Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISTQB AI Testing CT-AI Syllabus Exam Questions Answers

Page: 4 / 6
Total 80 questions

Certified Tester AI Testing Exam Questions and Answers

Question 13

Which ONE of the following statements is a CORRECT adversarial example in the context of machine learning systems that are working on image classifiers.

SELECT ONE OPTION

Options:

A.

Black box attacks based on adversarial examples create an exact duplicate model of the original.

B.

These attack examples cause a model to predict the correct class with slightly less accuracy even though they look like the original image.

C.

These attacks can't be prevented by retraining the model with these examples augmented to the training data.

D.

These examples are model specific and are not likely to cause another model trained on same task to fail.

Question 14

Which ONE of the following options is an example that BEST describes a system with Al-based autonomous functions?

SELECT ONE OPTION

Options:

A.

A system that utilizes human beings for all important decisions.

B.

A fully automated manufacturing plant that uses no software.

C.

A system that utilizes a tool like Selenium.

D.

A system that is fully able to respond to its environment.

Question 15

Which of the following is correct regarding the layers of a deep neural network?

Options:

A.

There is only an input and output layer

B.

There is at least one internal hidden layer

C.

There must be a minimum of five total layers to be considered deep

D.

The output layer is not connected with the other layers to maintain integrity

Question 16

A company is using a spam filter to attempt to identify which emails should be marked as spam. Detection rules are created by the filter that causes a message to be classified as spam. An attacker wishes to have all messages internal to the company be classified as spam. So, the attacker sends messages with obvious red flags in the body of the email and modifies the from portion of the email to make it appear that the emails have been sent by company members. The testers plan to use exploratory data analysis (EDA) to detect the attack and use this information to prevent future adversarial attacks.

How could EDA be used to detect this attack?

Options:

A.

EDA can help detect the outlier emails from the real emails.

B.

EDA can detect and remove the false emails.

C.

EDA can restrict how many inputs can be provided by unique users.

D.

EDA cannot be used to detect the attack.

Page: 4 / 6
Total 80 questions