Nader Gamal WDP - Nader Gamal
Nader Gamal WDP - Nader Gamal
1. What type of attack tries to determine if a specific data point was used in training a
model?
A) Data poisoning
B) Contextual attack
C) Membership inference
D) Model inversion
5. What approach helps organizations align generative AI use with legal obligations?
A) Open data sharing
B) Innovation-first development
C) Privacy by design
D) Model scaling
Paper 1 MCQ (6-10)
6. What does differential privacy primarily use to protect individual data?
A) Secure channels
B) Encryption keys
C) Noise injection
D) Data masking
7. Which technique enables decentralized model training without sharing raw data?
A) Secure MPC
B) Federated Learning
C) Data anonymization
D) Homomorphic Encryption
10. What is a major privacy concern when using synthetic data in sensitive fields like
healthcare and finance?
A) High storage costs
B) Risk of data re-identification
C) Overfitting to public datasets
D) Difficulty in generating realistic images
Paper 1 Essay (11-15)
15. How can synthetic data help prevent data leakage in AI models?
23. Generate synthetic data from real network traffic log to help training attack
detection model.
A) GAN
B) LLM
C) GDM
D) VAE
24. Which generative AI model uses an encoder to map input data into a latent space
and a decoder to generate samples?
A) GAN
B) GDM
C) LLM
D) VAE
25. Convert secret key to image and learn to generate secret shares based on images.
A) LLM
B) GDM
C) GAN
D) VAE
Paper 2 Essay (26-30)