exam questions

Exam AWS Certified AI Practitioner AIF-C01 All Questions

View all questions & answers for the AWS Certified AI Practitioner AIF-C01 exam

Exam AWS Certified AI Practitioner AIF-C01 topic 1 question 20 discussion

A company wants to use AI to protect its application from threats. The AI solution needs to check if an IP address is from a suspicious source.
Which solution meets these requirements?

  • A. Build a speech recognition system.
  • B. Create a natural language processing (NLP) named entity recognition system.
  • C. Develop an anomaly detection system.
  • D. Create a fraud forecasting system.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jove
Highly Voted 2 months ago
Selected Answer: C
An anomaly detection system is designed to identify unusual patterns or behaviors within data
upvoted 6 times
...
galliaj
Highly Voted 2 months, 1 week ago
Anomaly detection systema can be used to identify patterns that deviate from the norm. This makes them ideal for analyzing incoming IP addresses and flag suspicious IPs based on traffic patterns.
upvoted 5 times
...
eesa
Most Recent 1 month ago
Selected Answer: C
Anomaly detection systema can be used to identify patterns that deviate from the norm. This makes them ideal for analyzing incoming IP addresses and flag suspicious IPs based on traffic patterns.
upvoted 1 times
...
Udyan
2 months ago
An anomaly detection system can analyze patterns and behaviors, such as IP address access patterns, to detect any deviations from the norm, which could indicate suspicious or malicious activity. An anomaly detection model can flag unusual access attempts, such as those from suspicious IP addresses, making it well-suited for threat detection. Fraud forecasting (option D) typically focuses on predicting potential fraud patterns rather than real-time anomaly detection, so it would not directly address the need to check IP addresses for suspicious activity. Thus, option C is the most suitable choice for identifying suspicious IP addresses in this scenario.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago