Ethics in Technology Practice Quizzes
60 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of guidance is provided by professional codes of ethics within IT?

  • Course of action in cases of conflict of interest (correct)
  • General definition of a breach of contract
  • Detailed definition of a material breach of contract
  • Basic terms of whistleblower policies
  • What is the meaning of morals in the context of ethical judgment?

  • A habit that inclines an individual to do what is generally acceptable
  • A habit that inclines an individual to do what is generally unacceptable
  • The personal principles that determine what an individual considers to be right or wrong (correct)
  • The code of behavior defined by a group an individual belongs to
  • Which measure of the confidentiality, integrity, and availability (CIA) triad should be used by IT professionals at the organization level to supply validation of non-repudiation regarding data access in IT?

  • Security audit (correct)
  • Antivirus software
  • Intrusion detection
  • Data encryption
  • What are two main elements of a professional code of ethics in IT? Select all that apply.

    <p>Common beliefs</p> Signup and view all the answers

    Which type of attack is a common cause of data-level breaches with global scope?

    <p>Phishing</p> Signup and view all the answers

    Which scenario may create a conflict of interest between IT workers and clients?

    <p>A consulting firm that provides security services is conducting an independent security audit for a company and is recommending remediation methods</p> Signup and view all the answers

    How should an IT professional respond to a cyberattack prior to the incident eradication?

    <p>Preserve evidence and activity logs</p> Signup and view all the answers

    In response to the pressure from its shareholders, a publicly owned software company plans to implement a strict, globally consistent approach to prevent software piracy of its products that help with implementing green energy solutions. Which impact should be considered from an ethical standpoint due to digital divide?

    <p>A negative impact on demographics in less-developed countries</p> Signup and view all the answers

    What are two reasons why professional codes of ethics in IT are important? Select all that apply.

    <p>They identify the unacceptable behaviors for interacting with customers.</p> Signup and view all the answers

    Which part of the decision-making process involves defining a transition plan?

    <p>Implementing the decision</p> Signup and view all the answers

    What are two components of the concept of information privacy? Select all that apply.

    <p>Communication privacy</p> Signup and view all the answers

    An IT professional wants the proper credentials and knowledge that are required to collect data from devices affected by cyberattacks to ensure such data would be admissible as evidence in a court of law. Which two certifications should the IT professional obtain? Select all that apply.

    <p>EnCase Certified Examiner</p> Signup and view all the answers

    Which aspect of the computer security triad provides guidance when dealing with data accuracy in IT?

    <p>Integrity</p> Signup and view all the answers

    Which factor is primarily used by deontology to evaluate morality of human actions?

    <p>Duty</p> Signup and view all the answers

    What is the primary goal for a supply chain relating to corporate social responsibility (CSR)?

    <p>Sustainability</p> Signup and view all the answers

    A software development company wants to make its application run on a database platform that is owned by a private company. Which two actions could the software development company take to address its need but would raise ethical concerns related to data property? Select all that apply.

    <p>Use internal staff to reverse engineer the database platform</p> Signup and view all the answers

    A software developer creates software and wants to ensure that it will always be in the public domain, including later modifications by others. How should the developer publish the software?

    <p>To the public domain with an open-source license</p> Signup and view all the answers

    Which two compromises should be considered when evaluating the fairness of artificial intelligence (AI) algorithms? Select all that apply.

    <p>Cost</p> Signup and view all the answers

    Which challenge associated with data overload in IT is addressed with predictive coding?

    <p>Electronic discovery of a large volume of documents</p> Signup and view all the answers

    What are two implications of using advanced surveillance technologies in public locations from the technical, legal, and ethical standpoints? Select all that apply.

    <p>Proliferation of stalking apps</p> Signup and view all the answers

    A private company decides to curb cyberloafing by its employees. What are two implications of this decision from the technical, legal, and ethical standpoints? Select all that apply.

    <p>Increased privacy rights infringement</p> Signup and view all the answers

    What are two challenges of using stalking apps from the technical, legal, and ethical standpoints? Select all that apply.

