Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

IAPP AIGP Actual Questions

Page: 12 / 12
Total 165 questions

Artificial Intelligence Governance Professional Questions and Answers

Question 45

An AI system's function, the industry and the location in which it operates are important factors in considering which of the following?

Options:

A.

Organizational accountability.

B.

Internal governance needs.

C.

Diversity of data sources.

D.

Explainability of results.

Question 46

You are the chief privacy officer of a medical research company that would like to collect and use sensitive data about cancer patients, such as their names, addresses, race and ethnic origin, medical histories, insurance claims, pharmaceutical prescriptions, eating and drinking habits and physical activity.

The company will use this sensitive data to build an Al algorithm that will spot common attributes that will help predict if seemingly healthy people are more likely to get cancer. However, the company is unable to obtain consent from enough patients to sufficiently collect the minimum data to train its model.

Which of the following solutions would most efficiently balance privacy concerns with the lack of available data during the testing phase?

Options:

A.

Deploy the current model and recalibrate it over time with more data.

B.

Extend the model to multi-modal ingestion with text and images.

C.

Utilize synthetic data to offset the lack of patient data.

D.

Refocus the algorithm to patients without cancer.

Question 47

Training data is best defined as a subset of data that is used to?

Options:

A.

Enable a model to detect and learn patterns.

B.

Fine-tune a model to improve accuracy and prevent overfitting.

C.

Detect the initial sources of biases to mitigate prior to deployment.

D.

Resemble the structure and statistical properties of production data.

Question 48

All of the following are potential benefits of using private over public LLMs EXCEPT?

Options:

A.

Reduction in time taken for data validation and verification.

B.

Confirmation of security and confidentiality.

C.

Reduction in possibility of hallucinated information.

D.

Application for specific use cases within the enterprise.

Page: 12 / 12
Total 165 questions