"

2.9 End of Chapter Activities

Exercises

Discussion Questions

  1. Why is the AI arms race particularly relevant in ML security?
  2. How can organizations stay ahead of attackers in the AI arms race?

Knowledge Check 

Quiz Text Description
1. MultiChoice Activity
Which of the following is a common category of ML attacks?
  1. Integrity Attacks
  2. All of the Above
  3. Privacy Attacks
  4. Evasion Attacks
2. MultiChoice Activity
In a causative attack, what is the main objective of the attacker?
  1. To manipulate the training data to degrade classifier accuracy
  2. To explore the decision boundary of the model
  3. To manipulate test data for incorrect classification
  4. To modify the model’s decision boundary
3. MultiChoice Activity
Which type of attack aims to prevent legitimate users from accessing machine learning services?
  1. Integrity Attacks
  2. Availability Attacks
  3. Evasion Attacks
  4. Privacy Attacks
4. MultiChoice Activity
What is the main difference between black-box and white-box attacks?
  1. White-box attackers have full access to model architecture, while black-box attackers have limited access
  2. White-box attacks are more likely to succeed than black-box attacks
  3. Black-box attacks target model predictions, while white-box attacks target data
  4. Black-box attackers have full access to model architecture, while white-box attackers have limited access
5. MultiChoice Activity
Which of the following best describes the concept of “security by design”?
  1. Implementing security features after attacks have occurred
  2. Hiding system details from attackers to avoid exploitation
  3. Designing systems with inherent security features from the outset
  4. Relying on human oversight to ensure security post-deployment

Correct Answers:
  1. b. All of the Above
  2. a. To manipulate the training data to degrade classifier accuracy
  3. b. Availability Attacks
  4. a. White-box attackers have full access to model architecture, while black-box attackers have limited access
  5. c. Designing systems with inherent security features from the outset

High Flyer. (2025). Deep Seek. [Large language model]. https://www.deepseek.com/

Prompt: Can you provide end-of-chapter questions for the content?  Reviewed and edited by the author.

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Winning the Battle for Secure ML Copyright © 2025 by Bestan Maaroof is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.