answer the attached questions l. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right

answer the attached questions

l. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right answers.
What type of technology enables this?
A. Artificial intelligence
B. Cloud computing
C) Machine learning.

2. Insufficient testing and lack of samples provided to Finite’s chatbot during the training phases are considered
as Refer to scenario I.
A. Threats
B. Vulnerabilities
C. Risks.

Scenario 1: Fintive is a distinguished security provider for online payments and protection solutions. Founded in
1999 by Thomas Fin in San Jose, California, Fintive offers services to companies that operate online and want to
improve their information security, prevent fraud, and protect user information such as PIl. Fintive centers its
decision-making and operating process based on previous cases. They gather customer data, classify them
depending on the case, and analyze them. The company needed a large number of employees to be able to
conduct such complex analyses. After some years, however, the technology that assists in conducting such
analyses advanced as well. Now, Fintive is planning on using a modern tool, a chatbot, to achieve pattern
analyses toward preventing fraud in real-time. This tool would also be used to assist in improving customer
service.
This initial idea was communicated to the software development team, who supported it and were assigned to
work on this project. They began integrating the chatbot on their existing system. In addition, the team set an
objective regarding the chatbot which was to answer 85% of ali chat queries.
After the successful integration of the chatbot, the company immediately released it to their customers for use.
The chatbot, however, appeared to have some issues.
Due to insufficient testing and lack of samples provided to the chatbot during the training phase, in which it was
supposed “to learn” the queries pattern, the chatbot failed to address user queries and provide the right answers.
Furthermore, the chatbot sent random files to users when it received invalid inputs such as odd patterns of dots
and special characters. Therefore, the chatbot was unable to properly answer customer queries and the
traditional customer support was overwhelmed with chat queries and thus was unable to help customers with
their requests.
Consequently, Fintive established a software development policy. This policy specified that whether the software
is developed in-house or outsourced, it will undergo a black box testing prior to its implementation on operational
systems.

3. Based on scenario 1, the chatbot was unable to properly answer customer queries. Which principle of
information security has been affected in this case?
A. Availability
B. Integrity
C. Confidentiality.

What type of security control does the use of black box testing represent? Refer to scenario I.
A. Corrective and technical
B. Detective and managerial
C Preventive and technical.

5. According to scenario 1,
received invalid inputs. What impact might that lead to?
A. Inability to provide service
B. Loss Of reputation
C. Leak of confidential information.

6. Which situation presented below represents a threat?
A. HackX uses and distributes pirated software
B. The information security training was provided to only the IT team members of the organization
C. Hackers compromised the administrator account by cracking the

Password.

7. An organization does not check the source code of the updated version Of an application when it is updated
automatically. Thus, the application may be open to unauthorized modifications. This represents a
that may impact information
A. (1) Threat, (2) confidentiality
B. (1) Risk, (2) availability
C. (1) Vulnerability, (2) integrity.

8. A telecommunications company uses the AES method for ensuring that
confidential information is protected. This means that they use a single key to encrypt and decrypt the
information. What kind of control does the company use?
A. Detective
B. Corrective
C. Preventive.

9. You received an email requiring you to send information such as name, email, and password in order to
continue using your email account. If you do not send such information, your email account will be disabled. What
does this scenario Present?
A. personnel type of vulnerability
B. An unauthorized action type of threat
C. A compromise of information type of threat.

10. Which statement below best describes the relationship between information security aspects?
A. Threats exploit vulnerabilities to damage or destroy assets B. Controls protect assets by reducing threats
C. Risk is a function of vulnerabilities that harm assets.

11. Which of the options below is a control related to the management of personnel at aims to avoid the
occurrence of incidents?
A. The organization regularly provides security awareness and training sessions for its employees
B. The organization always reviews the security policy after the integration of a new division to the organization
C. The organization conducts regular user access reviews to verify that only authorized employees have access
to confidential information.

12. A data processing tool crashed when a user added more data in the buffer than its storage capacity allows.
The incident was caused by the tool’s inability to bound check arrays. What kind of vulnerability is this?
A. Intrinsic vulnerability. because inability to bound check arrays is a characteristic of the data processing tool
B. Extrinsic vulnerability because inability to bound check arrays is related to external factors
C. None, the tool’s inability to bound check arrays is not a vulnerability, but a threat.

13. Pay Bell, a finance corporation, is using some services with the potential to bypass all the governance
processes that are in place in order to ensure proper security of the company. What type of services are these?
A. Machine learning services
B. Cloud services
c. Artificial intelligence services.