    <p>Stalking apps allow for remote activation of the built-in microphone.</p> Signup and view all the answers

    What is the primary argument against overly restrictive copyright laws?

    <p>It stifles creativity.</p> Signup and view all the answers

    What are two technical implications of fake news proliferation? Select all that apply.

    <p>Increased bandwidth usage on the public internet</p> Signup and view all the answers

    Which two threats are associated with facilitating anonymity in IT? Select all that apply.

    <p>Increased potential for fraud</p> Signup and view all the answers

    Which two characteristics attributed to fake news releases are the most significant threats to data accuracy? Select all that apply.

    <p>Publishing speed</p> Signup and view all the answers

    What is the primary threat associated with doxing?

    <p>Unauthorized disclosure of personally identifiable information (PII)</p> Signup and view all the answers

    What does data governance do in the context of ethics in artificial intelligence (AI)?

    <p>It ensures data lineage.</p> Signup and view all the answers

    A company encourages its employees and their families to wear fitness trackers to promote healthy lifestyles and help address the cost of insurance benefits. Which regulation is related to the legal and ethical challenges within this scenario?

    <p>HIPAA</p> Signup and view all the answers

    Employees of a company have unrestricted access to the public internet from the office. The company decides to implement an acceptable use policy. What are two implications of the company's decision that relate to the threats associated with accessing pornographic material from employees' computers? Select all that apply.

    <p>Increased productivity</p> Signup and view all the answers

    A company invested millions of dollars in innovative IT solutions but has failed to see an immediate improvement in labor productivity despite keeping the same number of staff. Why is there a delay in the increase of labor productivity based on the new IT solutions?

    <p>Because of lack of training</p> Signup and view all the answers

    What are two threats when people use web-based communication channels? Select all that apply.

    <p>Users post rumors and gossip.</p> Signup and view all the answers

    A car manufacturer is being sued because the automatic braking feature did not engage before an accident. The manufacturer left a setting that allows car owners to disengage the automatic brakes, knowing it could cause an accident. The plaintiff claims they did not know the breaks were disengaged. What should the car manufacturer do to address and mitigate the ethical issue?

    <p>Display a warning that the automatic brakes are disengaged</p> Signup and view all the answers

    A person has been transferred to a new location for a job and has chosen a new family doctor for healthcare. The doctor would like the patient’s medical history from the previous doctor transferred to the new office. What should be used to guarantee the accuracy of the data?

    <p>A health information exchange</p> Signup and view all the answers

    A social media company is guaranteeing potential customers that it can increase any company’s credibility on a social media platform by encouraging people to like a company’s page and leave comments. Within a month, every page of the companies that have contracted with the social media company have over one million likes and hundreds of comments. Which two threats exist when a customer visits the page and sees the large number of likes and comments? Select all that apply.

    <p>The social media company used bots to create fake likes.</p> Signup and view all the answers

    Which two threats in telemedicine may concern patients? Select all that apply.

    <p>The electronic medical records of a patient are not available.</p> Signup and view all the answers

    Which two things should a government contractor ensure to defend against a strict liability case? Select all that apply.

    <p>The software is developed based on strict specifications.</p> Signup and view all the answers

    Which two things could happen if a person’s electronic health record (EHR) is compromised? Select all that apply.

    <p>The person could receive bills for procedures the person never had.</p> Signup and view all the answers

    Which global-level threat exists when parents regularly post videos of their children’s school concerts online?

    <p>Children under protective custody could be discovered.</p> Signup and view all the answers

    A government agency asks an outside company to develop an application based on a specific set of criteria. Deviations from the specifications are not allowed. During static and dynamic testing, flaws are discovered in the application. What should the company do to avoid losing a strict liability lawsuit?

    <p>Advise the client of the defects</p> Signup and view all the answers

    Which demographic is most likely to be a victim of cyberstalking?

    <p>Women under thirty</p> Signup and view all the answers

    A company has offices in multiple countries and wants to use social media to post customer reviews about its service. Which global threat could the company encounter while posting its reviews?

