exam questions

Exam AWS Certified AI Practitioner AIF-C01 All Questions

View all questions & answers for the AWS Certified AI Practitioner AIF-C01 exam

Exam AWS Certified AI Practitioner AIF-C01 topic 1 question 20 discussion

A company wants to use AI to protect its application from threats. The AI solution needs to check if an IP address is from a suspicious source.
Which solution meets these requirements?

  • A. Build a speech recognition system.
  • B. Create a natural language processing (NLP) named entity recognition system.
  • C. Develop an anomaly detection system.
  • D. Create a fraud forecasting system.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jove
Highly Voted 4 months ago
Selected Answer: C
An anomaly detection system is designed to identify unusual patterns or behaviors within data
upvoted 8 times
...
Udyan
Highly Voted 3 months, 3 weeks ago
An anomaly detection system can analyze patterns and behaviors, such as IP address access patterns, to detect any deviations from the norm, which could indicate suspicious or malicious activity. An anomaly detection model can flag unusual access attempts, such as those from suspicious IP addresses, making it well-suited for threat detection. Fraud forecasting (option D) typically focuses on predicting potential fraud patterns rather than real-time anomaly detection, so it would not directly address the need to check IP addresses for suspicious activity. Thus, option C is the most suitable choice for identifying suspicious IP addresses in this scenario.
upvoted 5 times
...
Jessiii
Most Recent 3 weeks, 1 day ago
Selected Answer: C
Develop an anomaly detection system: Anomaly detection is a technique used to identify unusual patterns in data, such as suspicious IP addresses that deviate from normal behavior. By monitoring and analyzing network traffic, an anomaly detection system can flag IP addresses that exhibit abnormal behavior or characteristics that are indicative of potential threats. This is the most appropriate approach for identifying suspicious sources.
upvoted 1 times
...
85b5b55
1 month, 1 week ago
Selected Answer: C
Using Anomalies, patterns, and behaviours refers to identifying the event.
upvoted 1 times
...
eesa
2 months, 3 weeks ago
Selected Answer: C
Anomaly detection systema can be used to identify patterns that deviate from the norm. This makes them ideal for analyzing incoming IP addresses and flag suspicious IPs based on traffic patterns.
upvoted 1 times
...
galliaj
4 months ago
Anomaly detection systema can be used to identify patterns that deviate from the norm. This makes them ideal for analyzing incoming IP addresses and flag suspicious IPs based on traffic patterns.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago