples for the underrepresented classes. This balances the dataset, improving the ML model's ability to classify threats accurately across all categories.
A healthcare organization plans to deploy a chatbot for appointment scheduling and patient records. Which of the following is the first step a security administrator should take?
Before deploying an AI chatbot that will handle sensitive healthcare data, the first step is to conduct a risk assessment. This identifies potential threats, compliance requirements (such as HIPAA), and security gaps, ensuring proper controls are planned before implementation.
Share your comments for CompTIA CY0-001 exam with other users:
i am confused about the answers to the questions. are the answers correct?
very usefull
need certification.
great exam prep
i require dump
good morning, could you please upload this exam again,
hi can you please upload the dumps for sap contingent module. thanks
good questions
looking forward to the real exam
good ones for exam preparation
this is a good experience
hi everyone
waiting for the dump. please upload.
upload cks exam questions
awesome training material
where is dump
q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.
please i need if possible h12-831,
good collection of questions and solution for pl500 certification
i would like to appear the exam.
i am very happy as i cleared my comptia a+ 220-1101 exam. i studied from as it has all exam dumps and mock tests available. i got 91% on the test.
need this dump
its really good to eventuate knowledge before appearing for the actual exam.
this is great
please i want the questions to pass the exam
i need to pass exam
great, i appreciate it.
please could you upload (isc)2 certified in cybersecurity (cc) exam questions
good questions, wrong answers
im preparing for exams
question no: 42 isnt azure vm an iaas solution? so, shouldnt the answer be "no"?
im study azure
i need this now
i took the aws saa-c03 test and scored 935/1000. it has all the exam dumps and important info.