Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

AIF-C01 Exam Dumps - AWS Certified AI Practitioner Exam

Searching for workable clues to ace the Amazon Web Services AIF-C01 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s AIF-C01 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

A company uses a third-party model on Amazon Bedrock to analyze confidential documents. The company is concerned about data privacy. Which statement describes how Amazon Bedrock protects data privacy?

A.

User inputs and model outputs are anonymized and shared with third-party model providers.

B.

User inputs and model outputs are not shared with any third-party model providers.

C.

User inputs are kept confidential, but model outputs are shared with third-party model providers.

D.

User inputs and model outputs are redacted before the inputs and outputs are shared with third-party model providers.

Full Access
Question # 34

A retail store wants to predict the demand for a specific product for the next few weeks by using the Amazon SageMaker DeepAR forecasting algorithm.

Which type of data will meet this requirement?

A.

Text data

B.

Image data

C.

Time series data

D.

Binary data

Full Access
Question # 35

A company needs to apply numerical transformations to a set of images to transpose and rotate the images.

A.

Create a deep neural network by using the images as input.

B.

Create an AWS Lambda function to perform the transformations.

C.

Use an Amazon Bedrock large language model (LLM) with a high temperature.

D.

Use AWS Glue Data Quality to make corrections to each image.

Full Access
Question # 36

A company is building a new generative AI chatbot. The chatbot uses an Amazon Bedrock foundation model (FM) to generate responses. During testing, the company notices that the chatbot is prone to prompt injection attacks.

What can the company do to secure the chatbot with the LEAST implementation effort?

A.

Fine-tune the FM to avoid harmful responses.

B.

Use Amazon Bedrock Guardrails content filters and denied topics.

C.

Change the FM to a more secure FM.

D.

Use chain-of-thought prompting to produce secure responses.

Full Access
Question # 37

A company is using custom models in Amazon Bedrock for a generative AI application. The company wants to use a company-managed encryption key to encrypt the model artifacts that the model customization jobs create. Which AWS service meets these requirements?

A.

AWS Key Management Service (AWS KMS)

B.

Amazon Inspector

C.

Amazon Macie

D.

AWS Secrets Manager

Full Access
Question # 38

A company wants to collaborate with several research institutes to develop an AI model. The company needs standardized documentation of model version tracking and a record of model development.

Which solution meets these requirements?

A.

Track the model changes by using Git.

B.

Track the model changes by using Amazon Fraud Detector.

C.

Track the model changes by using Amazon SageMaker Model Cards.

D.

Track the model changes by using Amazon Comprehend.

Full Access
Question # 39

An AI company periodically evaluates its systems and processes with the help of independent software vendors (ISVs). The company needs to receive email message notifications when an ISV's compliance reports become available.

Which AWS service meets this requirement?

A.

AWS Audit Manager

B.

AWS Artifact

C.

AWS Trusted Advisor

D.

AWS Data Exchange

Full Access
Question # 40

A company wants more customized responses to its generative AI models' prompts.

Select the correct customization methodology from the following list for each use case. Each use case should be selected one time. (Select THREE.)

• Continued pre-training

• Data augmentation

• Model fine-tuning

Full Access
Go to page: