PYTORCH QUIZ DESCRIPTION Total Questions −30 00 Max Time − 15:00 In TensorFlow, packages like ________ provide higher-level abstractions over raw computational graphs that are useful for building neural networks. Keras TenserFlow-Slim TELearn All Of The Above After the encryption stage in SSL, the maximum length of each fragment is 2^14+1028 2^14+2048 2^16+1028 2^16+2048 _____________ is a technique or way to find the linear relation between the dependent variable and the independent variable by minimizing the distance. Linear Regression Bilinear Regression Discrete Regression All of the above Which of the following are the advantages of PyTorch? It is easy to debug and understand the code It includes many layers as Torch It includes lot of loss functions All of the above Which of the following is the wire protocol for WebScoket? RFC6455 RFC6477 RFC6567 RFC8967 In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems? Fortezza Anonymous Diffie-Hellman Fixed Diffie-Hellman RSA The ____________package in PyTorch abstracts the idea of an optimization algorithm and provides implementations of commonly used optimization algorithms. Optim Tensor numpy None Of these PyTorch is known for having _________ levels of abstraction. 1 2 3 4 For duplex communication we can't use___ Long Polling HTML5 JavaScript Streaming Which of the following is the server library for Node.js? Caddy SignalR ws jsonrpc Which is the key exchange algorithm used in CipherSuite parameter? RSA Fixed Diffie-Hellman Ephemeral Diffie-Hellman Any of the mentioned _________ is an open-source machine learning library for Python and is completely based on Torch. Flask PyTorch PyBrain CherryPy Which one is not a very good developer support? Opera Internet Explorer Firefox Chrome Which protocol consists of only 1 bit? Alert Protocol Handshake Protocol Upper-Layer Protocol Change Cipher Spec Protocol Which protocol consists of only 1 bit? Alert Protocol Handshake Protocol Upper-Layer Protocol Change Cipher Spec Protocol The _______________function receives the gradient of the output Tensors with respect to some scalar value, and computes the gradient of the input Tensors with respect to that same scalar value. Forward Backward None of these both Which protocol is used for the purpose of copying the pending state into the current state? Alert Protocol Handshake Protocol Upper-Layer Protocol Change Cipher Spec Protocol The torch.cuda is a package which adds support for CUDA tensor type. TRUE FALSE Can be true or false Can not say The RSA signature uses which hash algorithm? MD5 SHA-1 MD5 and SHA-1 None of the mentioned. In the Key generation procedure, the Integrity Key from the client to server is represented as: HASH(K||H||"E"|| session_id) HASH(K||H||"C" || session_id) HASH(K||H||"B"|| session_id) HASH(K||H||"D"|| session_id) Consider the following example – Size of Plaintext - 48 bytes. Size of MAC - 20 bytes. Block Length - 8 bytes. How many bytes of padding need to be added to the system? 1 2 3 4 A Tensor is an _________________ Dimensional Array Bi-dimentional Array n-dimensional Array None of these Number of phases in the handshaking protocol? 2 3 4 5 The Conv1d and Conv2D is used to apply 1D and 2D convolution. TRUE FALSE Can be true or false Can not say What is the size of the RSA signature hash after the MD5 and SHA-1 processing? 42 bytes 32 bytes 36 bytes 48 bytes The nn package defines a set of Modules, which are roughly equivalent to neural network layers. Modules Layers Groups None of these The certificate_verify message involves the process defined by the pseudo-code (in terms of MD5) -CertificateVerify.signature.md5_hash MD5(master_secret || pad_2 ||MD5(handshake_messages ||master_secret || pad_1).Is there any error? If so, what Yes. pad_1 and pad_2 should be interchanged Yes. pad's should be present towards the end Yes. master_key should not be used, the pre_master key should be used No Error Which one is not associated with Gecko? Firefox SeaMonkey Thunderbird Internet Explorer In the Handshake protocol action, which is the last step of the Phase 2: Server Authentication and Key Exchange? server_done server_key_exchange certificate_request crtificate_verify In the SSL record protocol operation pad_1 is - is the byte 0x36 repeated 40 times for MD5 is the byte 0x5C repeated 40 times for MD5 is the byte 0x5C repeated 48 times for SHA1 is the byte 0x36 repeated 48 times for MD5 Previous Next Total Question16 Wrong Answer13 Right Answer13