ExamGecko
Home Home / Amazon / AIF-C01

Amazon AIF-C01 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











An AI practitioner is using an Amazon Bedrock base model to summarize session chats from the customer service department. The AI practitioner wants to store invocation logs to monitor model input and output data.

Which strategy should the AI practitioner use?

A.
Configure AWS CloudTrail as the logs destination for the model.
A.
Configure AWS CloudTrail as the logs destination for the model.
Answers
B.
Enable invocation logging in Amazon Bedrock.
B.
Enable invocation logging in Amazon Bedrock.
Answers
C.
Configure AWS Audit Manager as the logs destination for the model.
C.
Configure AWS Audit Manager as the logs destination for the model.
Answers
D.
Configure model invocation logging in Amazon EventBridge.
D.
Configure model invocation logging in Amazon EventBridge.
Answers
Suggested answer: B

A company needs to build its own large language model (LLM) based on only the company's private data. The company is concerned about the environmental effect of the training process.

Which Amazon EC2 instance type has the LEAST environmental effect when training LLMs?

A.
Amazon EC2 C series
A.
Amazon EC2 C series
Answers
B.
Amazon EC2 G series
B.
Amazon EC2 G series
Answers
C.
Amazon EC2 P series
C.
Amazon EC2 P series
Answers
D.
Amazon EC2 Trn series
D.
Amazon EC2 Trn series
Answers
Suggested answer: D

A financial institution is using Amazon Bedrock to develop an AI application. The application is hosted in a VPC. To meet regulatory compliance standards, the VPC is not allowed access to any internet traffic.

Which AWS service or feature will meet these requirements?

A.
AWS PrivateLink
A.
AWS PrivateLink
Answers
B.
Amazon Macie
B.
Amazon Macie
Answers
C.
Amazon CloudFront
C.
Amazon CloudFront
Answers
D.
Internet gateway
D.
Internet gateway
Answers
Suggested answer: A

A company built a deep learning model for object detection and deployed the model to production.

Which AI process occurs when the model analyzes a new image to identify objects?

A.
Training
A.
Training
Answers
B.
Inference
B.
Inference
Answers
C.
Model deployment
C.
Model deployment
Answers
D.
Bias correction
D.
Bias correction
Answers
Suggested answer: B

A company is using Amazon SageMaker Studio notebooks to build and train ML models. The company stores the data in an Amazon S3 bucket. The company needs to manage the flow of data from Amazon S3 to SageMaker Studio notebooks.

Which solution will meet this requirement?

A.
Use Amazon Inspector to monitor SageMaker Studio.
A.
Use Amazon Inspector to monitor SageMaker Studio.
Answers
B.
Use Amazon Macie to monitor SageMaker Studio.
B.
Use Amazon Macie to monitor SageMaker Studio.
Answers
C.
Configure SageMaker to use a VPC with an S3 endpoint.
C.
Configure SageMaker to use a VPC with an S3 endpoint.
Answers
D.
Configure SageMaker to use S3 Glacier Deep Archive.
D.
Configure SageMaker to use S3 Glacier Deep Archive.
Answers
Suggested answer: C

A company is using domain-specific models. The company wants to avoid creating new models from the beginning. The company instead wants to adapt pre-trained models to create models for new, related tasks.

Which ML strategy meets these requirements?

A.
Increase the number of epochs.
A.
Increase the number of epochs.
Answers
B.
Use transfer learning.
B.
Use transfer learning.
Answers
C.
Decrease the number of epochs.
C.
Decrease the number of epochs.
Answers
D.
Use unsupervised learning.
D.
Use unsupervised learning.
Answers
Suggested answer: B

A company wants to use AI to protect its application from threats. The AI solution needs to check if an IP address is from a suspicious source.

Which solution meets these requirements?

A.
Build a speech recognition system.
A.
Build a speech recognition system.
Answers
B.
Create a natural language processing (NLP) named entity recognition system.
B.
Create a natural language processing (NLP) named entity recognition system.
Answers
C.
Develop an anomaly detection system.
C.
Develop an anomaly detection system.
Answers
D.
Create a fraud forecasting system.
D.
Create a fraud forecasting system.
Answers
Suggested answer: C

A company wants to use a large language model (LLM) to develop a conversational agent. The company needs to prevent the LLM from being manipulated with common prompt engineering techniques to perform undesirable actions or expose sensitive information.

Which action will reduce these risks?

A.
Create a prompt template that teaches the LLM to detect attack patterns.
A.
Create a prompt template that teaches the LLM to detect attack patterns.
Answers
B.
Increase the temperature parameter on invocation requests to the LLM.
B.
Increase the temperature parameter on invocation requests to the LLM.
Answers
C.
Avoid using LLMs that are not listed in Amazon SageMaker.
C.
Avoid using LLMs that are not listed in Amazon SageMaker.
Answers
D.
Decrease the number of input tokens on invocations of the LLM.
D.
Decrease the number of input tokens on invocations of the LLM.
Answers
Suggested answer: A

A company is developing a new model to predict the prices of specific items. The model performed well on the training dataset. When the company deployed the model to production, the model's performance decreased significantly.

What should the company do to mitigate this problem?

A.
Reduce the volume of data that is used in training.
A.
Reduce the volume of data that is used in training.
Answers
B.
Add hyperparameters to the model.
B.
Add hyperparameters to the model.
Answers
C.
Increase the volume of data that is used in training.
C.
Increase the volume of data that is used in training.
Answers
D.
Increase the model training time.
D.
Increase the model training time.
Answers
Suggested answer: C

A company wants to create a chatbot by using a foundation model (FM) on Amazon Bedrock. The FM needs to access encrypted data that is stored in an Amazon S3 bucket.

The data is encrypted with Amazon S3 managed keys (SSE-S3).

The FM encounters a failure when attempting to access the S3 bucket data.

Which solution will meet these requirements?

A.
Ensure that the role that Amazon Bedrock assumes has permission to decrypt data with the correct encryption key.
A.
Ensure that the role that Amazon Bedrock assumes has permission to decrypt data with the correct encryption key.
Answers
B.
Set the access permissions for the S3 buckets to allow public access to enable access over the internet.
B.
Set the access permissions for the S3 buckets to allow public access to enable access over the internet.
Answers
C.
Use prompt engineering techniques to tell the model to look for information in Amazon S3.
C.
Use prompt engineering techniques to tell the model to look for information in Amazon S3.
Answers
D.
Ensure that the S3 data does not contain sensitive information.
D.
Ensure that the S3 data does not contain sensitive information.
Answers
Suggested answer: A
Total 87 questions
Go to page: of 9