CompTIA SecAI+ Beta CY0-001 Exam Questions in PDF

Free CompTIA CY0-001 Dumps Questions (page: 3)

An AI architect reviews AI utilization and wants to improve the user experience. Which of the following should the architect review within the logs?

  1. Rate monitoring
  2. Model accuracy
  3. Access controls
  4. Data storage

Answer(s): B

Explanation:

To improve user experience, the architect should review model accuracy in the logs. High accuracy ensures users receive relevant, reliable responses, directly impacting satisfaction and effectiveness of the AI system.



A human resources officer is using AI to evaluate resumes and help select candidates that meet minimum criteria. To improve the results, the human resources officer adjusts the query parameters and includes an example resume that matches a successful candidate. Which if the following best describes this query?

  1. Distillation
  2. Prompt template
  3. One-shot prompting
  4. System role

Answer(s): C

Explanation:

One-shot prompting provides the model with a single example (in this case, a successful resume) to guide how it should process future inputs. This technique helps the AI better align its output with the desired evaluation criteria.



A line of business wants to onboard an application that uses a custom AI model for employee assessments.

The Chief Information Officer (CIO) agrees to allow the engagement to proceed but first wants a threat model. Which of the following is the most appropriate to use for an AI threat model?

  1. Responsible AI
  2. Adversarial Threat Landscape for AI Systems (ATLAS)
  3. Organization for Economic Co-operation and Development (OECD)
  4. International Organization for Standardization (ISO)

Answer(s): B

Explanation:

ATLAS is specifically designed for creating AI threat models. It catalogs adversarial techniques, tactics, and use cases that target AI systems, making it the most appropriate framework for assessing risks to a custom AI model in employee assessments.



A security analyst finds that the AI system is under a denial-of-wallet attack. Which of the following should the analyst enforce to protect the company? (Choose two.)

  1. Endpoint access controls
  2. Content delivery network (CDN)
  3. Model fine-tuning
  4. Modality controls
  5. Application programming interface (API) rate controls
  6. Output token controls

Answer(s): E,F

Explanation:

API rate controls limit the number of requests within a set timeframe, preventing attackers from overloading the system and driving up costs.
Output token controls restrict the length of responses, reducing unnecessary token usage that attackers might exploit in a denial-of-wallet attack.



A financial organization implements a new AI-based fraud detection system to flag suspicious transactions. A security analyst discovers that it occasionally blocks legitimate transactions. Which of the following is the best recommendation?

  1. Retaining the model with more data and recent transaction patterns
  2. Implementing AI token usage and rate limits
  3. Encrypting all the data processed by AI and applying further access controls
  4. Rolling back the model and using a traditional fraud detection system

Answer(s): A

Explanation:

False positives occur when the AI model lacks sufficient or representative training data. Retraining the model with more diverse and recent transaction patterns improves accuracy, reducing the chance of legitimate transactions being incorrectly flagged.



Which of the following technologies is used in deepfake?

  1. Generative adversarial network (GAN)
  2. Multi-shot prompting
  3. Prompt engineering
  4. Transfer learning

Answer(s): A

Explanation:

Deepfakes are primarily created using GANs, where two neural networks (a generator and a discriminator) compete to produce highly realistic synthetic media, such as manipulated videos or images.



During the selection of a machine learning (ML)-based threat classification model, a cybersecurity administrator verifies that label distribution is highly unbalanced. Which of the following processing techniques should the engineer use to balance the model?

  1. Data lineage
  2. Data augmentation
  3. Data provenance
  4. Data verification

Answer(s): B

Explanation:

When label distribution is highly unbalanced, data augmentation generates additional synthetic samples for the underrepresented classes. This balances the dataset, improving the ML model's ability to classify threats accurately across all categories.



A healthcare organization plans to deploy a chatbot for appointment scheduling and patient records. Which of the following is the first step a security administrator should take?

  1. Implement prompt firewalls.
  2. Enable role-based access management
  3. Conduct a risk assessment.
  4. Use a secure data communication channel for chat.

Answer(s): C

Explanation:

Before deploying an AI chatbot that will handle sensitive healthcare data, the first step is to conduct a risk assessment. This identifies potential threats, compliance requirements (such as HIPAA), and security gaps, ensuring proper controls are planned before implementation.



Share your comments for CompTIA CY0-001 exam with other users:

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

B
Bhavya
9/13/2023 10:15:00 AM

very usefull

R
Rahul Kumar
8/31/2023 12:30:00 PM

need certification.

D
Diran Ole
9/17/2023 5:15:00 PM

great exam prep

V
Venkata Subbarao Bandaru
6/24/2023 8:45:00 AM

i require dump

D
D
7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,

A
Ann
9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks

S
Sridhar
1/16/2024 9:19:00 PM

good questions

S
Summer
10/4/2023 9:57:00 PM

looking forward to the real exam

V
vv
12/2/2023 2:45:00 PM

good ones for exam preparation

D
Danny Zas
9/15/2023 4:45:00 AM

this is a good experience

S
SM 1211
10/12/2023 10:06:00 PM

hi everyone

A
A
10/2/2023 6:08:00 PM

waiting for the dump. please upload.

A
Anonymous
7/16/2023 11:05:00 AM

upload cks exam questions

J
Johan
12/13/2023 8:16:00 AM

awesome training material

P
PC
7/28/2023 3:49:00 PM

where is dump

Y
YoloStar Yoloing
10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.

Z
Zelalem Nega
5/14/2023 12:45:00 PM

please i need if possible h12-831,

U
unknown-R
11/23/2023 7:36:00 AM

good collection of questions and solution for pl500 certification

S
Swaminathan
5/11/2023 9:59:00 AM

i would like to appear the exam.

V
Veenu
10/24/2023 6:26:00 AM

i am very happy as i cleared my comptia a+ 220-1101 exam. i studied from as it has all exam dumps and mock tests available. i got 91% on the test.

K
Karan
5/17/2023 4:26:00 AM

need this dump

R
Ramesh Kutumbaka
12/30/2023 11:17:00 PM

its really good to eventuate knowledge before appearing for the actual exam.

A
anonymous
7/20/2023 10:31:00 PM

this is great

X
Xenofon
6/26/2023 9:35:00 AM

please i want the questions to pass the exam

D
Diego
1/21/2024 8:21:00 PM

i need to pass exam

V
Vichhai
12/25/2023 3:25:00 AM

great, i appreciate it.

P
P Simon
8/25/2023 2:39:00 AM

please could you upload (isc)2 certified in cybersecurity (cc) exam questions

K
Karim
10/8/2023 8:34:00 PM

good questions, wrong answers

I
Itumeleng
1/6/2024 12:53:00 PM

im preparing for exams

M
MS
1/19/2024 2:56:00 PM

question no: 42 isnt azure vm an iaas solution? so, shouldnt the answer be "no"?

K
keylly
11/28/2023 10:10:00 AM

im study azure

D
dorcas
9/22/2023 8:08:00 AM

i need this now

T
treyf
11/9/2023 5:13:00 AM

i took the aws saa-c03 test and scored 935/1000. it has all the exam dumps and important info.

AI Tutor 👋 I’m here to help!