1. The process of training a Neural Net is:
a) Model ->
Train -> Training Data -> Prediction -> Test and Update
b) Train ->
Model - >Prediction -> Test and Update
c) Training
Data -> Model -> Predict -> Test and Update
2. A bot that can
determine whether a bug is exploitable is called:
a) Medecision
b) Automatic
Exploit Generation
c) Hal
3. In the case of
Machine Learning, the algorithm needs to be told how to make an accurate
prediction by providing it with more information, whereas, in the case of Deep
Learning, the algorithm is able to learn that through its own Data Processing.
a) True
b) False
4. Just like the
PC, Internet and Cloud Computing, AI is also a disruptive technology.
a) True
b) False
5. In the
Healthcare Industry, AI has disrupted:
a) Medical Imaging
b) Surgery
c) Physiological
Diagnosis
6. In Machine Learning, decisions are based on the type of algorithm
selected.
a) True
b) False
7. Which type of Neural Network is used by Stock Market Indices?
a) LSVM
b) NSTM
c) LSTM
8. Naïve Bayes Classifier algorithm is useful for predicting class of
the test dataset.
a) True
b) False
9. Which of the following Machine Learning Algorithms is a learning
method that interacts with its environment by producing actions and and
discovering errors or rewards?
a) Supervised Learning
b) Semi Supervised Learning
c) Reinforcement Learning
10. Unsupervised Machine Learning algorithms are used when the
information used to train is neither classified nor labeled.
a) True
b) False
11. The more layers there are
in a Neural Network, the higher is its ability to approximate more complex
functions.
a) True
b) False
12. The most basic type
of an ANN is called:
a) Feedforward
Neural Network
b) Recurrent Neural
Network
c) Boltzmann
Machine Network
13. Which of these tools can help you
build your Convolutional Neural Network?
a) Tensorflow
b) Premier Pro
c) Silverlight
14. In a Deep Learning System, each
connection between Neurons is associated with a:
a) Length
b) Weight
c) Function
15. The network evaluates how good
its prediction was through_________
a) Cost function
b) Loss function
c) Bias
parameters
d) Back propagation
16. "Companies that see significant impact from advanced
analytics are purposeful about where they intend to win in analytics."
a) True
b) False
17. A centralized repository that allows you to store all your
structured, unstructured and semi-structured data at any scale is called a:
a) Dataset
b) Database
c) Data Lake
d) Data Warehouse
18. Which algorithm allows you to reduce the dimension of the data
while losing the least amount of information?
a) Decision Trees
b) K-Means Clustering
c) Recurrent Neural Networks
d) Principal Component Analysis
19. Clustering (or cluster analysis) is the task of breaking up a set
of objects into groups called clusters.
a) True
b) False
20. Which type of analytics describes or summarizes existing data to
understand what is going on or what has happened?
a) Descriptive Analytics
b) Diagnostic Analytics
c) Predictive Analytics
d) Prescriptive Analytics
21. Which one of the following is NOT a key component of DBMS?
a) Runtime Database Manager
b) Equitable Manager
c) Database Manager
22. RDBMSes store Data in the form of tables, with most commercial
Relational Database Management Systems using:
a) SQL
b) Apache
c) WorkFusion
23. The table format used in RDBMSes is easy to understand but does
not provide an organized and structural manner through which entries are
matched by firing queries.
a) True
b) False
24. Which is an open source relational database management system
(RDBMS) with a client-server model?
a) Oracle
b) MySQL
c) MS-Access
25. MongoDB supports ad-hoc queries and document-based queries.
a) True
b) False
26. In Canada, credit union _____ is exploring the possibility of
wealth management apps, displayed on car windscreens, for passengers to review
their portfolios while being driven to their destination
a) Redshore
b) Blueshore
c) Deepshore
d) None of the above
27. ______ are also beneficial for the elderly, providing monitoring
that can help seniors to remain at home comfortably and safely, rather than
moving to a nursing home or requiring 24/7 home care
a) Robotics
b) Analytics
c) Domotics
d) None of the above
28. Which is the first stage in every IoT architecture?
a) Sensors and actuators
b) Internet getaways and Data Acquisition Systems
c) Edge IT
d) Data center and cloud
29. IoT devices are naturally vulnerable to ________ threats
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
30. IoT is a paradigm that involves ubiquitous presence in the
environment
a) True
b) False
31. What are copies of the physical objects that are accurate enough
to let their owners experiment and predict the operation of their assets
called?
