Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

Ethics-In-Technology Questions and Answers

Question # 6

A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.

Which method of attack was used to compromise the worker's machine?

A.

Blended threat

B.

Trojan horse

C.

Spear phishing

D.

Zero-day exploit

Full Access
Question # 7

Aninsurance company develops an artificial intelligence (Al) system to manage claims automatically. Although this technology benefits most customers, people from neighborhoods associated with a low socioeconomic status find it harder to get their claims approved. The company decides to keep using the system.

Which ethical theory justifies the company to come to this decision?

A.

Pluralism

B.

Utilitarianism

C.

Virtue ethics

D.

Deontology

Full Access
Question # 8

What are two outcomes of adherence to a professional code of ethics for individuals, their profession, and society as a whole? Choose 2 answers.

A.

Standardized business practices

B.

Consistent decision-making

C.

Assured employer integrity

D.

Faster career advancement

Full Access
Question # 9

A chief financial officer (CFO) at a major telecommunications company decides to replace a high number of its customer-facing stores with artificial intelligence-enabled telecom booths. The telecom booths will enable current or new subscribers to buy or replace SIM cards or mobile phones on the go. The CFO is concerned about a major reduction in the workforce but believes this move will help grow the company's subscriber base, reduce customer churn, and increase overall company profits.

Which ethical theory does this approach represent?

A.

Deontology

B.

Care

C.

Consequentialism

D.

Virtue

Full Access
Question # 10

Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?

A.

Digital Millennium Copyright Act

B.

Copyright Term Extension Act

C.

Digital Performance Right in Sound Recordings Act

D.

Leahy-Smith America Invents Act

Full Access
Question # 11

A new IT employee has questions about how the organization determines resolutions to issues that impact its values and overarching principles. What should the employee refer to first for guidance?

A.

Corporate responsibility matrix

B.

Ethical decision-making processes

C.

Code of ethics

D.

Board of directors

Full Access
Question # 12

A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.

Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?

A.

Minimizing scope creep requests from the customer

B.

Improving decision-making around agreeing to additional scopes

C.

Avoiding the delivery of an incompatible solution

D.

Understanding the legal implications of noncontractual agreements

Full Access
Question # 13

A cloud computing company uses machine learning software to screen the resumes of job seekers. The company's aim is to reduce potential human prejudice in the hiring process. To set up the software and train the machine learning model, the company provides information from its hiring decisions over the past five years. After several months of using the software, the company runs an audit and finds that the software screens out minority job seekers at a much higher rate.

Which behavior is the trained machine learning model displaying?

A.

Exposing bias that exists in the data

B.

Acting fairly toward candidates

C.

Exhibiting intent to harm applicants

D.

Scoring low humility measurement

Full Access
Question # 14

An organization is concerned about its cybersecurity after identifying unauthorized records in its payroll database. The organization hires a consultant to test its cyberdefenses. The consultant executes several test attacks on the organization's software and successfully demonstrates that by using Structured Query Language (SOL) injection, the consultant can add rows to the payroll database without obtaining the proper permissions.

Which hacker classification does the consultant fall under?

A.

Cybercriminal

B.

White hat hacker

C.

Cyberterrorist

D.

Black hat hacker

Full Access
Question # 15

A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.

Which name describes this specialist?

A.

Black hat hacker

B.

While hat hacker

C.

Hacktivist

D.

Industrial spy

Full Access
Question # 16

A university brought legal proceedings against a student who posted negative comments anonymously on the internet about the university's dean. Which type of lawsuit is this?

A.

Strategic lawsuit against public participation (SLAPP)

B.

Anti-strategic lawsuit against public participation (Anti-SLAPP)

C.

Hate speech

D.

John Doe lawsuit

Full Access
Question # 17

An IT company adopts a professional cod© of ethics suggested by a nationally recognized IT professionals organization. Which benefit to the company can be directly derived from adopting a professional code of ethics?

A.

Guidelines for principled decision-making

B.

An evaluation benchmark

C.

Increased yearly revenue

D.

Decreased company expenditure

Full Access
Question # 18

What is the first step in ethical decision-making for an IT professional?

A.

Choose an alternative

B.

Develop a problem statement

C.

Implement a solution

D.

Identify alternatives

Full Access
Question # 19

An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.

Which law has the nurse violated?

A.

Electronic Communications Privacy Act (ECPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Gramm-Leach-Bliley Act (GLBA)

D.

Children's Online Privacy Protection Act (COPPA)

Full Access