WGU D333 Pre- Assessment Version 2 (Latest 2023/ 2024 Update) Ethics in Technology Exam| Questions and Verified Answers| 100% Correct| Grade A
WGU D333 Pre- Assessment Version 2
(Latest 2023/ 2024 Update) Ethics in
Technology Exam| Questions and Verified
Answers| 100% Correct| Grade A
Q: A new startup tech company plans to provide secure wireless access with- in its office for
employees and other trusted visitors. The company has con- cerns about competitors
eavesdropping or compromising the connections and obtaining unauthorized access to the
company's intellectual property. The company is considering using Wireless Protected Access 2
(WPA2) to secure data in transit.
Which protocol does this wireless protection implement?
Answer:
Advanced Encryp- tion Standard (AES)
Q: A Federal Bureau of Investigation (FBI) agent monitors a telephone conver- sation between
a 12-year-old child and the child's stepfather. The monitoring is part of a criminal investigation.
A warrant was not obtained prior to com- mencement of the monitoring.
Which law or regulation did the agent violate?
Answer:
Wiretap Act
Q: A U.S. company launched an e-commerce platform in the European Union (EU). The board
of directors raised concerns about compliance with applicable privacy regulations and the
collection of customer information.
Which regulation applies to this scenario?
Answer:
General Data Protection Regulation
Q: A social media website collected personal information about consumers when they
subscribed to the service. Subscribers opted in or out before creating their online profiles.
Which European Union Data Protection Directive did the website follow?
Answer:
-
Choice
Q: A company is engaged as a third party to perform debt collection on behalf of a
telecommunications provider. The company operates an outbound call center to contact debtors
and set up payment arrangements. The company needs to ensure that the debtors' data privacy is
not at risk.
Which two areas should the company ensure are properly managed?
Answer:
Insider access/Network security
Q: A company is using software to track workforce operational activity. Man- agement
communicates that the data collected will be treated as sensitive. Administrative and technical
security measures are put in place to protect employee data. These measures include periodically
culling records that are no longer relevant.
Which additional measure should be taken to safeguard employee data from misuse?
Answer:
Limit who can view employee data
Q: A retail company experiences a data breach. Customer data is stolen, including credit card
numbers, names, addresses, and account passwords. The attackers have amassed enough
combinations of personally identifiable information (PII) to commit identity theft.
Which adverse impacts, in addition to the loss of business, does the company face?
Answer:
Reputational damage and the need to provide support for victims
Q: An attending physician at a local hospital receives an email with a link that appears to be
from a neighboring clinic. When the physician clicks the link, computers throughout the hospital
freeze, and patient information can no longer be accessed. A message appears demanding
payment of five bitcoins within 48 hours to decrypt the hospital database and threatening that
without payment, all information will be deleted.
Which type of exploit is this?
Answer:
Ransomware
Q: What is the cause of the rise in computer-related security issues, par- ticularly among smalland medium-sized businesses?
Answer:
Bring your own device policies
Q: A company is notified of a breach of its systems. An investigation reveals that although no
financial information was taken, the customer records for all its customers, including names,
email addresses, and passwords, may have been taken. Although it is uncertain whether the
records were taken, evidence suggests that the intruders accessed the database containing the
information. The investigation team indicates that, given six weeks, they will be able to identify
what, if anything, has been taken.
Which action should the company take?
Answer:
Notify all customers that there may have been a data breach
Q: A government contractor is rebuilding a telecommunications network. One of the
contractor's employees discovers that the company is participating in illegal and unethical acts to
defraud the government. The employee considers
filing a lawsuit against the company on behalf of the government.
Which law protects the employee if the lawsuit is filed?
Answer:
False Claims Act
Q: An organization enters customer information in different formats, styles, and varieties into a
database. Two customers placed an order on January 12,
2022, but one customer's purchase date is entered as 01/12/22, whereas the other's is entered as
12/01/22.
Which aspect of data could be negatively impacted by the format issue?
Answer:
Ac- curacy
Q: An organization is evaluating potential harm to its networks to ensure data is stored
accurately and securely from both internal and external threats.
What is the process the organization is following?
Answer:
Risk assessment
Q: A store manager of a home service company hires a data entry clerk to process customer
returns. The data entry clerk is trained to enter data in
the system for every customer record. An internal audit shows typographical mistakes in
customers' records for the last two weeks.
Which data aspect does the home service company need to address to reduce errors?
Answer:
Accuracy
Q: A patient visited a primary care doctor for headaches and was referred to a specialist clinic
that deals with neuroimaging. After visiting the specialist, the patient receives results that do not
seem to match their symptoms. After calling the clinic, the patient discovers that their electronic
health records (EHRs) from the primary care provider were mismatched with another patient's
records when the patient visited the specialist.
What is the cause of the mismatch?
Answer:
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |