Big Cyber Monday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CT-AI Questions and Answers

Question # 6

Which statement about testing levels for AI-based systems is correct?

Choose ONE option (1 out of 4)

A.

Input data testing checks whether the inputs from the data pipeline are received by the model correctly and exchanged with all system components

B.

Acceptance testing checks non-functional requirements such as explainability

C.

ML model testing ensures that the relevant ML functional performance criteria are met

D.

If AI is offered as a service, system testing includes API tests of the service

Full Access
Question # 7

Which statement regarding the use of training, validation, and test data sets is correct?

Choose ONE option (1 out of 4)

A.

If only limited data is available, validation and test data sets can be combined in multiple ways during training.

B.

If limited data is available, it may be better to work without a separate test data set.

C.

Optimally, the data should be distributed equally between the training, validation, and test data sets.

D.

The data in the test data set must be equivalent to the data in the training data sets and to the data in the validation data sets.

Full Access
Question # 8

A tourist calls an airline to book a ticket and is connected with an automated system which is able to recognize speech, understand requests related to purchasing a ticket, and provide relevant travel options. When the tourist asks about the expected weather at the destination or potential impacts on operations because of the tight labor market, the only response from the automated system is, "I don’t understand your question."

This AI system should be categorized as?

A.

General AI

B.

Narrow AI

C.

Super AI

D.

Conventional AI

Full Access
Question # 9

Which of the following neural network coverage criteria can be adapted for its application?

Choose ONE option (1 out of 4)

A.

Sign–Sign coverage

B.

Sign–Change coverage

C.

Threshold coverage

D.

Neuron coverage

Full Access
Question # 10

Which ONE of the following activities is MOST relevant when addressing the scenario where you have more than the required amount of data available for the training?

SELECT ONE OPTION

A.

Feature selection

B.

Data sampling

C.

Data labeling

D.

Data augmentation

Full Access
Question # 11

Which of the following statements about reinforcement learning is correct?

Choose ONE option (1 out of 4)

A.

The agent creates a model of the environment from labeled data during training

B.

The approach is suitable when the application doesnotrequire interaction with the environment

C.

The agent’s training is based on a reward function that rewards successful attempts

D.

From experience, the agent learns theoptimal reward function

Full Access
Question # 12

Which statement about using AI to analyze reported defects is MOST correct?

Choose ONE option (1 out of 4)

A.

ML models trained with critical defect tickets can identify defects that cause serious consequences.

B.

ML models can support duplicate defect identification when checking defect criticality.

C.

ML models can identify categories for a reported defect during assignment.

D.

ML models identify developers who should handle a defect based on ticket content.

Full Access
Question # 13

There is a growing backlog of unresolved defects for your project. You know the developers have an ML model that they have created which has learned which developers work on which type of software and the speed with which they resolve issues. How could you use this model to help reduce the backlog and implement more efficient defect resolution?

A.

Use it to prioritize defects automatically based on the time expected for the fix to be made, the speed of the fix, and the likelihood of regressions

B.

Use it to assign defects to the best developer to resolve the problem and to load balance the defect assignments among the developers

C.

Use it to determine the root cause of each defect and develop a process improvement plan that can be implemented to remove the most common root causes

D.

Use it to review the code and determine where more defects are likely to occur so that testing can be targeted to those areas

Full Access
Question # 14

Which ONE of the following tests is LEAST likely to be performed during the ML model testing phase?

SELECT ONE OPTION

A.

Testing the accuracy of the classification model.

B.

Testing the API of the service powered by the ML model.

C.

Testing the speed of the training of the model.

D.

Testing the speed of the prediction by the model.

Full Access
Question # 15

A bank wants to use an algorithm to determine which applicants should be given a loan. The bank hires a data scientist to construct a logistic regression model to predict whether the applicant will repay the loan or not. The bank has enough data on past customers to randomly split the data into a training dataset and a test/validation dataset. A logistic regression model is constructed on the training dataset using the following independent variables:

    Gender

    Marital status

    Number of dependents

    Education

    Income

    Loan amount

    Loan term

    Credit score

The model reveals that those with higher credit scores and larger total incomes are more likely to repay their loans. The data scientist has suggested that there might be bias present in the model based on previous models created for other banks.

Given this information, what is the best test approach to check for potential bias in the model?

A.

Experience-based testing should be used to confirm that the training data set is operationally relevant. This can include applying exploratory data analysis (EDA) to check for bias within the training data set.

B.

Back-to-back testing should be used to compare the model created using the training data set to another model created using the test data set. If the two models significantly differ, it will indicate there is bias in the original model.

C.

Acceptance testing should be used to make sure the algorithm is suitable for the customer. The team can re-work the acceptance criteria such that the algorithm is sure to correctly predict the remaining applicants that have been set aside for the validation dataset ensuring no bias is present.

D.