a) Digital Sons
b) Digital Siblings
c) Digital Twins
32. Which of the following IIoT elements can be used in factories to
tackle manufacturing challenges, such as machine failure, problems in control
systems, etc.? A. Installing sensors throughout the factory to monitor
production flow in real time to eliminate waste B. Creating predictive models
based on the data gathered with the help of IoT devices
a) Only A
b) Only B
c) Both A and B
33. Which of the following are the biggest users of IIoT?
A. Automotive Fleet
Management B.
Manufacturing C. Media and
Entertainment
a) A and B
b) B and C
c) A and C
34. DDoS attacks are real threats to IIoT.
a) True
b) False
35. What are the risks associated with industrial IoT?
a) Ransomware infections denying access to critical systems.
b) Not much awareness about internet and smart devices.
c) Loss Of employment by skilled workers.
36. Which of the following are the top benefits of IIoT in
manufacturing? A. Improvement of operational performance B. Ensuring safety and
compliance C. Increasing flexibility and agility
a) A and B
b) A, B and C
c) B and C
37. Which one of these are not one of the big names in the FinTech
cloud computing sector?
a) Amazon Web Services
b) Microsoft Silverlight
c) Google Virtual Cloud
d) Microsoft Azure
38. The resilience of Cloud deployments:
a) Increases Uptime
b) Simplifies Disaster Recovery
c) Both of the above
39. An example of PaaS is:
a) Rackspace Cloud
b) Mosso
c) Amazon EC2
d) Gmail
40. Which cloud service model is the most widely used in the world?
a) SaaS
b) PaaS
c) IaaS
d) All of them
41. Amazon Elastic MapReduce offers a _______ framework to process
large amounts of data.
a) R
b) Hadoop
c) Python
d) None of the above.
42. SaaS is also known as hosted software or on-demand software.
a) True
b) False
43. The PaaS service delivery model allows a customer to rent
virtualized servers and associated services used to run existing applications,
or to design, develop, test, deploy and host applications.
a) True
b) False
44. Grunge Computing is about moving local computing to local devices
in a highly distributed system, typically as a layer around a cloud computing
core.
a) True
b) False
45. iPaaS offerings in the cloud from which providers let users
implement data mapping, transformations is/are:
a) Apache Spark
b) Dell Boomi
c) WorkFusion
46. Infrastructure as a Service and Hardware as a Service are two
completely different things.
a) True
b) False
47. ____________ uses software and hardware methods to tackle external
threats that can arise in the development stage of an application
a) Disaster Recovery
b) Application Security
c) Information Security
d) Endpoint Security
48. Critical Infrastructure does not include
a) Electricity Grid
b) Water Purification
c) Traffic Lights
d) Cooking Gas Lines
49. The full form of SEG is
a) Secure Email Gateway
b) Secure Ecommerce Gateway
c) Security Email Gateway
d) Secure Email Gate
50. Application security uses software and hardware methods to tackle
external threats
a) True
b) False
51. Who alongside the FDA recently launched a joint initiative to
“increase coordination in dealing with threats related to medical devices?
a) HHS
b) DHS
c) LHS
d) AHS
52. Hackers are always looking for opportunities to invade privacy and
steal data that’s of crucial importance
a) True
b) False
53. A cyber attack is any type of offensive action that targets
computer information systems, infrastructures, computer networks or personal
computer devices, using various methods to steal, alter or destroy data or
information systems
a) True
b) False
54. One of the easiest ways your information can become hacked is
through easy-to-guess passwords
a) True
b) False
55. Which attack involves using IP spoofing and the ICMP to saturate a
target network with traffic?
a) Smurf attack
b) Teardrop attack
c) Replay attack
56. Botnets are the millions of systems infected with malware under
hacker control in order to carry out DDoS attacks
a) True
b) False
No comments:
Post a Comment