    <p>The company posts personal information for every customer.</p> Signup and view all the answers

    What does a victim have to prove to win a strict liability case against a software company?

    <p>The product was defective.</p> Signup and view all the answers

    A company is developing a navigation system for vehicles that uses machine learning to adjust routes. A competitor wants to sabotage the new system to destroy the company’s reputation. Which component would the competitor compromise to feed misrepresented data into the machine learning technology?

    <p>Model</p> Signup and view all the answers

    A doctor questions a patient about the patient’s symptoms and types the information into a tool to enhance healthcare-related decisions. The clinical decision support tool recommends treatment for the patient. Which global threat could the doctor encounter when using the clinical decision support tool?

    <p>The support tool recommends incorrect treatment options.</p> Signup and view all the answers

    A company created a device to test blood sugar levels. The device was tested three times. Each time the device was tested, the blood sugar levels were accurate. The company decides the device works properly. How should a person test the device to mitigate the bias in this scenario?

    <p>Test 100 times with half of the subjects with various blood sugar levels</p> Signup and view all the answers

    A company is searching for a new developer with a minimum of 20 years of experience. The human resources department was asked to remove all information from the resumes that the company thought could be a source of bias. The final 10 candidates were White males. Which two ways can a company prevent bias in candidates in the future? Select all that apply.

    <p>Identify the protected features</p> Signup and view all the answers

    A software developer publishes an application that can download and play animal videos. Employees of a company can download the application to their company-issued device from a third-party application store. The videos are being watched during business hours despite acceptable use policies that prohibit this. How might Epicurus respond to the question of if it is unethical to obey or disobey the acceptable use policies?

    <p>Pleasure is the greatest good for human beings.</p> Signup and view all the answers

    How many consecutive years can an employer use an employee with an H-1B visa before the visa expires?

    <p>6</p> Signup and view all the answers

    Which age does the Age Discrimination in Employment Act of 1967 start protecting people?

    <p>40</p> Signup and view all the answers

    An organization has a project that needs to be completed quickly. What are two reasons to use a contingent worker instead of a full-time employee? Select all that apply.

    <p>The company does not have time to train employees.</p> Signup and view all the answers

    Which philosophy is doing what is morally correct instead of following a law?

    <p>Deontology</p> Signup and view all the answers

    Which executive order prohibited employment discrimination based on race, creed, color, or national origin?

    <p>Executive Order 11246</p> Signup and view all the answers

    Which certification is the global version of the Statement on Standards for Attestation Engagements (SSAE) No. 16?

    <p>International Auditing and Assurance Standards Board (IAASB)</p> Signup and view all the answers

    A company has created a device to test blood sugar levels. All five times the device was tested, subjects manually checked their blood sugar levels prior to the test. During each test, the manual and automated results were the same. The company decides the device works properly. What is the source of bias in this ethics-based scenario?

    <p>Sample size</p> Signup and view all the answers

    A company wants to dispose of 20-year-old computers but is worried about being green. Why should the company avoid throwing the computers in the garbage?

    <p>They are made of harmful materials.</p> Signup and view all the answers

    An IT firm based in the United States has decided to hire employees with H-1B visas. Which two things must the firm declare? Select all that apply.

    <p>The employees will make at least 95 percent of the average salary.</p> Signup and view all the answers

    What is a result of adopting green computing?

    <p>Safe recycling and disposal of computer equipment</p> Signup and view all the answers

    Which two types of discrimination does the Age Discrimination in Employment Act of 1967 protect against? Select all that apply.

    <p>Hiring</p> Signup and view all the answers

    Which question would a person following utilitarianism consider when creating laws?

    <p>Does the law produce the most happiness for everyone?</p> Signup and view all the answers

    More Like This

    Mastering IT Professional Ethics
    5 questions
    Social and Professional Issues in IT
    5 questions
    Social and Professional Issues in IT
    19 questions
    Use Quizgecko on...
    Browser
    Browser