Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Ethics-In-Technology Questions and answers with ValidTests

Exam Ethics-In-Technology All Questions
Exam Ethics-In-Technology Premium Access

View all detail and faqs for the Ethics-In-Technology exam

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which principle, according to the Organisation for Economic Co-operation and Development's (OECD) privacy guidelines, states that people have the right to review their data, challenge its correctness, and have incorrect data changed?

Options:

A.

Individual participation

B.

Purpose specification

C.

Use limitation

D.

Security safeguard

Expert Solution
Questions # 12:

A malicious hacker takes over several computers via the internet and causes them to flood a target site with high volumes of data queries and other small tasks. Which type of attack is the hacker performing against the target site?

Options:

A.

Zero-day exploit

B.

Ransomware

C.

Denial-of-service (DoS)

D.

Worm

Expert Solution
Questions # 13:

An organization collects data in aggregate format about its employees to improve workflow. Managers at the organization must ensure that the data collected is for business purposes only. Which data collection method should the organization implement?

Options:

A.

Electronic discovery

B.

Consumer profiling

C.

Workplace monitoring

D.

Advanced surveillance

Expert Solution
Questions # 14:

An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.

What should this engineer do?

Options:

A.

Report the activities to the government

B.

Ask to be moved to a different activity

C.

Resign from their job

D.

Contact the local media

Expert Solution
Questions # 15:

A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.

What is a disadvantage of using contingent workers to support the company's goals?

Options:

A.

Any skills gained during employment will be lost to the company at the project's completion.

B.

Internal business process understanding will be minimal given the temporary nature of the workers.

C.

The company may require the same worker tor other projects.

D.

The company does not have to provide benefits throughout the project's lifecycle.

Expert Solution
Questions # 16:

An organization decides to provide its employees with additional parental leave benefits that exceed legal requirements. Which concept is the organization acting on to support employees?

Options:

A.

Ethics code

B.

Corporate social responsibility

C.

Supply chain sustainability

D.

Integrity

Expert Solution
Questions # 17:

What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?

Options:

A.

Opt-in

B.

Safeguard

C.

Opt-out

D.

Pretexting

Expert Solution
Questions # 18:

The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company's device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.

Which aspect of data management should the store employ to avoid this situation?

Options:

A.

Encryption

B.

Collection

C.

Availability

D.

Accuracy

Expert Solution
Questions # 19:

Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.

How should this behavior be classified?

Options:

A.

Nepotism

B.

Conflict of interest

C.

Industrial espionage

D.

Corruption

Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions