What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?
To gather data for improved customer profiles, a social media platform uses microphone data from its users in the United States. Which U.S. Constitulional amendment does this action violate?
To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?
Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?
A company wants to improve its chances of winning business with a prospective client. The company sends an expensive watch to the home address of each of the client's directors. Which ethical issue is the company engaging in?
Which organization licenses software developers who implement safety and health software in the United States?
A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.
Which ethical theory does this approach represent?
The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company's device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.
Which aspect of data management should the store employ to avoid this situation?
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.
Which method of attack was used to compromise the worker's machine?
An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.
Which law has the nurse violated?
Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?
An organization is concerned about its cybersecurity after identifying unauthorized records in its payroll database. The organization hires a consultant to test its cyberdefenses. The consultant executes several test attacks on the organization's software and successfully demonstrates that by using Structured Query Language (SOL) injection, the consultant can add rows to the payroll database without obtaining the proper permissions.
Which hacker classification does the consultant fall under?
What is the unintended source of bias in artificial intelligence (Al) algorithms?
What is the first step in ethical decision-making for an IT professional?
A cloud computing company uses machine learning software to screen the resumes of job seekers. The company's aim is to reduce potential human prejudice in the hiring process. To set up the software and train the machine learning model, the company provides information from its hiring decisions over the past five years. After several months of using the software, the company runs an audit and finds that the software screens out minority job seekers at a much higher rate.
Which behavior is the trained machine learning model displaying?
A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.
Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?
Which data retention practice complies with the General Data Protection Regulation (GDPR)?
An IT company adopts a professional cod© of ethics suggested by a nationally recognized IT professionals organization. Which benefit to the company can be directly derived from adopting a professional code of ethics?