answer the attached questions l. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right

answer the attached questions

l. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right answers.
What type of technology enables this?
A. Artificial intelligence
B. Cloud computing
C) Machine learning.

2. Insufficient testing and lack of samples provided to Finite’s chatbot during the training phases are considered
as Refer to scenario I.
A. Threats
B. Vulnerabilities
C. Risks.

Scenario 1: Fintive is a distinguished security provider for online payments and protection solutions. Founded in
1999 by Thomas Fin in San Jose, California, Fintive offers services to companies that operate online and want to
improve their information security, prevent fraud, and protect user information such as PIl. Fintive centers its
decision-making and operating process based on previous cases. They gather customer data, classify them
depending on the case, and analyze them. The company needed a large number of employees to be able to
conduct such complex analyses. After some years, however, the technology that assists in conducting such
analyses advanced as well. Now, Fintive is planning on using a modern tool, a chatbot, to achieve pattern
analyses toward preventing fraud in real-time. This tool would also be used to assist in improving customer
service.
This initial idea was communicated to the software development team, who supported it and were assigned to
work on this project. They began integrating the chatbot on their existing system. In addition, the team set an
objective regarding the chatbot which was to answer 85% of ali chat queries.
After the successful integration of the chatbot, the company immediately released it to their customers for use.
The chatbot, however, appeared to have some issues.
Due to insufficient testing and lack of samples provided to the chatbot during the training phase, in which it was
supposed “to learn” the queries pattern, the chatbot failed to address user queries and provide the right answers.
Furthermore, the chatbot sent random files to users when it received invalid inputs such as odd patterns of dots
and special characters. Therefore, the chatbot was unable to properly answer customer queries and the
traditional customer support was overwhelmed with chat queries and thus was unable to help customers with
their requests.
Consequently, Fintive established a software development policy. This policy specified that whether the software
is developed in-house or outsourced, it will undergo a black box testing prior to its implementation on operational
systems.

3. Based on scenario 1, the chatbot was unable to properly answer customer queries. Which principle of
information security has been affected in this case?
A. Availability
B. Integrity
C. Confidentiality.

What type of security control does the use of black box testing represent? Refer to scenario I.
A. Corrective and technical
B. Detective and managerial
C Preventive and technical.

5. According to scenario 1,
received invalid inputs. What impact might that lead to?
A. Inability to provide service
B. Loss Of reputation
C. Leak of confidential information.

6. Which situation presented below represents a threat?
A. HackX uses and distributes pirated software
B. The information security training was provided to only the IT team members of the organization
C. Hackers compromised the administrator account by cracking the

Password.

7. An organization does not check the source code of the updated version Of an application when it is updated
automatically. Thus, the application may be open to unauthorized modifications. This represents a
that may impact information
A. (1) Threat, (2) confidentiality
B. (1) Risk, (2) availability
C. (1) Vulnerability, (2) integrity.

8. A telecommunications company uses the AES method for ensuring that
confidential information is protected. This means that they use a single key to encrypt and decrypt the
information. What kind of control does the company use?
A. Detective
B. Corrective
C. Preventive.

9. You received an email requiring you to send information such as name, email, and password in order to
continue using your email account. If you do not send such information, your email account will be disabled. What
does this scenario Present?
A. personnel type of vulnerability
B. An unauthorized action type of threat
C. A compromise of information type of threat.

10. Which statement below best describes the relationship between information security aspects?
A. Threats exploit vulnerabilities to damage or destroy assets B. Controls protect assets by reducing threats
C. Risk is a function of vulnerabilities that harm assets.

11. Which of the options below is a control related to the management of personnel at aims to avoid the
occurrence of incidents?
A. The organization regularly provides security awareness and training sessions for its employees
B. The organization always reviews the security policy after the integration of a new division to the organization
C. The organization conducts regular user access reviews to verify that only authorized employees have access
to confidential information.

12. A data processing tool crashed when a user added more data in the buffer than its storage capacity allows.
The incident was caused by the tool’s inability to bound check arrays. What kind of vulnerability is this?
A. Intrinsic vulnerability. because inability to bound check arrays is a characteristic of the data processing tool
B. Extrinsic vulnerability because inability to bound check arrays is related to external factors
C. None, the tool’s inability to bound check arrays is not a vulnerability, but a threat.

13. Pay Bell, a finance corporation, is using some services with the potential to bypass all the governance
processes that are in place in order to ensure proper security of the company. What type of services are these?
A. Machine learning services
B. Cloud services
c. Artificial intelligence services.

