PYTORCH QUIZ DESCRIPTION

In TensorFlow, packages like ________ provide higher-level abstractions over raw computational graphs that are useful for building neural networks.
 

  • Keras 
     

  • TenserFlow-Slim 
     

  • TELearn

     

  • All Of The Above  
     

After the encryption stage in SSL, the maximum length of each fragment is 

  • 2^14+1028
     

  • 2^14+2048
     

  • 2^16+1028
     

  • 2^16+2048

_____________ is a technique or way to find the linear relation between the dependent variable and the independent variable by minimizing the distance.
 

  • Linear Regression 
     

  • Bilinear Regression
     

  • Discrete Regression
     

  • All of the above

Which of the following are the advantages of PyTorch?
 

  • It is easy to debug and understand the code
     

  •  It includes many layers as Torch
     

  •  It includes lot of loss functions
     

  • All of the above    

Which of the following is the wire protocol for WebScoket?

  • RFC6455
     

  •  RFC6477
     

  •  RFC6567
     

  • RFC8967

In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?

  • Fortezza
     

  • Anonymous Diffie-Hellman
     

  • Fixed Diffie-Hellman
     

  •  RSA

The ____________package in PyTorch abstracts the idea of an optimization algorithm and provides implementations of commonly used optimization algorithms.
 

  • Optim 
     

  • Tensor
     

  • numpy
     

  • None Of these 

PyTorch is known for having _________ levels of abstraction.

  • 1

  • 2

  • 3

  • 4

For duplex communication we can't use___

  • Long Polling 
     

  • HTML5
     

  •  JavaScript
     

  • Streaming

Which of the following is the server library for Node.js? 

  •  Caddy
     

  • SignalR
     

  •  ws
     

  •  jsonrpc

Which is the key exchange algorithm used in CipherSuite parameter? 

  • RSA
     

  • Fixed Diffie-Hellman
     

  • Ephemeral Diffie-Hellman 
     

  • Any of the mentioned

_________ is an open-source machine learning library for Python and is completely based on Torch.

  • Flask
     

  • PyTorch 
     

  •  PyBrain
     

  • CherryPy

Which one is not a very good developer support?

  • Opera
     

  • Internet Explorer
     

  • Firefox
     

  • Chrome

Which protocol consists of only 1 bit?

  • Alert Protocol
     

  • Handshake Protocol
     

  • Upper-Layer Protocol
     

  • Change Cipher Spec Protocol

Which protocol consists of only 1 bit?

  • Alert Protocol
     

  •  Handshake Protocol
     

  •  Upper-Layer Protocol
     

  •  Change Cipher Spec Protocol

The _______________function receives the gradient of the output Tensors with respect to some scalar value, and computes the gradient of the input Tensors with respect to that same scalar value.

  • Forward 
     

  • Backward
     

  • None of these
     

  • both

Which protocol is used for the purpose of copying the pending state into the current state?

  • Alert Protocol
     

  • Handshake Protocol
     

  • Upper-Layer Protocol
     

  • Change Cipher Spec Protocol

The torch.cuda is a package which adds support for CUDA tensor type.
 

  • TRUE
     

  • FALSE
     

  •  Can be true or false
     

  •  Can not say

The RSA signature uses which hash algorithm?

  • MD5
     

  •  SHA-1
     

  •  MD5 and SHA-1
     

  • None of the mentioned.

In the Key generation procedure, the Integrity Key from the client to server is represented as:

  • HASH(K||H||"E"|| session_id)
     

  •  HASH(K||H||"C" || session_id)
     

  • HASH(K||H||"B"|| session_id)
     

  • HASH(K||H||"D"|| session_id)

Consider the following example –
Size of Plaintext - 48 bytes.
Size of MAC - 20 bytes.
Block Length - 8 bytes.
How many bytes of padding need to be added to the system?

  • 1

  • 2

  • 3

  • 4

A Tensor is an _________________

  • Dimensional Array
     

  • Bi-dimentional Array
     

  • n-dimensional Array  
     

  • None of these

Number of phases in the handshaking protocol?

  • 2

  • 3

  • 4

  • 5

The Conv1d and Conv2D is used to apply 1D and 2D convolution.

  • TRUE 
     

  • FALSE
     

  •  Can be true or false
     

  • Can not say

What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

  • 42 bytes
     

  • 32 bytes
     

  • 36 bytes
     

  •  48 bytes

The nn package defines a set of Modules, which are roughly equivalent to neural network layers.

  • Modules 
     

  • Layers
     

  • Groups
     

  • None of these

The certificate_verify message involves the process defined by the pseudo-code (in terms of MD5) -CertificateVerify.signature.md5_hash MD5(master_secret || pad_2 ||MD5(handshake_messages ||master_secret || pad_1).Is there any error? If so, what

  • Yes. pad_1 and pad_2 should be interchanged
     

  •  Yes. pad's should be present towards the end
     

  • Yes. master_key should not be used, the pre_master key should be used

     

  •  No Error

Which one is not associated with Gecko?

  • Firefox
     

  • SeaMonkey
     

  • Thunderbird
     

  • Internet Explorer

In the Handshake protocol action, which is the last step of the Phase 2: Server Authentication and Key Exchange? 

  •  server_done 
     

  •  server_key_exchange
     

  • certificate_request
     

  • crtificate_verify

In the SSL record protocol operation pad_1 is -

  •  is the byte 0x36 repeated 40 times for MD5
     

  • is the byte 0x5C repeated 40 times for MD5
     

  •  is the byte 0x5C repeated 48 times for SHA1 
     

  •  is the byte 0x36 repeated 48 times for MD5