14. FTP uses clear text passwords for authentication. This is an FTP:
A. Vulnerability
B. Risk
C. Threat.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

apa format 100-150 word minimum Peer Reply. Watch one student’s

apa format  100-150 word minimum    Peer Reply. Watch one student’s video and offer feedback. Please respond to these questions as you provide feedback: What are some items that stood out to you from a      delivery standpoint? What did you learn from the speech? Which main point(s)      stood out to

MACROECONOMICS Expected contents should include: -Introduction and context -Description of

MACROECONOMICSExpected contents should include: -Introduction and context -Description of policies pursued -Critique of policies -Alternative policies -Conclusion Contents should relate concepts learned in class to the real world scenario. Presentation Topics (to be assigned randomly): -American response to the 2008 recession -European response to the 2011 crisis -Trump’s response to

OL 620 Module Six Short Paper Guidelines and Rubric Overview:

 OL 620 Module Six Short Paper Guidelines and Rubric Overview: For this task, you will write a short paper addressing the concerns and strategy for executive compensation in a not-for-profit/charity setting.  Prompt: Begin by reading and critically analyzing the case study “Nonprofit Executive Compensation: How Much is Too Much?”  Then,

This is a team discussion (only one submission per team).

  This is a team discussion (only one submission per team). Read the following articles and provide a few recommendations that UIW leaders should follow so that UIW strategies can be successfully IMPLEMENTED in the current environment of health and economy challenges. This is not about what strategies they should

tep 1: Write a one to two-page paper on osteoarthritis.

  tep 1: Write a one to two-page paper on osteoarthritis.  Discuss what type of disease it is. Include what types of anatomy is affected in osteoarthritis Describe the physiological characteristics found in patients with osteoarthritis. Explain treatment options for patients with osteoarthritis. Assignment Expectations for Grading:   1. Demonstration of critical

This week you will be submitting a revised and improved

  This week you will be submitting a revised and improved evaluation proposal that includes the sections that were submitted in previous weeks. At this point, your design is in the proposal stage, so language related to the plan that you are proposing should be in future tense.  Please see

The Challenge of Cultural Relativism

Please read James Rachels, The Challenge of Cultural Relativism (pp. 421-433) in the SECOND section of your course text. While Rachels appreciates the value of being open and thoughtful in response to cultural diversity of opinion regarding morals, he gives a number of reasons why it is not philosophically viable

Posted here is this week assignment. Also look at the

Posted here is this week assignment. Also look at the attached doc files to see what have been completed so far to make it easier to put it together. The topic of the project is electric vehicles. This week, you will begin to synthesize the information you have gathered and

https://e-dition.jcrinc.com/ProxyLogin.aspx?lnk=02a12d392046 Dashboards are data visualizations that healthcare organizations use to

 https://e-dition.jcrinc.com/ProxyLogin.aspx?lnk=02a12d392046 Dashboards are data visualizations that healthcare organizations use to measure and analyze data. The Joint Commission (E-dition) sets standards for healthcare quality and safety. One set of standards The Joint Commission created is the National Patient Safety Goals (NPSG), which are designed for different facilities and are critical to

Bring your own device” What is it and what does

Bring your own device” What is it and what does it have to do with authentication? Why is it critical for IT managers to recommend security policies to manage it? Do some research and summarize your thoughts on how you would approach this issue. What security policies would you implement

Discussion: There are 8 Discussion Questions on Canvas, basically one

  Discussion:  There are 8 Discussion Questions on Canvas, basically one bi-weekly.  These are to be answered in roughly 300 words.  They are your thoughts (after reviewing the material).  Once an initial answer is posted, you will have access to others’ posts.  Please reply to at least one other student’s

Film Production: To which filmmaker do you look for inspiration and

1: Outline a 6-8 min. no-budget film that you could make this summer. Describe the form and content. It can be a fiction, documentary or experimental film, and should be a specific story that you are passionate about. (250 words max). 2: To which filmmaker do you look for inspiration

watch this nine-minute film entitled “OverCriminalized” as part of the

  watch this nine-minute film entitled “OverCriminalized” as part of the material on alcohol, tobacco, and other drugs: https://youtu.be/_66uT64YzbY (Links to an external site.) Third, watch “Fix It: Health Care at the Tipping Point,” which is a one-hour film embedded within the PowerPoint on healthcare within the US. Fourth, reflect on

Describe why the “discovery” of America was one of the

  Describe why the “discovery” of America was one of the “most  important events recorded in the history of mankind,” according to Adam  Smith.  2.Describe the different global economies that Europeans particiapated in or created during the European age of expansion.  3.One of the most striking features of Indian societies

PHC 271 Saudi Electronic University Health & Medical Paper Nursing Assignment Help

Expert Solution Preview Introduction: As a medical professor responsible for creating college assignments and evaluating student performance, my primary objective is to provide a comprehensive education that prepares medical college students for their future careers. Through lectures, examinations, and assignments, I aim to assess their understanding of medical concepts, critical