answer the attached questions l. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right

answer the attached questions

l. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right answers.
What type of technology enables this?
A. Artificial intelligence
B. Cloud computing
C) Machine learning.

2. Insufficient testing and lack of samples provided to Finite’s chatbot during the training phases are considered
as Refer to scenario I.
A. Threats
B. Vulnerabilities
C. Risks.

Scenario 1: Fintive is a distinguished security provider for online payments and protection solutions. Founded in
1999 by Thomas Fin in San Jose, California, Fintive offers services to companies that operate online and want to
improve their information security, prevent fraud, and protect user information such as PIl. Fintive centers its
decision-making and operating process based on previous cases. They gather customer data, classify them
depending on the case, and analyze them. The company needed a large number of employees to be able to
conduct such complex analyses. After some years, however, the technology that assists in conducting such
analyses advanced as well. Now, Fintive is planning on using a modern tool, a chatbot, to achieve pattern
analyses toward preventing fraud in real-time. This tool would also be used to assist in improving customer
service.
This initial idea was communicated to the software development team, who supported it and were assigned to
work on this project. They began integrating the chatbot on their existing system. In addition, the team set an
objective regarding the chatbot which was to answer 85% of ali chat queries.
After the successful integration of the chatbot, the company immediately released it to their customers for use.
The chatbot, however, appeared to have some issues.
Due to insufficient testing and lack of samples provided to the chatbot during the training phase, in which it was
supposed “to learn” the queries pattern, the chatbot failed to address user queries and provide the right answers.
Furthermore, the chatbot sent random files to users when it received invalid inputs such as odd patterns of dots
and special characters. Therefore, the chatbot was unable to properly answer customer queries and the
traditional customer support was overwhelmed with chat queries and thus was unable to help customers with
their requests.
Consequently, Fintive established a software development policy. This policy specified that whether the software
is developed in-house or outsourced, it will undergo a black box testing prior to its implementation on operational
systems.

3. Based on scenario 1, the chatbot was unable to properly answer customer queries. Which principle of
information security has been affected in this case?
A. Availability
B. Integrity
C. Confidentiality.

What type of security control does the use of black box testing represent? Refer to scenario I.
A. Corrective and technical
B. Detective and managerial
C Preventive and technical.

5. According to scenario 1,
received invalid inputs. What impact might that lead to?
A. Inability to provide service
B. Loss Of reputation
C. Leak of confidential information.

6. Which situation presented below represents a threat?
A. HackX uses and distributes pirated software
B. The information security training was provided to only the IT team members of the organization
C. Hackers compromised the administrator account by cracking the

Password.

7. An organization does not check the source code of the updated version Of an application when it is updated
automatically. Thus, the application may be open to unauthorized modifications. This represents a
that may impact information
A. (1) Threat, (2) confidentiality
B. (1) Risk, (2) availability
C. (1) Vulnerability, (2) integrity.

8. A telecommunications company uses the AES method for ensuring that
confidential information is protected. This means that they use a single key to encrypt and decrypt the
information. What kind of control does the company use?
A. Detective
B. Corrective
C. Preventive.

9. You received an email requiring you to send information such as name, email, and password in order to
continue using your email account. If you do not send such information, your email account will be disabled. What
does this scenario Present?
A. personnel type of vulnerability
B. An unauthorized action type of threat
C. A compromise of information type of threat.

10. Which statement below best describes the relationship between information security aspects?
A. Threats exploit vulnerabilities to damage or destroy assets B. Controls protect assets by reducing threats
C. Risk is a function of vulnerabilities that harm assets.

11. Which of the options below is a control related to the management of personnel at aims to avoid the
occurrence of incidents?
A. The organization regularly provides security awareness and training sessions for its employees
B. The organization always reviews the security policy after the integration of a new division to the organization
C. The organization conducts regular user access reviews to verify that only authorized employees have access
to confidential information.

12. A data processing tool crashed when a user added more data in the buffer than its storage capacity allows.
The incident was caused by the tool’s inability to bound check arrays. What kind of vulnerability is this?
A. Intrinsic vulnerability. because inability to bound check arrays is a characteristic of the data processing tool
B. Extrinsic vulnerability because inability to bound check arrays is related to external factors
C. None, the tool’s inability to bound check arrays is not a vulnerability, but a threat.

13. Pay Bell, a finance corporation, is using some services with the potential to bypass all the governance
processes that are in place in order to ensure proper security of the company. What type of services are these?
A. Machine learning services
B. Cloud services
c. Artificial intelligence services.

