All questions are
mandatory
1. The
process of training a Neural Net is:
a) Model -> Train -> Training Data ->
Prediction -> Test and Update
b) Train -> Model - >Prediction -> Test
and Update
c) Training
Data -> Model -> Predict -> Test mool Update
2. A
bot that can determine whether a bug is exploitable is called:
a) Medecision
b) Automatic
Exploit Generation
c) Hal
3. In the case of Machine Learning, the algorithm
needs to be told how to make an accurate prediction by providing it with more
information, whereas, in the case of Deep Learning, the algorithm is able to
learn that through its own Data Processing.
a) True
b) False
4. Just like the PC, Internet and Cloud Computing,
AI is also a disruptive technology.
a) True
b) False
5. In the Healthcare Industry, AI has disrupted:
a) Medical
Imaging
b) Surgery
c) Physiological Diagnosis
6. In Machine Learning, decisions
are based on the type of algorithm selected.
a) True
b) False
7. Which type of Neural Network is used by Stock Market Indices?
a) LSVM
b) NSTM
c) LSTM
8. Naïve Bayes Classifier algorithm is useful for predicting class of
the test dataset.
a) True
b) False
9. Which of the following Machine
Learning Algorithms is a learning method that interacts with its environment by
producing actions and and discovering errors or rewards?
a) Supervised Learning
b) Semi Supervised Learning
c) Reinforcement Learning
10. Unsupervised Machine Learning algorithms are used when the
information used to train is neither classified nor labeled.
a) True
b) False
11. The more layers there are in a Neural Network, the
higher is its ability to approximate more complex functions.
a) True
b) False
12. The most basic type of an ANN is called:
a) Feedforward
Neural Network
b) Recurrent
Neural Network
c) Boltzmann Machine Network
13. Which of these tools can help you build your Convolutional
Neural Network?
a) Tensorflow
b) Premier
Pro
c) Silverlight
14. In a Deep Learning System, each connection between Neurons is
associated with a:
a) Length
b) Weight
c) Function
15. The network evaluates how good its prediction was
through_________
a) Cost function
b) Loss
function
c) Bias
parameters
d) Back propagation
16. "Companies that see significant impact from advanced
analytics are purposeful about where they intend to win in analytics."
a) True
b) False
17. A centralized repository that allows you to
store all your structured, unstructured and semi-structured data at any scale
is called a:
a) Dataset
b) Database
c) Data Lake
d) Data Warehouse
18. Which algorithm allows you to reduce the dimension of the data
while losing the least amount of information?
a) Decision Trees
b) K-Means Clustering
c) Recurrent Neural Networks
d) Principal Component Analysis
19. Clustering (or cluster analysis) is the task of breaking up a set of
objects into groups called clusters.
a) True
b) False
20. Which type of analytics describes or
summarizes existing data to understand what is going on or what has happened?
a) Descriptive Analytics
b) Diagnostic Analytics
c) Predictive Analytics
d) Prescriptive Analytics
21. Which one of the following is NOT a key
component of DBMS?
a) Runtime Database Manager
b) Equitable Manager
c) Database Manager
22. RDBMSes store Data in the form of tables, with
most commercial Relational Database Management Systems using:
a) SQL
b) Apache
c) WorkFusion
23. The table format used in RDBMSes is easy to
understand but does not provide an organized and structural manner through
which entries are matched by firing queries.
a) True
b) False
24. Which is an open source relational database management system
(RDBMS) with a client-server model?
a) Oracle
b) MySQL
c) MS-Access
25. MongoDB supports ad-hoc queries and
document-based queries.
a) True
b) False
26. In Canada, credit union _____ is exploring the
possibility of wealth management apps, displayed on car windscreens, for
passengers to review their portfolios while being driven to their destination
a) Redshore
b) Blueshore
c) Deepshore
d) None of the above
27. ______ are also beneficial for the elderly,
providing monitoring that can help seniors to remain at home comfortably and
safely, rather than moving to a nursing home or requiring 24/7 home care
a) Robotics
b) Analytics
c) Domotics
d) None of the above
28. Which is the first stage in every IoT
architecture?