14. FTP uses clear text passwords for authentication. This is an FTP:
A. Vulnerability
B. Risk
C. Threat.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Organizational Culture and Design

 You have studied the organizational culture in place at IDEO and are making a presentation about this company to your company’s top management team. Describe the organizational culture at IDEO. Analyze techniques used by IDEO to embed organizational culture. Identify the organizational culture used by your organization/company. Make a recommendation

Step 1 Think about a particular community and family within

  Step 1 Think about a particular community and family within that community that you are familiar with. Reference that community and family in your answers to the following prompts. Step 2 Answer the following questions in your initial post due Wednesday at 11:59 pm Mountain Time: Describe the relationship

Please provide feedback to the below. I found an interesting

Please provide feedback to the below.    I found an interesting article that summarizes what ethical leadership is, the importance of being ethical, and how to become an ethical leader. What is interesting the author of the article says that being an ethical leader is more than just having strong

372 solve new 1 Nursing Assignment Help

Expert Solution Preview Introduction: As a medical professor, my role involves designing and conducting lectures, evaluating student performance, and providing feedback through examinations and assignments. I aim to foster a comprehensive understanding of medical concepts and promote critical thinking skills among my students. Through a combination of theoretical knowledge and

Prior to beginning work on this discussion forum, read Chapter

Prior to beginning work on this discussion forum, read Chapter 11: Cost of Capital in the Foundations of Financial Management textbook, watch the Week 3 Discussion video with Dr. Kevin Kuznia, DBA, CSSBB, PMP, and review the WACC and Cost of Capital Allocation (Links to an external site.) interactive. Initial Response: For

Code of Ethics Kay Munoz posted Apr 21, 2022 9:09

Code of Ethics Kay Munoz posted Apr 21, 2022 9:09 PM Select a code of ethics. For example, “The American Society for Public Administration (ASPA) exists to advance the science, processes, and art of public administration. The Society affirms its responsibility to develop the spirit of professionalism within its membership,

What are the topics that came up over and over

  What are the topics that came up over and over again in Pt 1 and Pt 2. Create at least five themes you discovered in your academic research that relates to your population/area of interest. Synthesize and explain each theme using at least 200 words for each. This information

Slosson oral reading test

 Write a 4-6 page test critique of the Slosson Oral Reading Test, elements described below, APA style, as outlined in the APA Manual, must be used. Points will be forfeited if proper format is not used. The following elements must be incorporated into a critique of psychological assessment instrument: *Test

Considere la siguiente tabla donde se presenta el evento de

Considere la siguiente tabla donde se presenta el evento de que una acción cierre en alza o en baja hoy y el evento de lo mismo pero al día siguiente (debe presentar los resultados adjuntando un archivo de Excel donde cada parte debe ser una página del archivo): Cierra en

Please check out the attached files: I need help with

Please check out the attached files: I need help with this project by following the instructions below: 1. There is a file named “SeniorDesignTechReport” I want to change the report style/format to make it match the file named “Style”. After changing the style/format, 2. I uploaded all the weekly progress

Sage bookkeeping programming is a fantastic bookkeeping answer for overseeing

   Sage bookkeeping programming is a fantastic bookkeeping answer for overseeing business finance. The arrangement accompanies astounding elements to assist clients with effectively dealing with their business record and lift business efficiency. In spite of the fact that it is integrated with fantastic elements Sage programming can in any case

ENVIRONMENTAL AND BIOLOGICAL EFFECTS ON INTELLIGENCE AND ACHIEVEMENT Intelligence tests

  ENVIRONMENTAL AND BIOLOGICAL EFFECTS ON INTELLIGENCE AND ACHIEVEMENT Intelligence tests are controversial, partly because they sometimes determine important aspects of people’s lives. For example, intelligence test scores have factored into determining school placement, identifying giftedness, and diagnosing mental retardation and learning disabilities. Even when an intelligence test shows that

Is it true that you are feeling stupefied as you

   Is it true that you are feeling stupefied as you are neglected to get the applicable answers for resolve the Sage sbddesktop.exe mistake? Try not to feel restless as we can help you out to make the product liberated from a similar blunder with the goal that you can

SOAP note: Adult (Any Adult or Chronic) Condition · Pick

   SOAP note: Adult (Any Adult or      Chronic) Condition · Pick any Chronic Disease ( Diabetes Mellitus) · Must use the sample template for your soap note, keep this template for when you start clinicals. · Templates used from another classes will not be accepted. Student must use the template

Allegany College of Maryland Covid19 Issues and Treatment PPT Nursing Assignment Help

Allegany College of Maryland Covid19 Issues and Treatment PPT Expert Solution Preview Introduction: As a medical professor, my role involves creating college assignments and evaluating student performance in medical colleges. I also design and conduct lectures, providing necessary guidance and feedback for the students’ overall development. Additionally, I am responsible

Write a two-page (max) paper analyzing the fact pattern presented

Write a two-page (max) paper analyzing the fact pattern presented below.  Please use federal law, your own state law, or military law.  Your analysis should include application of the topics covered during the past seven weeks.  For example, search and seizure, search warrants, execution of warrants, exceptions to the warrant

Interview one of your classmates and ask them what they

  Interview one of your classmates and ask them what they think about the articles they read each week. Were there any recommendations for practice that they thought could be implemented in their clinical practice tomorrow? Next week? Next year? What is their rationale? Do you agree or disagree?  Remember

Pioneer Aircraft Co.

Unit II Essay Pioneer Aircraft Co. sells private, single-engine planes. Most sales are for customers engaged in private and leisure flying. In a 50-week period, sales in the past five years have averaged to the following: PLANES SOLD 0 1 2 3 WEEKS THIS NUMBER SOLD 40 8 1 1