14. FTP uses clear text passwords for authentication. This is an FTP:
A. Vulnerability
B. Risk
C. Threat.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Functional Area Paper Assignment follow direction *I have provided a

Functional Area Paper Assignment follow direction *I have provided a word document to prepare the assignment with 10-13 references listed in the word document. This assignment must be due within 6 hours by 7:30 pm on April 17, 2022. Original work from a writer no grammar error and use APA

Complete a two to three-page paper. You are outside counsel

Complete a two to three-page paper.  You are outside counsel to the Marcus Welby Healthcare Corporation (MWHC), which is concerned that expenses in some of its ancillary departments are causing it to lose money under Medicare and HMO insurance. It would like to start charging its hospital-based physicians for some

In this discussion board, we will explore the reasons why

In this discussion board, we will explore the reasons why joint ventures are an often used form of management agreement in global hotel expansion.In your post, consider: What is a joint venture?  Give an example of a joint venture hotel deal in your country of choice and outline who are

value of developing objective setting in a healthcare organization.

Description Chapter 4 focuses on the value of developing objective setting in a healthcare organization. The central idea is that without clear objectives, an organization has little opportunity to plan and perhaps, to survive. Based on your personal experience, is the organization that you work for now or have worked

Medical Ethics Is it ethical to “trim” the results of

  Medical Ethics Is it ethical to “trim” the results of a medical study in order to get a positive review for an unfinished medical product? Deen, Nabilah, “Trimming Data.” Markkula Center for Applied Ethics (2015) How important are culturally sensitive communications in medicine? Peterson-lyer, Karen, “Cancer: A Failure to

Instructions You have been asked by the hospital’s Chief Nursing

 Instructions You have been asked by the hospital’s Chief Nursing Officer to create a PowerPoint presentation (using speaker notes for each slide) on Magnet designation, quality measures and patient outcomes to be presented to the Board of Directors. This presentation should include: Background on Magnet Recognition Program®. Summary of the

Based on the facts provided to you in week 1

  Based on the facts provided to you in week 1 discussion #2, the investigation report, the confession by Mayo and the witness statements made by Dietz and Joe answer the following: 1) If you were the defense attorney representing Mayo would you try to negotiate a plea agreement on

please read all 4 article and used the persuasive outline.

please read all 4 article and used the persuasive outline. persuasive title: nursing home need accessible on site health care services in order to have  better prevention plans.   it does not need to very long  Persuasive speech week 4  Please use the above hyperlink to use this template to create

Analyze administrative, clinical, management, and decision-support

Analyze administrative, clinical, management, and decision-support information technology tools. (L12.1, 12.2, 14.3) o Explain an organization’s need for a health information professional to ensure long-term meaningful use and current incentive program compliance. o Describe specific job functions of a new health information professional. o Explain the skills and training needed

Social Disorganization

Description Chapter 7 of Vold’s Theoretical Criminology discusses social disorganization from a variety of perspectives. Begin by defining social disorganization. Then, discuss the factors that are found in a socially-disorganized neighborhood as evidenced by peer-reviewed research conducted as well as personal experience with neighborhoods in your area that would be

Post a total of 3 substantive responses over 2 separate

  Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. Due Thursday Respond to the following in a minimum of 175 words: Research various methods of communication that are commonly used in business, such as email, VoIP, texting, messaging, as

PARENT VIEWS ON INCLUSION, CULTURE and DISABILITY

Special Education Needs Specific Topic: Students write a dissertation plan which will include the following sections; Research Approach – What theories and research paradigm will influence my research Research Questions – What are the specific research questions you want to try to answer the Research Design – What do you plan to

Read the following brief article on the 7R’s of Relationship

 Read the following brief article on the 7R’s of Relationship Marketing: https://smallbusiness.chron.com/seven-rs-marketing-mix-64543.html Please answer the following questions: Briefly define each of the 7 R’s using any Internet references of your choosing; In your opinion, and supported by 1-2 Internet references, should marketers use the 4P’s of marketing in selling a

Based on your readings and your personal experiences, what does

Based on your readings and your personal experiences, what does the term developmentally appropriate instructional strategies mean to you? How does your understanding of this term correspond to the Every Student Succeeds Act (ESSA), school accountability, and state assessments? Where do our students with disabilities fit in this one-size-fits-all reasoning?

For this week’s assignment, reflect on the many roles (macro

  For this week’s assignment, reflect on the many roles (macro and micro) that social workers can have within behavioral health. Assume you have been asked to prepare an educational brochure to help those you may engage with from other disciplines understand the roles social workers can have when working