Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Ethics-In-Technology Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 14

An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.

What should this engineer do?

Options:

A.

Report the activities to the government

B.

Ask to be moved to a different activity

C.

Resign from their job

D.

Contact the local media

Buy Now
Question # 15

Which organization licenses software developers who implement safety and health software in the United States?

Options:

A.

National Society of Professional Engineers

B.

Accreditation Board for Engineering and Technology

C.

American Society for Engineering Education

D.

National Council of Examiners for Engineering and Surveying

Buy Now
Question # 16

What is the unintended source of bias in artificial intelligence (Al) algorithms?

Options:

A.

Tainted examples

B.

Excessive validation sample sizes

C.

Human developers

D.

Excessive training sample sizes

Buy Now
Question # 17

Which piece of legislation outlines who may access a person's credit data?

Options:

A.

Fair and Accurate Credit Transactions Act

B.

General Data Protection Regulation

C.

European Union Data Protection Directive

D.

Fair Credit Reporting Act

Buy Now
Question # 18

An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.

Which law has the nurse violated?

Options:

A.

Electronic Communications Privacy Act (ECPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Gramm-Leach-Bliley Act (GLBA)

D.

Children's Online Privacy Protection Act (COPPA)

Buy Now
Question # 19

An organization is concerned about its cybersecurity after identifying unauthorized records in its payroll database. The organization hires a consultant to test its cyberdefenses. The consultant executes several test attacks on the organization's software and successfully demonstrates that by using Structured Query Language (SOL) injection, the consultant can add rows to the payroll database without obtaining the proper permissions.

Which hacker classification does the consultant fall under?

Options:

A.

Cybercriminal

B.

White hat hacker

C.

Cyberterrorist

D.

Black hat hacker

Buy Now
Question # 20

Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?

Options:

A.

Electronic Communications Privacy Act

B.

Family Educational Rights and Privacy Act

C.

Privacy Act

D.

Right to Financial Privacy Act

Buy Now
Question # 21

A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.

Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?

Options:

A.

Minimizing scope creep requests from the customer

B.

Improving decision-making around agreeing to additional scopes

C.

Avoiding the delivery of an incompatible solution

D.

Understanding the legal implications of noncontractual agreements

Buy Now
Question # 22

A group of hackers manipulated data to disable the national energy infrastructure for its political goals. Which type of attack did the group employ?

Options:

A.

Advanced persistent threat

B.

Cyberterrorism

C.

Cyberespionage

D.

Trojan horse

Buy Now
Exam Name: WGU Ethics In Technology QCO1
Last Update: Feb 22, 2025
Questions: 66
Ethics-In-Technology pdf

Ethics-In-Technology PDF

$25.5  $84.99
Ethics-In-Technology Engine

Ethics-In-Technology Testing Engine

$28.5  $94.99
Ethics-In-Technology PDF + Engine

Ethics-In-Technology PDF + Testing Engine

$40.5  $134.99