New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

New Release Ethics-In-Technology Courses and Certificates Questions

WGU Ethics In TechnologyQCO1 Questions and Answers

Question 9

A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.

Which method of attack was used to compromise the worker's machine?

Options:

A.

Blended threat

B.

Trojan horse

C.

Spear phishing

D.

Zero-day exploit

Question 10

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

Options:

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

Question 11

An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.

Which law has the nurse violated?

Options:

A.

Electronic Communications Privacy Act (ECPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Gramm-Leach-Bliley Act (GLBA)

D.

Children's Online Privacy Protection Act (COPPA)

Question 12

Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?

Options:

A.

Electronic Communications Privacy Act

B.

Family Educational Rights and Privacy Act

C.

Privacy Act

D.

Right to Financial Privacy Act