A/B testing should be used to verify that the test data set does not detect any bias that might have been introduced by the original training data. If the two models significantly differ, it will indicate there is bias in the original model.

Full Access
Question # 16

Which data-labeling approach uses a two-step process where labeling is first done by a tool and then verified or completed by a human?

Choose ONE option (1 out of 4)

A.

Internal data labeling

B.

Crowdsourced data labeling

C.

Outsourced data labeling

D.

AI-assisted data labeling

Full Access
Question # 17

Which option describes a reasonable application of AIB testing for a self-learning system after it has changed its behavior due to user input?

Choose ONE option (1 out of 4)

A.

Generating test cases for the system before and after the change, since neither has a test oracle

B.

Comparing outputs before and after the change using different inputs

C.

Comparing outputs before and after the change using identical inputs

D.

Comparing outputs of a non-self-learning system with those of the changed self-learning system

Full Access
Question # 18

Data used for an object detection ML system was found to have been labelled incorrectly in many cases.

Which ONE of the following options is most likely the reason for this problem?

SELECT ONE OPTION

A.

Security issues

B.

Accuracy issues

C.

Privacy issues

D.

Bias issues

Full Access
Question # 19

Which option gives the correct values for accuracy and precision from the confusion matrix?

Choose ONE option (1 out of 4)

A.

Accuracy = 50%, Precision = 75%

B.

Accuracy = 80%, Precision = 75%

C.

Accuracy = 75%, Precision = 80%

D.

Accuracy = 80%, Precision = 50%

Full Access
Question # 20

Which of the following is an example of overfitting?

A.

The model is not able to generalize to accommodate new types of data

B.

The model is too simplistic for the data

C.

The model is missing relationships between the inputs and outputs

D.

The model discards data it considers to be noise or outliers

Full Access
Question # 21

“BioSearch” is creating an Al model used for predicting cancer occurrence via examining X-Ray images. The accuracy of the model in isolation has been found to be good. However, the users of the model started complaining of the poor quality of results, especially inability to detect real cancer cases, when put to practice in the diagnosis lab, leading to stopping of the usage of the model.

A testing expert was called in to find the deficiencies in the test planning which led to the above scenario.

Which ONE of the following options would you expect to MOST likely be the reason to be discovered by the test expert?

SELECT ONE OPTION

A.

A lack of similarity between the training and testing data.

B.

The input data has not been tested for quality prior to use for testing.

C.

A lack of focus on choosing the right functional-performance metrics.

D.

A lack of focus on non-functional requirements testing.

Full Access
Question # 22

Which of the following is THE LEAST appropriate tests to be performed for testing a feature related to autonomy?

SELECT ONE OPTION

A.

Test for human handover to give rest to the system.

B.

Test for human handover when it should actually not be relinquishing control.

C.

Test for human handover requiring mandatory relinquishing control.

D.

Test for human handover after a given time interval.

Full Access
Question # 23

Which ONE of the following statements is a CORRECT adversarial example in the context of machine learning systems that are working on image classifiers.

SELECT ONE OPTION

A.

Black box attacks based on adversarial examples create an exact duplicate model of the original.

B.

These attack examples cause a model to predict the correct class with slightly less accuracy even though they look like the original image.

C.

These attacks can't be prevented by retraining the model with these examples augmented to the training data.

D.

These examples are model specific and are not likely to cause another model trained on same task to fail.

Full Access
Question # 24

You are using a neural network to train a robot vacuum to navigate without bumping into objects. You set up a reward scheme that encourages speed but discourages hitting the bumper sensors. Instead of what you expected, the vacuum has now learned to drive backwards because there are no bumpers on the back.

This is an example of what type of behavior?

A.

Error-shortcircuiting

B.

Reward-hacking

C.

Transparency

D.

Interpretability

Full Access
Question # 25

Which of the following are the three activities in the data acquisition activities for data preparation?

A.

Cleaning, transforming, augmenting

B.

Feature selecting, feature growing, feature augmenting

C.

Identifying, gathering, labelling

D.

Building, approving, deploying

Full Access
Question # 26

The activation value output for a neuron in a neural network is obtained by applying computation to the neuron.

Which ONE of the following options BEST describes the inputs used to compute the activation value?

SELECT ONE OPTION

A.

Individual bias at the neuron level, activation values of neurons in the previous layer, and weights assigned to the connections between the neurons.

B.

Activation values of neurons in the previous layer, and weights assigned to the connections between the neurons.

C.

Individual bias at the neuron level, and weights assigned to the connections between the neurons.

D.

Individual bias at the neuron level, and activation values of neurons in the previous layer.

Full Access
Question # 27

Which of the following decisions is BEST as a test approach for the described situation?

Choose ONE option (1 out of 4)

A.

You plan to manually execute regular regression tests of the new camera function, particularly for system tests.

B.

