New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CertNexus AIP-210 CertNexus Certified Artificial Intelligence Practitioner (CAIP) Exam Practice Test

Page: 1 / 9
Total 90 questions

CertNexus Certified Artificial Intelligence Practitioner (CAIP) Questions and Answers

Question 1

Workflow design patterns for the machine learning pipelines:

Options:

A.

Aim to explain how the machine learning model works.

B.

Represent a pipeline with directed acyclic graph (DAG).

C.

Seek to simplify the management of machine learning features.

D.

Separate inputs from features.

Question 2

Which of the following sentences is true about model evaluation and model validation in ML pipelines?

Options:

A.

Model evaluation and validation are the same.

B.

Model evaluation is defined as an external component.

C.

Model validation is defined as a set of tasks to confirm the model performs as expected.

D.

Model validation occurs before model evaluation.

Question 3

Which two of the following criteria are essential for machine learning models to achieve before deployment? (Select two.)

Options:

A.

Complexity

B.

Data size

C.

Explainability

D.

Portability

E.

Scalability

Question 4

Which of the following describes a neural network without an activation function?

Options:

A.

A form of a linear regression

B.

A form of a quantile regression

C.

An unsupervised learning technique

D.

A radial basis function kernel

Question 5

An organization sells house security cameras and has asked their data scientists to implement a model to detect human feces, as distinguished from animals, so they can alert th customers only when a human gets close to their house.

Which of the following algorithms is an appropriate option with a correct reason?

Options:

A.

A decision tree algorithm, because the problem is a classification problem with a small number of features.

B.

k-means, because this is a clustering problem with a small number of features.

C.

Logistic regression, because this is a classification problem and our data is linearly separable.

D.

Neural network model, because this is a classification problem with a large number of features.

Question 6

Which of the following best describes distributed artificial intelligence?

Options:

A.

It does not require hyperparemeter tuning because the distributed nature accounts for the bias.

B.

It intelligently pre-distributes the weight of starting a neural network.

C.

It relies on a distributed system that performs robust computations across a network of unreliable nodes.

D.

It uses a centralized system to speak to decentralized nodes.

Question 7

An AI system recommends New Year's resolutions. It has an ML pipeline without monitoring components. What retraining strategy would be BEST for this pipeline?

Options:

A.

Periodically before New Year's Day and after New Year's Day

B.

Periodically every year

C.

When concept drift is detected

D.

When data drift is detected

Question 8

You create a prediction model with 96% accuracy. While the model's true positive rate (TPR) is performing well at 99%, the true negative rate (TNR) is only 50%. Your supervisor tells you that the TNR needs to be higher, even if it decreases the TPR. Upon further inspection, you notice that the vast majority of your data is truly positive.

What method could help address your issue?

Options:

A.

Normalization

B.

Oversampling

C.

Principal components analysis

D.

Quality filtering

Question 9

Which of the following is the primary purpose of hyperparameter optimization?

Options:

A.

Controls the learning process of a given algorithm

B.

Makes models easier to explain to business stakeholders

C.

Improves model interpretability

D.

Increases recall over precision

Question 10

In general, models that perform their tasks:

Options:

A.

Less accurately are less robust against adversarial attacks.

B.

Less accurately are neither more nor less robust against adversarial attacks.

C.

More accurately are less robust against adversarial attacks.

D.

More accurately are neither more nor less robust against adversarial attacks.

Question 11

Which of the following principles supports building an ML system with a Privacy by Design methodology?

Options:

A.

Avoiding mechanisms to explain and justify automated decisions.

B.

Collecting and processing the largest amount of data possible.

C.

Understanding, documenting, and displaying data lineage.

D.

Utilizing quasi-identifiers and non-unique identifiers, alone or in combination.

Question 12

A big data architect needs to be cautious about personally identifiable information (PII) that may be captured with their new IoT system. What is the final stage of the Data Management Life Cycle, which the architect must complete in order to implement data privacy and security appropriately?

Options:

A.

De-Duplicate

B.

Destroy

C.

Detain

D.

Duplicate

Question 13

Which two techniques are used to build personas in the ML development lifecycle? (Select two.)

Options:

A.

Population estimates

B.

Population regression

C.

Population resampling

D.

Population triage

E.

Population variance

Question 14

Question # 14

The graph is an elbow plot showing the inertia or within-cluster sum of squares on the y-axis and number of clusters (also called K) on the x-axis, denoting the change in inertia as the clusters change using k-means algorithm.

What would be an optimal value of K to ensure a good number of clusters?

Options:

A.

2

B.

3

C.

5

D.

9

Question 15

Below are three tables: Employees, Departments, and Directors.

