answer the attached questionsl. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right

answer the attached questions

l. The chatbot was supposed “to learn” the queries pattern to address user queries and provide the right answers.
What type of technology enables this?
A. Artificial intelligence
B. Cloud computing
C) Machine learning.

2. Insufficient testing and lack of samples provided to Finite’s chatbot during the training phases are considered
as Refer to scenario I.
A. Threats
B. Vulnerabilities
C. Risks.

Scenario 1: Fintive is a distinguished security provider for online payments and protection solutions. Founded in
1999 by Thomas Fin in San Jose, California, Fintive offers services to companies that operate online and want to
improve their information security, prevent fraud, and protect user information such as PIl. Fintive centers its
decision-making and operating process based on previous cases. They gather customer data, classify them
depending on the case, and analyze them. The company needed a large number of employees to be able to
conduct such complex analyses. After some years, however, the technology that assists in conducting such
analyses advanced as well. Now, Fintive is planning on using a modern tool, a chatbot, to achieve pattern
analyses toward preventing fraud in real-time. This tool would also be used to assist in improving customer
service.
This initial idea was communicated to the software development team, who supported it and were assigned to
work on this project. They began integrating the chatbot on their existing system. In addition, the team set an
objective regarding the chatbot which was to answer 85% of ali chat queries.
After the successful integration of the chatbot, the company immediately released it to their customers for use.
The chatbot, however, appeared to have some issues.
Due to insufficient testing and lack of samples provided to the chatbot during the training phase, in which it was
supposed “to learn” the queries pattern, the chatbot failed to address user queries and provide the right answers.
Furthermore, the chatbot sent random files to users when it received invalid inputs such as odd patterns of dots
and special characters. Therefore, the chatbot was unable to properly answer customer queries and the
traditional customer support was overwhelmed with chat queries and thus was unable to help customers with
their requests.
Consequently, Fintive established a software development policy. This policy specified that whether the software
is developed in-house or outsourced, it will undergo a black box testing prior to its implementation on operational
systems.

3. Based on scenario 1, the chatbot was unable to properly answer customer queries. Which principle of
information security has been affected in this case?
A. Availability
B. Integrity
C. Confidentiality.

What type of security control does the use of black box testing represent? Refer to scenario I.
A. Corrective and technical
B. Detective and managerial
C Preventive and technical.

5. According to scenario 1,
received invalid inputs. What impact might that lead to?
A. Inability to provide service
B. Loss Of reputation
C. Leak of confidential information.

6. Which situation presented below represents a threat?
A. HackX uses and distributes pirated software
B. The information security training was provided to only the IT team members of the organization
C. Hackers compromised the administrator account by cracking the

Password.

7. An organization does not check the source code of the updated version Of an application when it is updated
automatically. Thus, the application may be open to unauthorized modifications. This represents a
that may impact information
A. (1) Threat, (2) confidentiality
B. (1) Risk, (2) availability
C. (1) Vulnerability, (2) integrity.

8. A telecommunications company uses the AES method for ensuring that
confidential information is protected. This means that they use a single key to encrypt and decrypt the
information. What kind of control does the company use?
A. Detective
B. Corrective
C. Preventive.

9. You received an email requiring you to send information such as name, email, and password in order to
continue using your email account. If you do not send such information, your email account will be disabled. What
does this scenario Present?
A. personnel type of vulnerability
B. An unauthorized action type of threat
C. A compromise of information type of threat.

10. Which statement below best describes the relationship between information security aspects?
A. Threats exploit vulnerabilities to damage or destroy assets B. Controls protect assets by reducing threats
C. Risk is a function of vulnerabilities that harm assets.

11. Which of the options below is a control related to the management of personnel at aims to avoid the
occurrence of incidents?
A. The organization regularly provides security awareness and training sessions for its employees
B. The organization always reviews the security policy after the integration of a new division to the organization
C. The organization conducts regular user access reviews to verify that only authorized employees have access
to confidential information.

12. A data processing tool crashed when a user added more data in the buffer than its storage capacity allows.
The incident was caused by the tool’s inability to bound check arrays. What kind of vulnerability is this?
A. Intrinsic vulnerability. because inability to bound check arrays is a characteristic of the data processing tool
B. Extrinsic vulnerability because inability to bound check arrays is related to external factors
C. None, the tool’s inability to bound check arrays is not a vulnerability, but a threat.

13. Pay Bell, a finance corporation, is using some services with the potential to bypass all the governance
processes that are in place in order to ensure proper security of the company. What type of services are these?
A. Machine learning services
B. Cloud services
c. Artificial intelligence services.

