WGU D333 ETHICS IN TECHNOLOGY OBJECTIVE ASSESSMENT NEWEST 2024 ACTUAL EXAM COMPLETE 200 QUESTIONS AND CORRECT DETAILED ANSWERS| ALREADY PASSED!
1 | P a g e
WGU D333 ETHICS IN TECHNOLOGY OBJECTIVE
ASSESSMENT NEWEST 2024 ACTUAL EXAM
COMPLETE 200 QUESTIONS AND CORRECT
DETAILED ANSWERS| ALREADY PASSED!
A company is using software to track workforce operational activity.
Management communicates that the data collected will be treated as
sensitive. Administrative and technical security measures are put in
place to protect employee data. These measures include periodically
culling records that are no longer relevant. Which additional measure
should be taken to safeguard employee data from misuse? - ANSWERLimit who can view employee data
A retail company experiences a data breach. Customer data is stolen,
including credit card numbers, names, addresses, and account
passwords. The attackers have amassed enough combinations of
personally identifiable information (PII) to commit identity theft. Which
adverse impacts, in addition to the loss of business, does the company
face? - ANSWER- Reputational damage and the need to provide support
for victims
An attending physician at a local hospital receives an email with a link
that appears to be from a neighboring clinic. When the physician clicks
the link, computers throughout the hospital freeze, and patient
information can no longer be accessed. A message appears demanding
payment of five bitcoins within 48 hours to decrypt the hospital database
and threatening that without payment, all information will be deleted.
Which type of exploit is this? - ANSWER- Ransomware
2 | P a g e
What is the cause of the rise in computer-related security issues,
particularly among small- and medium-sized businesses? - ANSWERBring your own device policies
A social media user discovers that a former romantic partner posted
humiliating photos of the two together without obtaining the social
media user's permission. The social media user suffers severe emotional
distress as a result. Which form of threat does this represent? -
ANSWER- Cyberharassment
A company is notified of a breach of its systems. An investigation
reveals that although no financial information was taken, the customer
records for all its customers, including names, email addresses, and
passwords, may have been taken. Although it is uncertain whether the
records were taken, evidence suggests that the intruders accessed the
database containing the information. The investigation team indicates
that, given six weeks, they will be able to identify what, if anything, has
been taken. Which action should the company take? - ANSWER- Notify
all customers that there may have been a data breach
A government contractor is rebuilding a telecommunications network.
One of the contractor's employees discovers that the company is
participating in illegal and unethical acts to defraud the government. The
employee considers filing a lawsuit against the company on behalf of the
government. Which law protects the employee if the lawsuit is filed? -
ANSWER- False Claims Act
3 | P a g e
An organization enters customer information in different formats, styles,
and varieties into a database. Two customers placed an order on January
12, 2022, but one customer's purchase date is entered as 01/12/22,
whereas the other's is entered as 12/01/22. Which aspect of data could be
negatively impacted by the format issue? - ANSWER- Accuracy
An organization is evaluating potential harm to its networks to ensure
data is stored accurately and securely from both internal and external
threats. What is the process the organization is following? - ANSWERRisk assessment
A store manager of a home service company hires a data entry clerk to
process customer returns. The data entry clerk is trained to enter data in
the system for every customer record. An internal audit shows
typographical mistakes in customers' records for the last two weeks.
Which data aspect does the home service company need to address to
reduce errors? - ANSWER- Accuracy
A patient visited a primary care doctor for headaches and was referred to
a specialist clinic that deals with neuroimaging. After visiting the
specialist, the patient receives results that do not seem to match their
symptoms. After calling the clinic, the patient discovers that their
electronic health records (EHRs) from the primary care provider were
mismatched with another patient's records when the patient visited the
specialist. What is the cause of the mismatch? - ANSWER- The lack of
a nationwide unique patient identifier impedes error-free matching of an
individual's files.
4 | P a g e
Which legislation protects social networking companies from
defamation lawsuits in connection with user postings that appear on the
companies' sites? - ANSWER- Communications Decency Act (CDA)
The United Nations Security Council (UNSC) is briefed on a
cyberattack in which hackers were able to breach system integrity, gain
access to sensitive data, and manipulate the data without being noticed.
What should the UNSC use to be alerted to these threats in the future? -
ANSWER- Intrusion Detection System (IDS)
Individuals need to be given an opportunity to correct inaccurate
information held about them in databases. Which societal impact drives
this capability? - ANSWER- Companies make decisions based on
accurate data
A patient received treatment at an urgent care facility. Prior to being
seen, the patient completed the required Health Insurance Portability and
Accountability Act (HIPAA) forms. The doctor recorded all relevant
treatment data in the urgent care facility's electronic medical record
(EMR) system. Which entity is responsible for ensuring the accuracy of
the patient's medical information stored in the EMR? - ANSWER- The
urgent care facility
A computer science student downloads a pirated copy of a movie and
shares it with friends. What has the student infringed upon? - ANSWERCopyright
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |