- Mastering Machine Learning for Penetration Testing
- Chiheb Chebbi
- 232字
- 2021-06-25 21:03:07
Questions
- Although machine learning is an interesting concept, there are limited business applications in which it is useful. (True | False)
- Machine learning applications are too complex to run in the cloud. (True | False)
- For two runs of k-means clustering, is it expected to get the same clustering results? (Yes | No)
- Predictive models having target attributes with discrete values can be termed as:
(a) Regression models
(b) Classification models
- Which of the following techniques perform operations similar to dropouts in a neural network?
(a) Stacking
(b) Bagging
(c) Boosting
- Which architecture of a neural network would be best suited for solving an image recognition problem?
(a) Convolutional neural network
(b) Recurrent neural network
(c) Multi-Layer Perceptron
(d) Perceptron
- How does deep learning differ from conventional machine learning?
(a) Deep learning algorithms can handle more data and run with less supervision from data scientists.
(b) Machine learning is simpler, and requires less oversight by data analysts than deep learning does.
(c) There are no real differences between the two; they are the same tool, with different names.
- Which of the following is a technique frequently used in machine learning projects?
(a) Classification of data into categories.
(b) Grouping similar objects into clusters.
(c) Identifying relationships between events to predict when one will follow the other.
(d) All of the above.
推薦閱讀
- 物聯(lián)網(wǎng)與北斗應(yīng)用
- Mastering Machine Learning for Penetration Testing
- 光網(wǎng)絡(luò)評估及案例分析
- 社交電商運營策略、技巧與實操
- 走進物聯(lián)網(wǎng)
- Learning Karaf Cellar
- JBoss EAP6 High Availability
- Proxmox High Availability
- 通信簡史:從信鴿到6G+
- 夢工廠之材質(zhì)N次方:Maya材質(zhì)手冊
- 轉(zhuǎn)化:提升網(wǎng)站流量和轉(zhuǎn)化率的技巧
- 大型企業(yè)微服務(wù)架構(gòu)實踐與運營
- TCP/IP基礎(chǔ)(第2版)
- LwIP應(yīng)用開發(fā)實戰(zhàn)指南:基于STM32
- 圖神經(jīng)網(wǎng)絡(luò)前沿