14. FTP uses clear text passwords for authentication. This is an FTP:
A. Vulnerability
B. Risk
C. Threat.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

A socially accepted association

Over the years, many scholars have defined discourse community. The well-known linguist James Gee, for example, defined discourse as follows: a socially accepted association among ways of using language, of thinking, and of acting that can be used to identify oneself as a member of a socially meaningful group or

Competency Identify the role projects play in meeting the goals

Competency Identify the role projects play in meeting the goals of an organization. Student Success Criteria View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. Scenario You have just been hired as

Answer each question in a well detailed paragraph of 3

Answer each question in a well detailed paragraph of 3 – 5 sentences 1. How important was MLK and Nonviolence to the civil rights activism of the 1950’s and 1960’s2. What Was LBJ’S GREAT SOCIETY? What was its goal?3.How did the Civil Rights movement change from the 60’s to the

Final: The purpose of this assignment is to tie in

Final: The purpose of this assignment is to tie in victimology/criminological theories to a criminal justice case. Select a criminal justice case that interests you. For the case you selected, research the victim or victims who were affected by the perpetrator’s actions. Explain their life course, the crime circumstances, and

Carina Cooks has been employed by Realfood Restaurant Group (RRG)

Carina Cooks has been employed by Realfood Restaurant Group (RRG) for around 3 years. Cooks was first hired as a line cook. After seeing Cooks’ potential, Cooks was quickly promoted to Sous Chef. At the time of the promotion, Cooks signed a document that stated: AGREEMENT NOT TO COMPETE: In

What is the purpose?

As with all written assignments in this class, ask yourself these questions first while constructing this letter:  — What is the purpose? — How do you get a response and what response do I want? — State reasons for writing that person or company/organization — Get quickly to the point

The assignment must be in APA format (i.e. font size

The assignment must be in APA format (i.e. font size 12 font, font names that should be used are times new roman or Calabria (not both), normal margins (no more than 1 inch), double spaced). The assignment requires a min. of 500-1000 word count or 2-5 pages (Excluding title and

1: Listen to the ““Racism is America’s Oldest Algorithm”: How

1: Listen to the ““Racism is America’s Oldest Algorithm”: How Bias Creeps Into Health Care AI” episode of the Color Code podcast (via Sound Cloud or Apple Podcasts). Take notes. A: Ziad Obermeyer discussed a case of algorithmic bias that he & other medical practitioners were working with the company that made a

“Please submit plagiarism free work” Portfolio Project: This week discuss

 “Please submit plagiarism free work” Portfolio Project: This week discuss a current business process in a specific industry(excluding Amazon).  Note the following: -The current business process itself.-The industry the business process is utilized in.After explaining the current situation, take the current learning from the course and:Explain a new technology that

Lesson: “Think Like a Dinosaur” Short Story Lesson: “Think Like

  Lesson: “Think Like a Dinosaur” Short Story Lesson: “Think Like a Dinosaur” Short StoryAttached Files: Read, annotate, and take notes over the short story attached entitled “Think Like a Dinosaur.”   Discussion Board: “Think Like a Dinosaur” Analysis For this discussion board, you will analyze the short story “Think Like

Recognize sociological concepts

Purpose The purpose of this assignment is to recognize sociological concepts that play in your lived experience.   Keeping a field log of your social and institutional experiences for one day, you will critically discuss how your daily life is shaped and constrained by society. This will allow you engage with

Wk1: DevotionIn this current topics course, which focuses on change

 Wk1: DevotionIn this current topics course, which focuses on change that is relevant to you as a professional, we will be studying issues that impact us. In a rapidly changing world, it’s good to know that God’s nature does not change and that He is a rock of stability when

Conduct research on the following items: forensics, Miranda warning, and

Conduct research on the following items: forensics, Miranda warning, and arrest procedures, from our textbook and through our online library.Prepare a 10-slide power point presentation, following the below directions: Slide 1 – cover slide Slide 2-3, summarize your findings on forensics. Slides 4-5, summarize your findings on the Miranda warning,

Political Science

Instruction: Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government. Adolf Hitler is the most notorious tyrant. Using a totalitarian society from the past or present, discuss how the state and its leader attempt to impede citizens from

Consider the following scenario. A patient was being admitted to the

Consider the following scenario. A patient was being admitted to the emergency room (ER) for dizziness. He also had a dry mouth and blurry vision. The doctor treating him stated that he was exhibiting symptoms of diabetes. The bloodwork and other preliminary tests confirmed the diagnosis of prediabetes. After the

Compare and contrast two communication techniques that can be used

Compare and contrast two communication techniques that can be used to improve employee trust and engagement. Feel free to use the channels or techniques discussed in “Communication Provides Foundation for Being a Best Place to Work” by Kathleen Skidmore-Williams—an article that is located in the Unit IV Required Reading section—or