Employee_Table

Question # 15

Department_Table

Question # 15

Director_Table

ID

Firstname

Lastname

Age

Salary

DeptJD

4566

Joey

Morin

62

$ 122,000

1

1230

Sam

Clarck

43

$ 95,670

2

9077

Lola

Russell

54

$ 165,700

3

1346

Lily

Cotton

46

$ 156,000

4

2088

Beckett

Good

52

$ 165,000

5

Which SQL query provides the Directors' Firstname, Lastname, the name of their departments, and the average employee's salary?

Options:

A.

SELECT m.Firstname, m.Lastname, d.Name, AVG(e.Saiary) as Dept_avg_Saiary

FROM Employee_Table as e

LEFT JOIN Department_Table as d on e.Dept = d.Name

LEFT JOIN Directorjable as m on d.ID = m.DeptJD

GROUP BY m.Firstname, m.Lastname, d.Name

B.

SELECT m.Firstname, m.Lastname, d.Name, AVG(e.Salary) as Dept_avg_Salary

FROM Employee_Table as e

RIGHT JOIN Departmentjable as d on e.Dept = d.Name

INNER JOIN Directorjable as m on d.ID = m.DeptJD

GROUP BY d.Name

C.

SELECT m.Firstname, m.Lastname, d.Name, AVG(e.Salary) as Dept_avg_Salary

FROM Employee_Table as e

RIGHT JOIN Department_Table as d on e.Dept = d.Name

INNER JOIN Directorjable as m on d.ID = m.DeptJD

GROUP BY e.Salary

D.

SELECT m.Firstname, m.Lastname, d.Name, AVG(e.Salary) as Dept_avg_Salary

FROM Employee_Table as e

RIGHT JOIN Department_Table as d on e.Dept = d.Name

INNER JOIN Directorjable as m on d.ID = m.DeptID

GROUP BY m.Firstname, m.Lastname, d.Name

Question 16

You train a neural network model with two layers, each layer having four nodes, and realize that the model is underfit. Which of the actions below will NOT work to fix this underfitting?

Options:

A.

Add features to training data

B.

Get more training data

C.

Increase the complexity of the model

D.

Train the model for more epochs

Question 17

A data scientist is tasked to extract business intelligence from primary data captured from the public. Which of the following is the most important aspect that the scientist cannot forget to include?

Options:

A.

Cyberprotection

B.

Cybersecurity

C.

Data privacy

D.

Data security

Question 18

Which of the following algorithms is an example of unsupervised learning?

Options:

A.

Neural networks

B.

Principal components analysis

C.

Random forest

D.

Ridge regression

Question 19

Which of the following is a privacy-focused law that an AI practitioner should adhere to while designing and adapting an AI system that utilizes personal data?

Options:

A.

General Data Protection Regulation (GDPR)

B.

ISO/IEC 27001

C.

PCIDSS

D.

Sarbanes Oxley (SOX)

Question 20

We are using the k-nearest neighbors algorithm to classify the new data points. The features are on different scales.

Which method can help us to solve this problem?

Options:

A.

Log transformation

B.

Normalization

C.

Square-root transformation

D.

Standardization

Question 21

Which of the following metrics is being captured when performing principal component analysis?

Options:

A.

Kurtosis

B.

Missingness

C.

Skewness

D.

Variance

Question 22

Which of the following describes a benefit of machine learning for solving business problems?

Options:

A.

Increasing the quantity of original data

B.

Increasing the speed of analysis

C.

Improving the constraint of the problem

D.

Improving the quality of original data

Question 23

You have a dataset with many features that you are using to classify a dependent variable. Because the sample size is small, you are worried about overfitting. Which algorithm is ideal to prevent overfitting?

Options:

A.

Decision tree

B.

Logistic regression

C.

Random forest

D.

XGBoost

Question 24

Which of the following is the definition of accuracy?

Options:

A.

(True Positives + False Positives) / Total Predictions

B.

(True Positives + True Negatives) / Total Predictions

C.

True Positives / (True Positives + False Negatives)

D.

True Positives / (True Positives + False Positives)

Question 25

Personal data should not be disclosed, made available, or otherwise used for purposes other than specified with which of the following exceptions? (Select two.)

Options:

A.

If it is for a good cause.

B.

If it was collected accidentally.

C.

If it was requested by the authority of law.

D.

If it was with consent of the person it is collected from.

E.

If the data is only collected once.

Question 26

Which of the following unsupervised learning models can a bank use for fraud detection?

Options:

A.

Anomaly detection

B.

DB5CAN

C.

Hierarchical clustering

D.

k-means

Question 27

Word Embedding describes a task in natural language processing (NLP) where:

Options:

A.

Words are converted into numerical vectors.

B.

Words are featurized by taking a histogram of letter counts.

C.

Words are featurized by taking a matrix of bigram counts.

D.

Words are grouped together into clusters and then represented by word cluster membership.

Page: 1 / 9
Total 90 questions