You execute the test cases from the old camera model at the integration test level; no further dynamic tests of the operating data pipeline are necessary.

C.

You plan experience-based testing by the entire team at the system test level to ensure that the end users are satisfied.

D.

You plan to perform reviews and exploratory data analysis of the image data sets to reduce the risk of a lack of representativeness of this data.

Full Access
Question # 28

Which ONE of the following types of coverage SHOULD be used if test cases need to cause each neuron to achieve both positive and negative activation values?

SELECT ONE OPTION

A.

Value coverage

B.

Threshold coverage

C.

Sign change coverage

D.

Neuron coverage

Full Access
Question # 29

Which statement regarding AI for defect prediction is correct?

Choose ONE option (1 out of 4)

A.

AI-based defect prediction is most effective when based on previous similar constellations.

B.

AI-based defect prediction can detect whether defects exist but not where.

C.

AI-based defect prediction is most effective when based on source-code metrics such as branches or McCabe complexity.

D.

AI-based defect prediction is based on formal principles and requires only a few factors.

Full Access
Question # 30

Which ONE of the following options is an example that BEST describes a system with Al-based autonomous functions?

SELECT ONE OPTION

A.

A system that utilizes human beings for all important decisions.

B.

A fully automated manufacturing plant that uses no software.

C.

A system that utilizes a tool like Selenium.

D.

A system that is fully able to respond to its environment.

Full Access
Question # 31

Which statement regarding testing transparency, explainability, or interpretability is MOST correct?

Choose ONE option (1 out of 4)

A.

Tests for explainability and transparency are comparable to exploratory testing and can be performed with little information about development

B.

Since different users have different backgrounds, interpretability testing depends on the comprehensibility of the ML algorithm

C.

Dynamic testing is one way to quantify explainability; however, each method is specific to a particular model type

D.

LIME can precisely state the decisive reason for a change in the output

Full Access
Question # 32

A wildlife conservation group would like to use a neural network to classify images of different animals. The algorithm is going to be used on a social media platform to automatically pick out pictures of the chosen animal of the month. This month’s animal is set to be a wolf. The test team has already observed that the algorithm could classify a picture of a dog as being a wolf because of the similar characteristics between dogs and wolves. To handle such instances, the team is planning to train the model with additional images of wolves and dogs so that the model is able to better differentiate between the two.

What test method should you use to verify that the model has improved after the additional training?

A.

Metamorphic testing because the application domain is not clearly understood at this point

B.

Adversarial testing to verify that no incorrect images have been used in the training

C.

Pairwise testing using combinatorics to look at a long list of photo parameters

D.

Back-to-back testing using the version of the model before training and the new version of the model after being trained with additional images

Full Access
Question # 33

Consider a natural language processing (NLP) algorithm that attempts to predict the next word that you would like to type in a text message. An update to the algorithm has been created that should increase the accuracy of the predictions based on user typing patterns. The old algorithm was rated for accuracy by the users. Then, after the new update was released, the users rated the updated algorithm. A statistical test was used to compare the two versions of the algorithm to see whether or not the update should remain in place.

This is an example of what type of testing?

A.

Metamorphic testing

B.

A/B testing

C.

Exploratory testing

D.

Pairwise testing

Full Access
Question # 34

Which ONE of the following is the BEST option to optimize the regression test selection and prevent the regression suite from growing large?

SELECT ONE OPTION

A.

Identifying suitable tests by looking at the complexity of the test cases.

B.

Using of a random subset of tests.

C.

Automating test scripts using Al-based test automation tools.

D.

Using an Al-based tool to optimize the regression test suite by analyzing past test results

Full Access
Question # 35

Which statement about testing to prevent data poisoning and adversarial attacks is correct?

Choose ONE option (1 out of 4)

A.

Regression testing can be used to verify data sourcing policies to ensure the source of training data.

B.

The adversarial examples identified during adversarial testing must not be added to the training data so that they do not poison the model.

C.

Adversarial testing consists of using adversarial attacks to identify vulnerabilities so that they can be eliminated.

D.

Using AIB testing to identify data poisoning can better identify outliers than exploratory data analysis.

Full Access
Question # 36

Which AI-specific test objective and acceptance criterion should be selected MOST LIKELY for testing GPT_Legal?

Choose ONE option (1 out of 4)

A.

Test objective: Evidence of functional safety

 Acceptance criterion: The system recognizes failures in the transmission of information and data with the DPMA system and the evaluation system by means of self-tests.

B.

Test objective: Evidence of evolution

 Acceptance criterion: The quality of the research results does not deteriorate with further training.

C.

Test objective: Evidence of compatibility

 Acceptance criterion: The system can exchange information with the DPMA system and the evaluation system.

D.

Test objective: Evidence that the data is free from inappropriate bias

 Acceptance criterion: The DPMA’s analysis data is statistically compared to data from other sources.

Full Access