New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium WGU Ethics-In-Technology Dumps Questions Answers

WGU Ethics In TechnologyQCO1 Questions and Answers

Question 1

What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?

Options:

A.

Opt-in

B.

Safeguard

C.

Opt-out

D.

Pretexting

Buy Now
Question 2

To gather data for improved customer profiles, a social media platform uses microphone data from its users in the United States. Which U.S. Constitulional amendment does this action violate?

Options:

A.

Third Amendment

B.

Fourth Amendment

C.

Second Amendment

D.

First Amendment

Question 3

To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?

Options:

A.

Unethical and legal

B.

Unethical and illegal

C.

Ethical and legal

D.

Ethical andIllegal

Question 4

Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?

Options:

A.

PRISM

B.

Cookies

C.

MYSTIC

D.

Stingray

Question 5

A company wants to improve its chances of winning business with a prospective client. The company sends an expensive watch to the home address of each of the client's directors. Which ethical issue is the company engaging in?

Options:

A.

Fraud

B.

Conflict of interest

C.

Bribery

D.

Misrepresentation

Question 6

Which organization licenses software developers who implement safety and health software in the United States?

Options:

A.

National Society of Professional Engineers

B.

Accreditation Board for Engineering and Technology

C.

American Society for Engineering Education

D.

National Council of Examiners for Engineering and Surveying

Question 7

A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.

Which ethical theory does this approach represent?

Options:

A.

Deontology

B.

Relativism

C.

Virtue

D.

Consequentialism

Question 8

The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company's device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.

Which aspect of data management should the store employ to avoid this situation?

Options:

A.

Encryption

B.

Collection

C.

Availability

D.

Accuracy

Question 9

A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.

Which method of attack was used to compromise the worker's machine?

Options:

A.

Blended threat

B.

Trojan horse

C.

Spear phishing

D.

Zero-day exploit

Question 10

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

Options:

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

Question 11

An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.

Which law has the nurse violated?

Options:

A.

Electronic Communications Privacy Act (ECPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Gramm-Leach-Bliley Act (GLBA)

D.

Children's Online Privacy Protection Act (COPPA)

Question 12

Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?

Options:

A.

Electronic Communications Privacy Act

B.

Family Educational Rights and Privacy Act

C.

Privacy Act

D.

Right to Financial Privacy Act

Question 13

An organization is concerned about its cybersecurity after identifying unauthorized records in its payroll database. The organization hires a consultant to test its cyberdefenses. The consultant executes several test attacks on the organization's software and successfully demonstrates that by using Structured Query Language (SOL) injection, the consultant can add rows to the payroll database without obtaining the proper permissions.

Which hacker classification does the consultant fall under?

Options:

A.

Cybercriminal

B.

White hat hacker

C.

Cyberterrorist

D.

Black hat hacker

Question 14

What is the unintended source of bias in artificial intelligence (Al) algorithms?

Options:

A.

Tainted examples

B.

Excessive validation sample sizes

C.

Human developers

D.

Excessive training sample sizes

Question 15

What is the first step in ethical decision-making for an IT professional?

Options:

A.

Choose an alternative

B.

Develop a problem statement

C.

Implement a solution

D.

Identify alternatives

Question 16

A cloud computing company uses machine learning software to screen the resumes of job seekers. The company's aim is to reduce potential human prejudice in the hiring process. To set up the software and train the machine learning model, the company provides information from its hiring decisions over the past five years. After several months of using the software, the company runs an audit and finds that the software screens out minority job seekers at a much higher rate.

Which behavior is the trained machine learning model displaying?

Options:

A.

Exposing bias that exists in the data

B.

Acting fairly toward candidates

C.

Exhibiting intent to harm applicants

D.

Scoring low humility measurement

Question 17

A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.

Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?

Options:

A.

Minimizing scope creep requests from the customer

B.

Improving decision-making around agreeing to additional scopes

C.

Avoiding the delivery of an incompatible solution

D.

Understanding the legal implications of noncontractual agreements

Question 18

Which data retention practice complies with the General Data Protection Regulation (GDPR)?

Options:

A.

Storing personal data for a maximum of six months

B.

Prohibiting the storage of personal data with financial data

C.

Performing biannual data quality audits and reporting findings

D.

Securely erasing data that is no longer needed

Question 19

An IT company adopts a professional cod© of ethics suggested by a nationally recognized IT professionals organization. Which benefit to the company can be directly derived from adopting a professional code of ethics?

Options:

A.

Guidelines for principled decision-making

B.

An evaluation benchmark

C.

Increased yearly revenue

D.

Decreased company expenditure