
You are developing an intelligent agent as software to identify phishing emails. To develop, select, and optimize the model, a data set containing thousands of emails, either normal or phishing, is used for training, validation, and testing. Which of the following types of learning best describes the process? (Wentz QOTD)
A. Supervised learning
B. Unsupervised learning
C. Reinforcement learning
D. Machine learning
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is A. Supervised learning.
Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals.
Reference
您正在開發一個智能代理作為識別網絡釣魚電子郵件的軟件。 為了開發、選擇和優化模型,包含數千封電子郵件(普通電子郵件或網絡釣魚電子郵件)的數據集用於訓練、驗證和測試。 以下哪種學習類型最能描述該過程? (Wentz QOTD)
A. 監督學習
B. 非監督學習
C. 強化學習
D. 機器學習