당신은 온라인 연습 문제를 통해 CompTIA CY0-001 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 CY0-001 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 76개의 시험 문제와 답을 포함하십시오.
/ 2
Question No : 1
Which of the following is the most impactful security risk associated with the use of a generative AI chatbot?
정답:
Question No : 2
A security architect performs threat modeling of an AI system. The architect needs to determine which attacks can be performed against the system.
Which of the following actions should the architect take next?
정답:
Question No : 3
Which of the following is used to train an AI model with unstructured data?
정답:
Question No : 4
Users report that the output of a generative AI application seems unrelated to the prompts and contains offensive content. A security team investigates and determines that there was an on-path attack.
Which of the following is the most likely attack method?
정답:
Question No : 5
Which of the following improves the observability and auditing of an AI system?
정답:
Question No : 6
Which of the following helps in managing potential security issues related to model training?
정답:
Question No : 7
A healthcare organization plans to deploy a chatbot for appointment scheduling and patient records.
Which of the following is the first step a security administrator should take?
정답:
Question No : 8
During the selection of a machine learning (ML)-based threat classification model, a cybersecurity administrator verifies that label distribution is highly unbalanced.
Which of the following processing techniques should the engineer use to balance the model?
정답:
Question No : 9
Which of the following technologies is used in deepfake?
정답:
Question No : 10
A financial organization implements a new AI-based fraud detection system to flag suspicious transactions. A security analyst discovers that it occasionally blocks legitimate transactions.
Which of the following is the best recommendation?
정답:
Question No : 11
A security analyst finds that the AI system is under a denial-of-wallet attack.
Which of the following should the analyst enforce to protect the company? (Choose two.)
정답:
Question No : 12
A line of business wants to onboard an application that uses a custom AI model for employee assessments. The Chief Information Officer (CIO) agrees to allow the engagement to proceed but first wants a threat model.
Which of the following is the most appropriate to use for an AI threat model?
정답:
Question No : 13
A human resources officer is using AI to evaluate resumes and help select candidates that meet minimum criteria. To improve the results, the human resources officer adjusts the query parameters and includes an example resume that matches a successful candidate.
Which if the following best describes this query?
정답:
Question No : 14
An AI architect reviews AI utilization and wants to improve the user experience.
Which of the following should the architect review within the logs?
정답:
Question No : 15
An attacker successfully completes a denial-of-service (DoS) attack through the context window of an AI system. Thousands of characters are obfuscated and hidden behind an emoji.
Which of the following techniques best mitigates this type of attack?