Halloween Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

WGU Ethics-In-Technology WGU Ethics In TechnologyQCO1 Exam Practice Test

Page: 1 / 7
Total 66 questions

WGU Ethics In TechnologyQCO1 Questions and Answers

Question 1

How can organizations differentiate between ethical decision-making and legal decision-making frameworks?

Options:

A.

Legal decision-making frameworks provide a complete guide to ethical decision-making but go beyond to encompass decision-making tools to employ in situations where the ethical code is not clearly defined or easily applied.

B.

Ethical decision-making frameworks help an organization uphold a code of behavior generally agreed upon by the members of the larger society which the organization operates in. Legal decision-making frameworks help an organization to navigate a set of rules that convey what people can and cannot do.

C.

Ethical decision-making frameworks help an organization navigate a set of rules that convey what people can and cannot do. Legal decisionmaking frameworks help an organization uphold a code of behavior generally agreed upon by members of the larger society which the organization operates in.

D.

Ethical decision-making frameworks provide a complete guide to legal decision-making but go beyond to encompass decision-making tools to employ in situations where the law is not clearly defined or easily applied.

Question 2

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

Options:

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

Question 3

An auto manufacturer is developing a new line of autonomous vehicles. Multiple accidents, including fatalities, involving competitors' autonomous vehicles have already occurred. Management is concerned about potential liability, reputational damage, and financial loss. In response, the system safety engineer conducts a review at each stage of the software development process to record, assess, and account for detected issues.

Which type of log is the system safety engineer using?

Options:

A.

Risk

B.

Change

C.

Hazard

D.

Defect

Question 4

An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.

What should this engineer do?

Options:

A.

Report the activities to the government

B.

Ask to be moved to a different activity

C.

Resign from their job

D.

Contact the local media

Question 5

An organization decides to provide its employees with additional parental leave benefits that exceed legal requirements. Which concept is the organization acting on to support employees?

Options:

A.

Ethics code

B.

Corporate social responsibility

C.

Supply chain sustainability

D.

Integrity

Question 6

An organization creating a new consumer-profiling software tool has concerns about the software's ability to accurately capture and process data. The team decides to use an iterative approach to write the code, allowing for continuous testing and adjustment of requirements. The organization believes this will help ensure the software's data collection capabilities are both efficient and accurate.

Which methodology has the organization employed?

Options:

A.

Total quality management

B.

Waterfall development

C.

Quality assurance

D.

Agile development

Question 7

Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?

Options:

A.

Digital Millennium Copyright Act

B.

Copyright Term Extension Act

C.

Digital Performance Right in Sound Recordings Act

D.

Leahy-Smith America Invents Act

Question 8

An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.

Which doctrine covers the company's employment and reproduction of these materials?

Options:

A.

Safe harbor

B.

First sale

C.

Derivative work

D.

Fair use

Question 9

A consulting company employs H-1B workers. Even though companies applying for H*1B visas must offer a wage that is at least 95% of the average salary for the occupation, a close review of salarieswithin the consulting firm suggests that its H-1B workers are often paid 20% less on average than those with similar skill sets.

Which loophole is the company using to avoid paying H-1B workers a fair wage?

Options:

A.

Laying off employees with U.S. citizenship to lower the average salary numbers

B.

Classifying an H-1B worker as entry level when they fill a position of an experienced worker

C.

Pressuring H-1B workers to file petitions with the government to allow lower salary

D.

Employing H-1 B workers to work remotely from countries where the cost of living is lower

Question 10

Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.

How should this behaviorbe classified?

Options:

A.

Nepotism

B.

Conflict of interest

C.

Industrial espionage

D.

Corruption

Question 11

An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?

Options:

A.

Property

B.

Privacy

C.

Access

D.

Accuracy

Question 12

A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?

Options:

A.

Anonymous expression

B.

Doxing

C.

Hate speech

D.

Libel

Question 13

Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?

Options:

A.

PRISM

B.

Cookies

C.

MYSTIC

D.

Stingray

Question 14

During an investigation into a bank robbery, the Federal Bureau of Investigation (FBI) wants to monitor the telephone calls of identified suspects in the case for a two-week period. Due to the short time frame of the investigation, the FBI does not have time to pursue judicial authorization and get a warrant for surveillance.

Which type of telephone calls is legal for the FBI to monitor under the Foreign Intelligence Surveillance Act (FlSA). given the time frame of the investigation?

Options:

A.

Calls between two non-U.S. citizens

B.

Calls initiated by a U.S. citizen to a non-U.S. citizen

C.

Calls initiated by a non-U.S. citizen to a U.S. citizen

D.

Calls between two U.S. citizens

Question 15

An IT company adopts a professional cod© of ethics suggested by a nationally recognized IT professionals organization. Which benefit to the company can be directly derived from adopting a professional code of ethics?

Options:

A.

Guidelines for principled decision-making

B.

An evaluation benchmark

C.

Increased yearly revenue

D.

Decreased company expenditure

Question 16

An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.

Which law has the nurse violated?

Options:

A.

Electronic Communications Privacy Act (ECPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Gramm-Leach-Bliley Act (GLBA)

D.

Children's Online Privacy Protection Act (COPPA)

Question 17

A credit reporting agency collects personally identifiable information (Pll) from customers. The agency appoints a data protection officer (DPO), who is responsible for overseeing the agency's data protection strategy and enforcing data compliance requirements.

Which legislation should the DPO use as the basis for governing the collection and disclosure of Pll?

Options:

A.

Securities Exchange Act

B.

Sarbanes-Oxley Act (SOX)

C.

Gramm-Leach-BlileyAct(GLBA)

D.

Bank Secrecy Act

Question 18

A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.

Which name describes this specialist?

Options:

A.

Black hat hacker

B.

While hat hacker

C.

Hacktivist

D.

Industrial spy

Question 19

A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.

Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?

Options:

A.

Minimizing scope creep requests from the customer

B.

Improving decision-making around agreeing to additional scopes

C.

Avoiding the delivery of an incompatible solution

D.

Understanding the legal implications of noncontractual agreements

Page: 1 / 7
Total 66 questions