Free Amazon AIF-C01 Exam Braindumps (page: 7)

A security company is using Amazon Bedrock to run foundation models (FMs). The company wants to ensure that only authorized users invoke the models. The company needs to identify any unauthorized access attempts to set appropriate AWS Identity and Access Management (IAM) policies and roles for future iterations of the FMs.
Which AWS service should the company use to identify unauthorized users that are trying to access Amazon Bedrock?

  1. AWS Audit Manager
  2. AWS CloudTrail
  3. Amazon Fraud Detector
  4. AWS Trusted Advisor

Answer(s): B

Explanation:

AWS CloudTrail records API activity and provides a log of access attempts, which helps identify unauthorized users trying to access Amazon Bedrock. The other services are not specifically used for tracking unauthorized access attempts in this context.



A company has developed an ML model for image classification. The company wants to deploy the model to production so that a web application can use the model.
The company needs to implement a solution to host the model and serve predictions without managing any of the underlying infrastructure.
Which solution will meet these requirements?

  1. Use Amazon SageMaker Serverless Inference to deploy the model.
  2. Use Amazon CloudFront to deploy the model.
  3. Use Amazon API Gateway to host the model and serve predictions.
  4. Use AWS Batch to host the model and serve predictions.

Answer(s): A

Explanation:

Amazon SageMaker Serverless Inference allows the company to deploy the ML model without managing any underlying infrastructure, making it suitable for hosting the model and serving predictions. The other options do not directly provide serverless model deployment capabilities.



An AI company periodically evaluates its systems and processes with the help of independent software vendors (ISVs). The company needs to receive email message notifications when an ISV's compliance reports become available.
Which AWS service can the company use to meet this requirement?

  1. AWS Audit Manager
  2. AWS Artifact
  3. AWS Trusted Advisor
  4. AWS Data Exchange

Answer(s): B

Explanation:

AWS Artifact provides access to compliance reports, including those from independent software vendors (ISVs). The company can use AWS Artifact to receive notifications when new compliance reports are available. The other services are not used for accessing and notifying about compliance reports.



A company wants to use a large language model (LLM) to develop a conversational agent. The company needs to prevent the LLM from being manipulated with common prompt engineering techniques to perform undesirable actions or expose sensitive information.
Which action will reduce these risks?

  1. Create a prompt template that teaches the LLM to detect attack patterns.
  2. Increase the temperature parameter on invocation requests to the LLM.
  3. Avoid using LLMs that are not listed in Amazon SageMaker.
  4. Decrease the number of input tokens on invocations of the LLM.

Answer(s): A

Explanation:

Creating a prompt template that helps the LLM detect common attack patterns can reduce the risk of prompt injection and other undesirable manipulations. The other options do not effectively address the risk of prompt manipulation or unauthorized use.



A company is using the Generative AI Security Scoping Matrix to assess security responsibilities for its solutions. The company has identified four different solution scopes based on the matrix.
Which solution scope gives the company the MOST ownership of security responsibilities?

  1. Using a third-party enterprise application that has embedded generative AI features.
  2. Building an application by using an existing third-party generative AI foundation model (FM).
  3. Refining an existing third-party generative AI foundation model (FM) by fine-tuning the model by using data specific to the business.
  4. Building and training a generative AI model from scratch by using specific data that a customer owns.

Answer(s): D

Explanation:

Building and training a generative AI model from scratch gives the company the most ownership of security responsibilities, as it involves full control over data, training, deployment, and security measures. The other options involve varying levels of dependency on third-party tools and services, which reduces the company's ownership of security.



Viewing page 7 of 48
Viewing questions 31 - 35 out of 233 questions



Post your Comments and Discuss Amazon AIF-C01 exam prep with other Community members:

AIF-C01 Exam Discussions & Posts