quiz image

Ethics in Technology Practice Quizzes

AvailableMendelevium avatar
AvailableMendelevium
·
·
Download

Start Quiz

Study Flashcards

60 Questions

Which type of guidance is provided by professional codes of ethics within IT?

Course of action in cases of conflict of interest

What is the meaning of morals in the context of ethical judgment?

The personal principles that determine what an individual considers to be right or wrong

Which measure of the confidentiality, integrity, and availability (CIA) triad should be used by IT professionals at the organization level to supply validation of non-repudiation regarding data access in IT?

Security audit

What are two main elements of a professional code of ethics in IT? Select all that apply.

Common beliefs

Which type of attack is a common cause of data-level breaches with global scope?

Phishing

Which scenario may create a conflict of interest between IT workers and clients?

A consulting firm that provides security services is conducting an independent security audit for a company and is recommending remediation methods

How should an IT professional respond to a cyberattack prior to the incident eradication?

Preserve evidence and activity logs

In response to the pressure from its shareholders, a publicly owned software company plans to implement a strict, globally consistent approach to prevent software piracy of its products that help with implementing green energy solutions. Which impact should be considered from an ethical standpoint due to digital divide?

A negative impact on demographics in less-developed countries

What are two reasons why professional codes of ethics in IT are important? Select all that apply.

They identify the unacceptable behaviors for interacting with customers.

Which part of the decision-making process involves defining a transition plan?

Implementing the decision

What are two components of the concept of information privacy? Select all that apply.

Communication privacy

An IT professional wants the proper credentials and knowledge that are required to collect data from devices affected by cyberattacks to ensure such data would be admissible as evidence in a court of law. Which two certifications should the IT professional obtain? Select all that apply.

EnCase Certified Examiner

Which aspect of the computer security triad provides guidance when dealing with data accuracy in IT?

Integrity

Which factor is primarily used by deontology to evaluate morality of human actions?

Duty

What is the primary goal for a supply chain relating to corporate social responsibility (CSR)?

Sustainability

A software development company wants to make its application run on a database platform that is owned by a private company. Which two actions could the software development company take to address its need but would raise ethical concerns related to data property? Select all that apply.

Use internal staff to reverse engineer the database platform

A software developer creates software and wants to ensure that it will always be in the public domain, including later modifications by others. How should the developer publish the software?

To the public domain with an open-source license

Which two compromises should be considered when evaluating the fairness of artificial intelligence (AI) algorithms? Select all that apply.

Cost

Which challenge associated with data overload in IT is addressed with predictive coding?

Electronic discovery of a large volume of documents

What are two implications of using advanced surveillance technologies in public locations from the technical, legal, and ethical standpoints? Select all that apply.

Proliferation of stalking apps

A private company decides to curb cyberloafing by its employees. What are two implications of this decision from the technical, legal, and ethical standpoints? Select all that apply.

Increased privacy rights infringement

What are two challenges of using stalking apps from the technical, legal, and ethical standpoints? Select all that apply.

Stalking apps allow for remote activation of the built-in microphone.

What is the primary argument against overly restrictive copyright laws?

It stifles creativity.

What are two technical implications of fake news proliferation? Select all that apply.

Increased bandwidth usage on the public internet

Which two threats are associated with facilitating anonymity in IT? Select all that apply.

Increased potential for fraud

Which two characteristics attributed to fake news releases are the most significant threats to data accuracy? Select all that apply.

Publishing speed

What is the primary threat associated with doxing?

Unauthorized disclosure of personally identifiable information (PII)

What does data governance do in the context of ethics in artificial intelligence (AI)?

It ensures data lineage.

A company encourages its employees and their families to wear fitness trackers to promote healthy lifestyles and help address the cost of insurance benefits. Which regulation is related to the legal and ethical challenges within this scenario?

HIPAA

Employees of a company have unrestricted access to the public internet from the office. The company decides to implement an acceptable use policy. What are two implications of the company's decision that relate to the threats associated with accessing pornographic material from employees' computers? Select all that apply.

Increased productivity

A company invested millions of dollars in innovative IT solutions but has failed to see an immediate improvement in labor productivity despite keeping the same number of staff. Why is there a delay in the increase of labor productivity based on the new IT solutions?

Because of lack of training

What are two threats when people use web-based communication channels? Select all that apply.

Users post rumors and gossip.

A car manufacturer is being sued because the automatic braking feature did not engage before an accident. The manufacturer left a setting that allows car owners to disengage the automatic brakes, knowing it could cause an accident. The plaintiff claims they did not know the breaks were disengaged. What should the car manufacturer do to address and mitigate the ethical issue?

