Ethics and Computer Science > EXAM > WGU D333 Pre-assessment Ethics in Technology - Q & A with Complete Solutions (All)

WGU D333 Pre-assessment Ethics in Technology - Q & A with Complete Solutions

Document Content and Description Below

WGU D333 Pre-assessment Ethics in Technology - Q & A with Complete Solutions Which ethics-related consideration is addressed by the California Online Privacy Protection Act of 2003 and its amendment... s? Do Not Track signals Which two aspects of an IT worker's responsibilities involve ethical issues that might arise in the relationship between IT workers and IT users? Discouraging software piracy/Controlling information sharing A well-respected IT professional from a small software company uses resume inflation when searching for a new position. Which two ethical challenges may encourage this behavior? Prioritization of personal loyalty/Disregard for the professional code of conduct What is an objective of a professional code of ethics in IT? Provide benchmarks for self-assessment What are the consequences of more lenient bring your own devices (BYOD) policies for IT? Increased productivity and increased vulnerability to data system breaches Which type of cyberattack uses text messages to trick victims into disclosing personal information that can subsequently be exploited for a financial gain? Smishing What is the goal of a white hat hacker in cyberattacks in IT? To identify vulnerabilities of a company's information system to remediate them Which major U.S. regulation governs the collection, disclosure, and protection of consumers' personally identifiable information (PII) data by companies that provide financial products and services? Gramm-Leach-Bliley Act What is the meaning of morals in the context of ethical judgment? The personal principles that determine what an individual considers to be right or wrong What is the primary goal for a supply chain relating to corporate social responsibility (CSR)? Sustainability Which factor is primarily used by deontology to evaluate morality of human actions? Duty Which part of the decision-making process involves defining a transition plan? Implementing the decision In response to the pressure from its shareholders, a publicly owned software company plans to implement a strict, globally consistent approach to prevent software piracy of its products that help with implementing green energy solutions. Which impact should be considered from an ethical standpoint due to digital divide? A negative impact on demographics in less-developed countries Which measure of the confidentiality, integrity, and availability (CIA) triad should be used by IT professionals at the organization level to supply validation of non-repudiation regarding data access in IT? Security audit An IT professional wants the proper credentials and knowledge that is required to collect data from devices affected by cyberattacks to ensure such data would be admissible as evidence in a court of law. Certified Computer Examiner/EnCase Certified Examiner What are two reasons why professional codes of ethics in IT are important? They identify the acceptable behaviors for interacting with customers./They identify the unacceptable behaviors for interacting with customers. What are two main elements of a professional code of ethics in IT? Core values/Common beliefs Which scenario may create a conflict of interest between IT workers and clients? A consulting firm that provides security services is conducting an independent security audit for a company and is recommending remediation methods. Which type of guidance is provided by professional codes of ethics within IT? Course of action in cases of conflict of interest What are two components of the concept of information privacy? Communication privacy/Data privacy Which aspect of the computer security triad provides guidance when dealing with data accuracy in IT? Integrity How should an IT professional respond to a cyberattack prior to the incident eradication? Preserve evidence and activity logs Which type of attack is a common cause of data-level breaches with global scope? Phishing What should be the primary ethical obligation of an IT professional regarding customer profiling data? Preventing unauthorized data disclosure A security company performs a superficial investigation of a data breach and issues a root cause analysis that unintentionally misses key details about the means to remediate the existing vulnerabilities. It is found that the security company has insufficient expertise. What is the potential impact of the behavior by the security company? Misrepresentation charges Which type of ethically dubious but legal approach is used by IT professionals working for marketing companies to profile their customers? Aggregation of personal data volunteered by consumers Which method is commonly used to obtain personal information about consumers in e-commerce scenarios? Cookies Which two factors contribute to internet censorship in IT? Totalitarian governments/Dependency on regional providers Which threat is associated with John Doe lawsuits regarding anonymity in IT? Silencing critical speech by using the subpoena power Why is fake news a threat in IT? It is misrepresented as facts./It is driven by ulterior motives. Why is hate speech a threat in IT? There are insufficient resources to prescreen online content./There is a lack of assumed responsibility for online content posted by others. Which two stipulations dictate the obligations of an IT professional regarding data property of a former employer when transitioning from one job to another? Nondisclosure clause/Noncompete agreement What are the ethical challenges with an IT professional reverse engineering an in-house-developed software and a third party-developed software? Only reverse engineering a third party-developed software would be in violation of a professional code of ethics in IT. Which two common sources of proxy-based bias introduce ethical challenges associated with artificial intelligence (AI) in IT? Zip code/School district [Show More]

Last updated: 4 months ago

Preview 1 out of 20 pages

Reviews( 0 )

$16.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
32
0

Document information


Connected school, study & course


About the document


Uploaded On

Jan 16, 2024

Number of pages

20

Written in

Seller


seller-icon
Nurse Henny

Member since 1 year

4 Documents Sold


Additional information

This document has been written for:

Uploaded

Jan 16, 2024

Downloads

 0

Views

 32

Recommended For You


$16.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·