View all detail and faqs for the Ethics-In-Technology exam
Which principle, according to the Organisation for Economic Co-operation and Development's (OECD) privacy guidelines, states that people have the right to review their data, challenge its correctness, and have incorrect data changed?
A malicious hacker takes over several computers via the internet and causes them to flood a target site with high volumes of data queries and other small tasks. Which type of attack is the hacker performing against the target site?
An organization collects data in aggregate format about its employees to improve workflow. Managers at the organization must ensure that the data collected is for business purposes only. Which data collection method should the organization implement?
An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.
What should this engineer do?
A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.
What is a disadvantage of using contingent workers to support the company's goals?
An organization decides to provide its employees with additional parental leave benefits that exceed legal requirements. Which concept is the organization acting on to support employees?
What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?
The retail store manager of a telecommunications service provider has been manually entering the data record of device returns into the company's device database every time a subscriber swaps their old phone for a new one. A recent internal audit revealed that several device records are missing from the device database.
Which aspect of data management should the store employ to avoid this situation?
Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.
How should this behavior be classified?