a) Sensors and actuators
b) Internet getaways and Data Acquisition Systems
c) Edge IT
d) Data center and cloud
29. IoT devices are naturally vulnerable to
________ threats
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
30. IoT is a paradigm that involves ubiquitous
presence in the environment
a) True
b) False
31. What are copies of the physical objects that
are accurate enough to let their owners experiment and predict the operation of
their assets called?
a) Digital Sons
b) Digital Siblings
c) Digital Twins
32. Which of the following IIoT elements can be used in factories to
tackle manufacturing challenges, such as machine failure, problems in control
systems, etc.? A. Installing sensors throughout the factory to monitor
production flow in real time to eliminate waste B. Creating predictive models
based on the data gathered with the help of IoT devices
a) Only A
b) Only B
c) Both A and B
33. Which of the following are the biggest users of IIoT? A.
Automotive Fleet
Management B.
Manufacturing C. Media and Entertainment
a) A and B
b) B and C
c) A and C
34. DDoS attacks are real threats to IIoT.
a) True
b) False
35. What are the risks associated with industrial IoT?
a) Ransomware infections denying access to critical systems.
b) Not much awareness about internet and smart devices.
c) Loss Of employment by skilled
workers.
36. Which of the following are the top benefits of
IIoT in manufacturing? A. Improvement of operational performance B. Ensuring safety
and compliance C. Increasing flexibility and agility
a) A and B
b) A, B and C
c) B and C
37. Which one of these are not one of the big
names in the FinTech cloud computing sector?
a) Amazon Web Services
b) Microsoft Silverlight
c) Google Virtual Cloud
d) Microsoft Azure
38. The resilience of Cloud deployments:
a) Increases Uptime
b) Simplifies Disaster Recovery
c) Both of the above
39. An example of PaaS is:
a) Rackspace Cloud
b) Mosso
c) Amazon EC2
d) Gmail
40. Which cloud service model is the most widely
used in the world?
a) SaaS
b) PaaS
c) IaaS
d) All of them
41. Amazon Elastic MapReduce offers a _______
framework to process large amounts of data.
a) R
b) Hadoop
c) Python
d) None of the above.
42. SaaS is also known as hosted software or
on-demand software.
a) True
b) False
43. The PaaS service delivery model allows a
customer to rent virtualized servers and associated services used to run
existing applications, or to design, develop, test, deploy and host
applications.
a) True
b) False
44. Grunge Computing is about moving local
computing to local devices in a highly distributed system, typically as a layer
around a cloud computing core.
a) True
b) False
45. iPaaS offerings in the cloud from which providers let users
implement data mapping, transformations is/are:
a) Apache Spark
b) Dell Boomi
c) WorkFusion
46. Infrastructure as a Service and Hardware as a Service are two
completely different things.
a) True
b) False
47. ____________ uses software and hardware methods to tackle external
threats that can arise in the development stage of an application
a) Disaster Recovery
b) Application Security
c) Information Security
d) Endpoint Security
48. Critical Infrastructure does not include
a) Electricity Grid
b) Water Purification
c) Traffic Lights
d) Cooking Gas Lines
49. The full form of SEG is
a) Secure Email Gateway
b) Secure Ecommerce Gateway
c) Security Email Gateway
d) Secure Email Gate
50. Application security uses software and
hardware methods to tackle external threats
a) True
b) False 51. Who alongside the FDA recently
launched a joint initiative to “increase coordination in dealing with threats
related to medical devices?
a) HHS
b) DHS
c) LHS
d) AHS
52. Hackers are always looking for opportunities
to invade privacy and steal data that’s of crucial importance
a) True
b) False
53. A cyber attack is any type of offensive action
that targets computer information systems, infrastructures, computer networks
or personal computer devices, using various methods to steal, alter or destroy
data or information systems
a) True
b) False
54. One of the easiest ways your information can
become hacked is through easy-to-guess passwords
a) True
b) False
55. Which attack involves using IP spoofing and
the ICMP to saturate a target network with traffic?
a) Smurf attack
b) Teardrop attack
c) Replay attack
56. Botnets are the millions of systems infected
with malware under hacker control in order to carry out DDoS attacks
a) True
b) False
No comments:
Post a Comment