WGU D333 ETHICS IN TECHNOLOGY OA EXAM 200 QUESTIONS WITH VERIFIED ANSWERS /A+ GRADE ASSURED
11 views 0 purchase
Course
WGU D333 ETHICS IN TECHNOLOGY
Institution
WGU D333 ETHICS IN TECHNOLOGY
WGU D333 ETHICS IN TECHNOLOGY OA EXAM
200 QUESTIONS WITH VERIFIED ANSWERS
/A+ GRADE ASSURED What may providing unrestricted access to consumers'data without protecting each
individual's privacy or identity be considered? - ...ANSWER..Unethical and risky
Which best practice should help reduce...
WGU D333 ETHICS IN TECHNOLOGY OA EXAM
200 QUESTIONS WITH VERIFIED ANSWERS
/A+ GRADE ASSURED
What may providing unrestricted access to consumers'data without protecting each
individual's privacy or identity be considered? - ...ANSWER..Unethical and risky
Which best practice should help reduce the different ethical problems IT professionals
face on a daily basis?
- ...ANSWER..Establishing and implementing an acceptable use policy
What does the Bathsheba Syndrome refer to? -
...ANSWER..The ethical failure of people in power
What is the term for the concept where organizationsassimilate social and
environmental concerns in theirbusiness operations and in their interactions with
stakeholders? - ...ANSWER..CSR (Corporate Social Responsibility)
According to Aristotle's virtue ethics, what should be the nature of a person who
wants to donate somethingto an orphanage? - ...ANSWER..Generous
A person breaks a traffic law in order to get a criticallyinjured man to a hospital.
Which decision-making behavior describes this action? - ...ANSWER..Ethical but
illegal
What is the first step in an ethical decision-making process? - ...ANSWER..Develop a
problem statement
Why is it important for leaders to understand how technology affects their
organization's daily practices? -
...ANSWER..To understand possible legal ramifications
,What is an example of an IT professional demonstratinga commitment to ethics? -
...ANSWER..An IT professional wants to do a side project for a local business. He
checks his employer's company policy handbook first to avoid a conflict of interest.
What does PAPA stand for? - ...ANSWER..Privacy,accuracy, property, and access
An IT worker uses a company-owned vehicle totransport illegal drugs.
How does the use of auto-tracking devices explain theethical issue in this scenario? -
...ANSWER..An
employer can use GPS-tracking data as evidence for theinvestigation.
An IT professional traveling for a work assignment decides to take a detour for
personal business, and dueto excessive speed, causes an auto accident.
Who is responsible for damages? - ...ANSWER..IT workers who breach the duty of
care are accountable forinjuries.
Which privacy law was violated by these pharmacyemployees? - ...ANSWER..HIPAA
What should this IT issue be described as? -
...ANSWER..Lack of internal controls
What should this IT issue be described as? -
...ANSWER..Inappropriate sharing
How should the actions of the pharmacy employees becharacterized? -
...ANSWER..illegal and unethical
What can organizations do to assist the sandwich generation in understanding the
importance of protecting personal and financial information? -
...ANSWER..Have IT, financial, and medical
professionals conduct monthly information sessions for the community
What is the source of the data threat in this scenario? -
...ANSWER..Industrial spy
, How should Jack's actions be characterized? -
...ANSWER..Illegal and unethical
What should the novice researcher use to ensure thisdata is accurate? -
...ANSWER..Sites that promote information accuracy and objectivity
The agency the researcher works for has manyresources to mine data.
What concerns should the researcher have about these resources? -
...ANSWER..Rights and ownership of thedata
The researcher is not familiar with IT and visits a datasite outside of the resources
provided by the organization. Within an hour of access, employees arehaving
difficulties performing job duties because theircomputer is frozen. The IT department
identifies the DDoS source and eradicates it.
What should the IT department do to avoid this happening again? -
...ANSWER..Develop and maintaina risk management plan
Which best practice standard should be enforced toensure IT personnel are properly
trained? -
...ANSWER..Reasonable professional standard
What is a risk of saving sensitive consumer data without using encryption and other
safe archiving methods? - ...ANSWER..The data could be accessed byhackers.
Which part of the security triad was violated in this scenario? -
...ANSWER..Confidentiality
Which method may have mitigated the threat posed bythe manager? -
...ANSWER..Proper access control
What is a hacking method that finds passwords or encryption keys by trying every
possible combinationof characters until the correct one is found? -
...ANSWER..Brute-force attack
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Lectpearl. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.