Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

AIP-210 CertNexus Certified Artificial Intelligence Practitioner (CAIP) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CertNexus AIP-210 CertNexus Certified Artificial Intelligence Practitioner (CAIP) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 92 questions

Which of the following is NOT a valid cross-validation method?

A.

Bootstrapping

B.

K-fold

C.

Leave-one-out

D.

Stratification

Which two of the following decrease technical debt in ML systems? (Select two.)

A.

Boundary erosion

B.

Design anti-patterns

C.

Documentation readability

D.

Model complexity

E.

Refactoring

Which of the following pieces of AI technology provides the ability to create fake videos?

A.

Generative adversarial networks (GAN)

B.

Long short-term memory (LSTM) networks

C.

Recurrent neural networks (RNN)

D.

Support-vector machines (SVM)

Which of the following is NOT an activation function?

A.

Additive

B.

Hyperbolic tangent

C.

ReLU

D.

Sigmoid

Which two techniques are used to build personas in the ML development lifecycle? (Select two.)

A.

Population estimates

B.

Population regression

C.

Population resampling

D.

Population triage

E.

Population variance

Your dependent variable data is a proportion. The observed range of your data is 0.01 to 0.99. The instrument used to generate the dependent variable data is known to generate low quality data for values close to 0 and close to 1. A colleague suggests performing a logit-transformation on the data prior to performing a linear regression. Which of the following is a concern with this approach?

Definition of logit-transformation

If p is the proportion: logit(p)=log(p/(l-p))

A.

After logit-transformation, the data may violate the assumption of independence.

B.

Noisy data could become more influential in your model.

C.

The model will be more likely to violate the assumption of normality.

D.

Values near 0.5 before logit-transformation will be near 0 after.

Which of the following occurs when a data segment is collected in such a way that some members of the intended statistical population are less likely to be included than others?

A.

Algorithmic bias

B.

Sampling bias

C.

Stereotype bias

D.

Systematic value distortion

An AI practitioner incorporates risk considerations into a deployment plan and decides to log and store historical predictions for potential, future access requests.

Which ethical principle is this an example of?

A.

Fairness

B.

Privacy

C.

Safety

D.

Transparency

When should you use semi-supervised learning? (Select two.)

A.

A small set of labeled data is available but not representative of the entire distribution.

B.

A small set of labeled data is biased toward one class.

C.

Labeling data is challenging and expensive.

D.

There is a large amount of labeled data to be used for predictions.

E.

There is a large amount of unlabeled data to be used for predictions.

Which of the following can benefit from deploying a deep learning model as an embedded model on edge devices?

A.

A more complex model

B.

Guaranteed availability of enough space

C.

Increase in data bandwidth consumption

D.

Reduction in latency

Which of the following methods can be used to rebalance a dataset using the rebalance design pattern?

A.

Bagging

B.

Boosting

C.

Stacking

D.

Weighted class

A data scientist is tasked to extract business intelligence from primary data captured from the public. Which of the following is the most important aspect that the scientist cannot forget to include?

A.

Cyberprotection

B.

Cybersecurity

C.

Data privacy

D.

Data security

An organization sells house security cameras and has asked their data scientists to implement a model to detect human feces, as distinguished from animals, so they can alert th customers only when a human gets close to their house.

Which of the following algorithms is an appropriate option with a correct reason?

A.

A decision tree algorithm, because the problem is a classification problem with a small number of features.

B.

k-means, because this is a clustering problem with a small number of features.

C.

Logistic regression, because this is a classification problem and our data is linearly separable.

D.

Neural network model, because this is a classification problem with a large number of features.

Which of the following describes a benefit of machine learning for solving business problems?

A.

Increasing the quantity of original data

B.

Increasing the speed of analysis

C.

Improving the constraint of the problem

D.

Improving the quality of original data

We are using the k-nearest neighbors algorithm to classify the new data points. The features are on different scales.

Which method can help us to solve this problem?

A.

Log transformation

B.

Normalization

C.

Square-root transformation

D.

Standardization

Which three security measures could be applied in different ML workflow stages to defend them against malicious activities? (Select three.)

A.

Disable logging for model access.

B.

Launch ML Instances In a virtual private cloud (VPC).

C.

Monitor model degradation.

D.

Use data encryption.

E.

Use max privilege to control access to ML artifacts.

F.

Use Secrets Manager to protect credentials.

You have a dataset with many features that you are using to classify a dependent variable. Because the sample size is small, you are worried about overfitting. Which algorithm is ideal to prevent overfitting?

A.

Decision tree

B.

Logistic regression

C.

Random forest

D.

XGBoost

What is Word2vec?

A.

A bag of words.

B.

A matrix of how frequently words appear in a group of documents.

C.

A word embedding method that builds a one-hot encoded matrix from samples and the terms that appear in them.

D.

A word embedding method that finds characteristics of words in a very large number of documents.

Which of the following sentences is TRUE about the definition of cloud models for machine learning pipelines?

A.

Data as a Service (DaaS) can host the databases providing backups, clustering, and high availability.

B.

Infrastructure as a Service (IaaS) can provide CPU, memory, disk, network and GPU.

C.

Platform as a Service (PaaS) can provide some services within an application such as payment applications to create efficient results.

D.

Software as a Service (SaaS) can provide AI practitioner data science services such as Jupyter notebooks.

A product manager is designing an Artificial Intelligence (AI) solution and wants to do so responsibly, evaluating both positive and negative outcomes.

The team creates a shared taxonomy of potential negative impacts and conducts an assessment along vectors such as severity, impact, frequency, and likelihood.

Which modeling technique does this team use?

A.

Business

B.

Harms

C.

Process

D.

Threat

Page: 1 / 2
Total 92 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved