
SWU 개인정보보호 전문가 특강
Authored by Dan Kim
Science
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
OPEN ENDED QUESTION
1 min • 1 pt
What is an intrusion?
Evaluate responses using AI:
OFF
2.
OPEN ENDED QUESTION
1 min • 1 pt
What data can you extract from network traffic?
Evaluate responses using AI:
OFF
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
If you have bening samples only, what intrusion detection method are you going to use?
Classificaiton method
Anomay detection
None
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Can you type any feature variable(s) that can be used for network intrusion detection?
Evaluate responses using AI:
OFF
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of AI attack is this? Choose one correct answer. Someone added some wrong labelled sample on purpose.
Poison
Evasion
Trojan
Model stealing
No correct answer
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of AI attack is this? Choose one correct answer. Someone tried to extract decision boundary of a deployed machine learning model.
Poison
Evasion
Trojan
Model stealing
No correct answer
7.
OPEN ENDED QUESTION
1 min • 1 pt
Model stealing attacks in AI violate __________________.
Evaluate responses using AI:
OFF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?