Question: Question 35 (1 point) ListenReadSpeaker webReader: Listen ____________ is responsible for keeping the security model up-to-date for better performance by extracting the latest data-driven security
Question 35 (1 point)
ListenReadSpeaker webReader: Listen
____________ is responsible for keeping the security model up-to-date for better performance by extracting the latest data-driven security patterns
Question 35 options:
|
| Policy rule generation |
|
| Post-processing and improvement |
|
| Model selection or customization |
|
| Recency mining and updating security model |
Question 36 (1 point)
ListenReadSpeaker webReader: Listen
Which of the following about unsupervised learning is NOT true?
Question 36 options:
|
| Clustering techniques are used in unsupervised learning |
|
| Unsupervised learning is performed when specific targets are defined |
|
| Unsupervised learning can find patterns in unlabelled data |
Question 37 (1 point)
ListenReadSpeaker webReader: Listen
Which of the following is an example of unsupervised learning?
Question 37 options:
|
| SVM |
|
| Logitics regression |
|
| K-nearest neighbors |
|
| K-means |
Question 38 (1 point)
ListenReadSpeaker webReader: Listen
_________builds security models based on artificial neural networks consisting of several data processing layers.
Question 38 options:
|
| Machine learning |
|
| Deep learning |
|
| Threat intelligence |
|
| Artificial intelligence |
Question 39 (1 point)
ListenReadSpeaker webReader: Listen
_________ is mainly responsible to transform raw security data into informative features that effectively represent the underlying security problem to the data-driven models.
Question 39 options:
|
| Model selection or customization |
|
| Attack classification or prediction |
|
| Security data clustering |
|
| Security feature engineering |
Question 40 (1 point)
ListenReadSpeaker webReader: Listen
A ___________is a simulated attack to exploit weaknesses and vulnerabilities on a system, network, application, website, wireless network, or employees.
Question 40 options:
|
| vulnerability assessment |
|
| penetration testing |
|
| risk management |
|
| malware analysis |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
