Apply Here: ChatGPT (Open AI) Security, Privacy & Ethical Hacking Certification Exam Answers
Question 1: As a student, ChatGPT can assist with assignments.
- True
- False
Question 2: ____________________ is a chatbot powered by artificial intelligence and machine learning that improves and learns from user input.
- ChatGPT
- GPT-3
- GPT3
- All of the above
Question 3: In 1997, IBM’s ____________ became the first computer to defeat a reigning world chess champion, Garry Kasparov.
- deep blue
- deep pink
- deep sea
- deep black
Question 4: Which of these are not valid use cases for ChatGPT?.
- Data Analysis
- Sentiment Analysis
- Text Classification
- Precision Surgical Procedures
Question 5: A poisoning attack is a type of attack that aims to corrupt the training data of a machine-learning model.
- True
- False
Question 6: What is the purpose of adversarial examples in the ethical hacking of AI systems?
- To fool a machine learning model
- To corrupt the training data of a machine learning model
- To extract a replica of a machine learning model from a black-box API
- To reconstruct the training data from the model’s predictions
Question 7: The CEH attack on AI-based systems known as art.attacks.__________________ is a model extraction attack aimed at extracting a replica of a machine learning model from a black-box API.
- ExtractionAttack
- BlackBoxAttack
- CyberAttack
- None of the Above
Question 8: Open AI code follows ________________ standard.
- PEP-80
- PEP-8
- PEP-18
- PEP-8080
Question 9: ChatGPT can be trained to identify patterns in emails commonly used by attackers to trick users into giving away personal information or login credentials.
- True
- False
Question 10: GPT-3 can be used to analyze security reports and identify _______________ in software and systems, making it easier to prioritize and address them.
- Vulnerabilities
- VAPT
- Forensic
- All of the above
Question 11: Which of these are the top 10 security threats for ML/AI according to OWASP?
- Identification & Auth Failures
- Vulnerable & Outdated Components
- Access to Model Artifacts/Cryptographic Failures
- All of the above
Question 12: Developers add clear and concise comments throughout their code to explain the purpose and functionality of different sections. What is this process called?
- Splicing
- Connecting
- Commenting
- Annotation
Question 13: What are the main two targets of nation-state and APT groups?
- AI based systems & processes
- AI promoters and detractors
- None of these
Question 14: AI-powered chatbots could become a lucrative target for criminals looking to exploit people and businesses.
- True
- False
Question 15: Which of the following is not AI-based systems?
- Virtual Reality
- Metaverse
- Augmented Reality
- Alternate Universe
Question 16: Which of these would classify emails as spam or not?
- Classifier
- Starter
- Seperator
- All of the above
Question 17: Which of these cannot be done using the art.attacks.InferenceAttack class in ART?
- perform model inversion
- membership inference attacks
- reconstruct the training data from the model’s predictions
- infer whether a specific sample was used to train a machine learning model.
- membership intracycle attacks
Question 18: ChatGPT can be trained to identify patterns in ___________ and messages that attackers commonly use to trick users into giving away their personal information or login credentials.
- in-person communications
- emails
- images
- All of the above
Question 19: What is the total number of OWASP vulnerabilities?
- 10
- 20
- 5
- 3
Question 20: In ___________________, criminals can use AI-powered deep fake technology to impersonate someone else, commit fraud or steal personal information.
- AR/VR
- VCR
- NVR
- DVR
ChatGPT (Open AI) Security, Privacy & Ethical Hacking Certification Exam Answers
- Define various artificial intelligence (AI), machine learning (ML) types and modules
- Analyse and ethically hack systems using ChatGPT
- Describe various online scams and explain how to overcome them using ChatGPT
- Explain the key role of Open AI’s ChatGPT and how it may change the way we think and work
- Recognise the guiding principles of different security measures and the risk of theft and hacking attempts
- Analyse several AI and ML modules on ethical hacking and explain how it functions in the real world by completing a hands-on practice exercise
- Outline cybersecurity tools and explain how they work in live environments for ethical hacking and security
- Identify the challenges in facing pentesters and provide ways to overcome them
- Describe ways that powerful technology could be abused and outline viable safety measures to prevent such abuse