專家 Certification Practice Exam
專家-level practice exam covering frontier research, novel attacks, and advanced defense architectures.
評估 概覽
Expert-level practice exam covering frontier research, novel attacks, and advanced 防禦 architectures. This 評估 tests both theoretical 理解 and practical application of the covered material.
評估 Details:
- Questions: 15
- Time Limit: 45 minutes recommended
- Passing Score: 70%
- Difficulty: Expert
Instructions
- Read each question carefully, including all answer options, before selecting your response
- Some questions have multiple correct approaches — select the best answer
- Scenario-based questions require you to 考慮 the full context before answering
- After completing the 評估, review the explanations for all questions — including those you answered correctly
評估 Format
This 評估 consists of multiple-choice questions, scenario-based analysis, and practical application questions. Each question tests a specific competency area and maps to curriculum learning objectives.
Competency Areas Tested
| Competency Area | Questions | Weight |
|---|---|---|
| Theoretical Knowledge | 3-4 | 30% |
| Practical Application | 3-4 | 30% |
| Scenario Analysis | 2-3 | 25% |
| Tool Proficiency | 1-2 | 15% |
理解 the weight distribution helps you prioritize your study time. Practical application and scenario analysis carry the highest combined weight, reflecting the importance of hands-on skills in AI 紅隊演練.
Question 1
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 2
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 3
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 4
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 5
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 6
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 7
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 8
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 9
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 10
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 11
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 12
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 13
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 14
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Question 15
Based on the concepts covered 在本 評估 area, which approach most effectively addresses the primary 漏洞 class being tested?
Scoring Guide
| Score Range | 評估 | Recommendation |
|---|---|---|
| 90-100% | Expert | Ready to proceed to the next section |
| 80-89% | Proficient | Minor gaps to address through targeted review |
| 70-79% | Competent | Review incorrect areas before proceeding |
| 60-69% | Developing | Revisit the corresponding curriculum sections |
| Below 60% | Foundational | Complete the prerequisite material before retaking |
Study Resources
If you scored below the passing threshold, focus your review on:
- The specific topics where you answered incorrectly
- The hands-on labs that correspond to your weakest areas
- The reference materials for frameworks and tools mentioned in the questions
- Chao et al. 2023 — "Jailbreaking Black-Box Large Language Models in Twenty Queries" (PAIR)
Recommended Review Path
- Re-read the relevant curriculum sections, focusing on concepts you missed
- Practice the hands-on labs associated with your weakest competency areas
- Review the reference materials and research papers cited in the questions
- Retake the 評估 after completing your review to measure improvement
Key Concepts to Review
Before retaking the 評估, ensure you are comfortable with these foundational concepts:
| Concept | Description | Where to Review |
|---|---|---|
| 防禦-in-depth | Layered 安全 architecture with multiple independent defensive mechanisms | 防禦 & 緩解 section |
| Prompt injection taxonomy | Classification of direct, indirect, and 訓練-time injection attacks | Foundations section |
| Tool and 代理 安全 | 安全 boundaries in 函式呼叫, MCP, and multi-代理 systems | 代理式 利用 section |
| Governance frameworks | EU AI Act, NIST AI RMF, ISO 42001, OWASP LLM Top 10 | Governance & Compliance section |
| Risk scoring | Methodologies for assessing likelihood, impact, and exploitability of AI 漏洞 | Methodology section |
| Incident response | Procedures for detecting, containing, and recovering from AI 安全 incidents | AI Forensics & IR section |
Practice Strategies
Effective preparation for this 評估 requires both theoretical study and practical hands-on experience:
-
Complete the labs: Hands-on labs in the curriculum provide essential practical experience that cannot be gained from reading alone. Focus on labs that correspond to your weakest 評估 areas.
-
Build mental models: 對每個 漏洞 class, develop a clear mental model of the attack mechanism, the defensive measures that address it, and the residual risks that remain after 防禦 deployment.
-
Study real incidents: Review the case studies in the curriculum to 理解 how theoretical 漏洞 manifest in real-world incidents. Pay 注意力 to the root causes and defensive failures.
-
Practice tool usage: Proficiency with tools like Garak, PyRIT, and Promptfoo is tested 在本 評估. Ensure you can configure and run these tools without reference documentation.
-
理解 frameworks: Be able to map findings to MITRE ATLAS, OWASP LLM Top 10, and relevant regulatory frameworks. This skill is critical for professional 紅隊 reporting.
評估 Integrity
This 評估 is designed for honest self-評估. To get the most value:
- Attempt all questions before checking answers
- Time yourself to simulate real 評估 conditions
- Do not use external references during the first attempt
- Review all explanations regardless of whether you answered correctly
- Track your progress across multiple attempts to measure improvement
參考文獻 and Further Reading
- Chao et al. 2023 — "Jailbreaking Black-Box Large Language Models in Twenty Queries" (PAIR)
- MITRE ATLAS (對抗性 Threat Landscape for AI Systems)
- OWASP LLM Top 10 2025 — LLM07 (Insecure Plugin Design)
What is the most effective approach to defending against the attack class covered 在本 article?
Why do the techniques described 在本 article remain effective across different model versions and providers?