New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

All of the following are examples of biometric data in the US EXCEPT?

A.

Iris scans.

B.

Walking gait.

C.

Keystroke dynamics.

D.

GPS location of a user's fitness watch.

The White House Executive Order from November 2023 requires companies that develop dual-use foundation models to provide reports to the federal government about all of the following EXCEPT?

A.

Any current training or development of dual-use foundation models.

B.

The results of red-team testing of each dual-use foundation model.

C.

Any environmental impact study for each dual-use foundation model.

D.

The physical and cybersecurity protection measures of their dual-use foundation models.

When monitoring the functional performance of a model that has been deployed into production, all of the following are concerns EXCEPT?

A.

Feature drift.

B.

System cost.

C.

Model drift.

D.

Data loss.

A leading software development company wants to integrate AI-powered chatbots into their customer service platform. After researching various AI models in the market which have been developed by third-party developers, they're considering two options:

Option A - an open-source language model trained on a vast corpus of text data and capable of being trained to respond to natural language inputs.

Option B - a proprietary, generative AI model pre-trained on large data sets, which uses transformer-based architectures to generate human-like responses based on multimodal user input.

Option A would be the best choice for the company because?

A.

It is less expensive to run

B.

It may be better suited for applications requiring customization.

C.

It can handle voice commands and is more suitable for phone-based customer support.

D.

It is built for large-scale, complex dialogues and would be more effective in handling high-volume customer inquiries.

If it is possible to provide a rationale for a specific output of an Al system, that system can best be described as?

A.

Accountable.

B.

Transparent.

C.

Explainable.

D.

Reliable.

Scenario:

An organization is evaluating different AI models for integration into its internal workflows. Before moving forward with a particular AI solution from a third-party vendor, the governance team needs to assess the ethical and operational implications of the model.

The most important policy to assess the operations of an AI model is to follow the:

A.

Acceptable use policy of the model provider

B.

Privacy policy of the model provider

C.

Security policy of the model provider

D.

Code of conduct policy of the model provider

A company is working to develop a self-driving car that can independently decide the appropriate route to take the driver after the driver provides an address.

If they want to make this self-driving car “strong” Al, as opposed to "weak,” the engineers would also need to ensure?

A.

That theAl has full human cognitive abilities that can independently decide where to take the driver.

B.

That they have obtained appropriate intellectual property (IP) licenses to use data for training the Al.

C.

That the Al has strong cybersecurity to prevent malicious actors from taking control of the car.

D.

That the Al can differentiate among ethnic backgrounds of pedestrians.

All of the following may be permissible uses of an Al system under the EU Al Act EXCEPT?

A.

To detect an individual's intent for law enforcement purposes.

B.

To promote equitable distribution of welfare benefits.

C.

To implement social scoring.

D.

To manage border control.

Which of the following disclosures is NOT required for an EU organization that developed and deployed a high-risk Al system?

A.

The human oversight measures employed.

B.

How an individual may contest a decision.

C.

The location(s) where data is stored.

D.

The fact that an Al system is being used.

The framework set forth in the White House Blueprint for an Al Bill of Rights addresses all of the following EXCEPT?

A.

Human alternatives, consideration and fallback.

B.

High-risk mitigation standards.

C.

Safe and effective systems.

D.

Data privacy.