PYTORCH QUIZ DESCRIPTION

For duplex communication we can't use___

  • Long Polling 
     

  • HTML5
     

  •  JavaScript
     

  • Streaming

The torch.cuda is a package which adds support for CUDA tensor type.
 

  • TRUE
     

  • FALSE
     

  •  Can be true or false
     

  •  Can not say

Which of the following is the wire protocol for WebScoket?

  • RFC6455
     

  •  RFC6477
     

  •  RFC6567
     

  • RFC8967

The__________ function computes output Tensors from input Tensors. 

  • Forward (ans)
     

  • Backward
     

  • None of these
     

  • both

After the encryption stage in SSL, the maximum length of each fragment is 

  • 2^14+1028
     

  • 2^14+2048
     

  • 2^16+1028
     

  • 2^16+2048

In the handshake protocol which is the message type first sent between client and server?

  •  server_hello
     

  •  client_hello
     

  • hello_request 
     

  • certificate_request

Which one is not a very good developer support?

  • Opera
     

  • Internet Explorer
     

  • Firefox
     

  • Chrome

Number of phases in the handshaking protocol?

  • 2

  • 3

  • 4

  • 5

Which of the following are the advantages of PyTorch?
 

  • It is easy to debug and understand the code
     

  •  It includes many layers as Torch
     

  •  It includes lot of loss functions
     

  • All of the above    

In the SSL record protocol operation pad_1 is -

  •  is the byte 0x36 repeated 40 times for MD5
     

  • is the byte 0x5C repeated 40 times for MD5
     

  •  is the byte 0x5C repeated 48 times for SHA1 
     

  •  is the byte 0x36 repeated 48 times for MD5

The certificate_request massage includes  two parameters, one of which is 

  • certificate_extension
     

  • certificate_creation
     

  • certificate_exchange 
     

  • certificate_type

The certificate_verify message involves the process defined by the pseudo-code (in terms of MD5) -CertificateVerify.signature.md5_hash MD5(master_secret || pad_2 ||MD5(handshake_messages ||master_secret || pad_1).Is there any error? If so, what

  • Yes. pad_1 and pad_2 should be interchanged
     

  •  Yes. pad's should be present towards the end
     

  • Yes. master_key should not be used, the pre_master key should be used

     

  •  No Error

Which protocol consists of only 1 bit?

  • Alert Protocol
     

  • Handshake Protocol
     

  • Upper-Layer Protocol
     

  • Change Cipher Spec Protocol

For duplex communication we can't use___

  • Long Polling 
     

  • HTML5
     

  •  JavaScript
     

  • Streaming

Which protocol consists of only 1 bit?

  • Alert Protocol
     

  •  Handshake Protocol
     

  •  Upper-Layer Protocol
     

  •  Change Cipher Spec Protocol

_________ is an open-source machine learning library for Python and is completely based on Torch.

  • Flask
     

  • PyTorch 
     

  •  PyBrain
     

  • CherryPy

The client_key_exchange message uses a pre master key of size -

  • 48 bytes
     

  •  56 bytes
     

  •  64 bytes
     

  •  32 bytes

In the Key generation procedure, the Integrity Key from the client to server is represented as:

  • HASH(K||H||"E"|| session_id)
     

  •  HASH(K||H||"C" || session_id)
     

  • HASH(K||H||"B"|| session_id)
     

  • HASH(K||H||"D"|| session_id)

Which of the following is not the event of WebSocket API?

  • Close
     

  • Message
     

  •  Send
     

  • Error

The ____________package in PyTorch abstracts the idea of an optimization algorithm and provides implementations of commonly used optimization algorithms.
 

  • Optim 
     

  • Tensor
     

  • numpy
     

  • None Of these 

The activation functions are basically divided into ________ types.
 

  • 1

  • 2

  • 3

  • 4

The Conv1d and Conv2D is used to apply 1D and 2D convolution.

  • TRUE 
     

  • FALSE
     

  •  Can be true or false
     

  • Can not say

The full form of SSL is 

  • Serial Session Layer
     

  •  Secure Socket Layer
     

  • Session Secure Layer
     

  •  Series Socket Layer
     

The nn package defines a set of Modules, which are roughly equivalent to neural network layers.

  • Modules 
     

  • Layers
     

  • Groups
     

  • None of these

Which protocol is used for the purpose of copying the pending state into the current state?

  • Alert Protocol
     

  • Handshake Protocol
     

  • Upper-Layer Protocol
     

  • Change Cipher Spec Protocol

Which one is not associated with Gecko?

  • Firefox
     

  • SeaMonkey
     

  • Thunderbird
     

  • Internet Explorer

MSE stands for ?
 

  • Machine Squared Error
     

  •  Mean Simple Error
     

  • Mean Squared Evaluate
     

  •  Mean Squared Error 

The maximum bytes for control frames is

  • 100 bytes
     

  • 125 bytes
     

  • 130 bytes
     

  • 150 bytes

PyTorch is known for having _________ levels of abstraction.

  • 1

  • 2

  • 3

  • 4

In the Handshake protocol action, which is the last step of the Phase 2: Server Authentication and Key Exchange? 

  •  server_done 
     

  •  server_key_exchange
     

  • certificate_request
     

  • crtificate_verify