WGU Related Exams
Ethics-In-Technology Exam

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.
Which method of attack was used to compromise the worker's machine?