최신 Databricks-Generative-AI-Engineer-Associate 무료덤프 - Databricks Certified Generative AI Engineer Associate
A Generative AI Engineer just deployed an LLM application at a digital marketing company that assists with answering customer service inquiries.
Which metric should they monitor for their customer service LLM application in production?
Which metric should they monitor for their customer service LLM application in production?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A Generative Al Engineer has already trained an LLM on Databricks and it is now ready to be deployed.
Which of the following steps correctly outlines the easiest process for deploying a model on Databricks?
Which of the following steps correctly outlines the easiest process for deploying a model on Databricks?
정답: A
A Generative AI Engineer is building an LLM to generate article summaries in the form of a type of poem, such as a haiku, given the article content. However, the initial output from the LLM does not match the desired tone or style.
Which approach will NOT improve the LLM's response to achieve the desired response?
Which approach will NOT improve the LLM's response to achieve the desired response?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A Generative AI Engineer is tasked with deploying an application that takes advantage of a custom MLflow Pyfunc model to return some interim results.
How should they configure the endpoint to pass the secrets and credentials?
How should they configure the endpoint to pass the secrets and credentials?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A Generative Al Engineer has successfully ingested unstructured documents and chunked them by document sections. They would like to store the chunks in a Vector Search index. The current format of the dataframe has two columns: (i) original document file name (ii) an array of text chunks for each document.
What is the most performant way to store this dataframe?
What is the most performant way to store this dataframe?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A Generative AI Engineer is developing an LLM application that users can use to generate personalized birthday poems based on their names.
Which technique would be most effective in safeguarding the application, given the potential for malicious user inputs?
Which technique would be most effective in safeguarding the application, given the potential for malicious user inputs?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)