Display a warning that the automatic brakes are disengaged

A person has been transferred to a new location for a job and has chosen a new family doctor for healthcare. The doctor would like the patient’s medical history from the previous doctor transferred to the new office. What should be used to guarantee the accuracy of the data?

A health information exchange

A social media company is guaranteeing potential customers that it can increase any company’s credibility on a social media platform by encouraging people to like a company’s page and leave comments. Within a month, every page of the companies that have contracted with the social media company have over one million likes and hundreds of comments. Which two threats exist when a customer visits the page and sees the large number of likes and comments? Select all that apply.

The social media company used bots to create fake likes.

Which two threats in telemedicine may concern patients? Select all that apply.

The electronic medical records of a patient are not available.

Which two things should a government contractor ensure to defend against a strict liability case? Select all that apply.

The software is developed based on strict specifications.

Which two things could happen if a person’s electronic health record (EHR) is compromised? Select all that apply.

The person could receive bills for procedures the person never had.

Which global-level threat exists when parents regularly post videos of their children’s school concerts online?

Children under protective custody could be discovered.

A government agency asks an outside company to develop an application based on a specific set of criteria. Deviations from the specifications are not allowed. During static and dynamic testing, flaws are discovered in the application. What should the company do to avoid losing a strict liability lawsuit?

Advise the client of the defects

Which demographic is most likely to be a victim of cyberstalking?

Women under thirty

A company has offices in multiple countries and wants to use social media to post customer reviews about its service. Which global threat could the company encounter while posting its reviews?

The company posts personal information for every customer.

What does a victim have to prove to win a strict liability case against a software company?

The product was defective.

A company is developing a navigation system for vehicles that uses machine learning to adjust routes. A competitor wants to sabotage the new system to destroy the company’s reputation. Which component would the competitor compromise to feed misrepresented data into the machine learning technology?

Model

A doctor questions a patient about the patient’s symptoms and types the information into a tool to enhance healthcare-related decisions. The clinical decision support tool recommends treatment for the patient. Which global threat could the doctor encounter when using the clinical decision support tool?

The support tool recommends incorrect treatment options.

A company created a device to test blood sugar levels. The device was tested three times. Each time the device was tested, the blood sugar levels were accurate. The company decides the device works properly. How should a person test the device to mitigate the bias in this scenario?

Test 100 times with half of the subjects with various blood sugar levels

A company is searching for a new developer with a minimum of 20 years of experience. The human resources department was asked to remove all information from the resumes that the company thought could be a source of bias. The final 10 candidates were White males. Which two ways can a company prevent bias in candidates in the future? Select all that apply.

Identify the protected features

A software developer publishes an application that can download and play animal videos. Employees of a company can download the application to their company-issued device from a third-party application store. The videos are being watched during business hours despite acceptable use policies that prohibit this. How might Epicurus respond to the question of if it is unethical to obey or disobey the acceptable use policies?

Pleasure is the greatest good for human beings.

How many consecutive years can an employer use an employee with an H-1B visa before the visa expires?

6

Which age does the Age Discrimination in Employment Act of 1967 start protecting people?

40

An organization has a project that needs to be completed quickly. What are two reasons to use a contingent worker instead of a full-time employee? Select all that apply.

The company does not have time to train employees.

Which philosophy is doing what is morally correct instead of following a law?

Deontology

Which executive order prohibited employment discrimination based on race, creed, color, or national origin?

Executive Order 11246

Which certification is the global version of the Statement on Standards for Attestation Engagements (SSAE) No. 16?

International Auditing and Assurance Standards Board (IAASB)

A company has created a device to test blood sugar levels. All five times the device was tested, subjects manually checked their blood sugar levels prior to the test. During each test, the manual and automated results were the same. The company decides the device works properly. What is the source of bias in this ethics-based scenario?

Sample size

A company wants to dispose of 20-year-old computers but is worried about being green. Why should the company avoid throwing the computers in the garbage?

They are made of harmful materials.

An IT firm based in the United States has decided to hire employees with H-1B visas. Which two things must the firm declare? Select all that apply.

The employees will make at least 95 percent of the average salary.

What is a result of adopting green computing?

Safe recycling and disposal of computer equipment

Which two types of discrimination does the Age Discrimination in Employment Act of 1967 protect against? Select all that apply.

Hiring

Which question would a person following utilitarianism consider when creating laws?

Does the law produce the most happiness for everyone?

This is a compilation of the practice quiz questions in Ethics in Technology (D333) at WGU.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser