Q: 11
What is the unintended source of bias in artificial intelligence (Al) algorithms?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
A customer places an order for a product on an e*commerce site after reviewing the quantity and
pricing on the online form. The customer then receives an email confirmation that displays different
pricing than the order form. The customer reports the discrepancy to customer service.
Which security practice is this customer addressing?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
Which organization licenses software developers who implement safety and health software in the
United States?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
An organization is concerned about its cybersecurity after identifying unauthorized records in its
payroll database. The organization hires a consultant to test its cyberdefenses. The consultant
executes several test attacks on the organization's software and successfully demonstrates that by
using Structured Query Language (SOL) injection, the consultant can add rows to the payroll database
without obtaining the proper permissions.
Which hacker classification does the consultant fall under?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2