Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

WGU Ethics-In-Technology WGU Ethics In TechnologyQCO1 Exam Practice Test

WGU Ethics In TechnologyQCO1 Questions and Answers

Question 1

To establish an expectation among consumers that a professional will behave ethically, a nonprofit society publishes a professional code of ethics. Which benefit can be directly derived from this effort?

Options:

A.

Principled decision-making

B.

Public trust and respect

C.

High standards of practice

D.

Evaluation benchmark

Question 2

A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.

Options:

A.

Privacy violation

B.

Predictive coding

C.

Proxy discrimination

D.

Small sample size

Question 3

Aninsurance company develops an artificial intelligence (Al) system to manage claims automatically. Although this technology benefits most customers, people from neighborhoods associated with a low socioeconomic status find it harder to get their claims approved. The company decides to keep using the system.

Which ethical theory justifies the company to come to this decision?

Options:

A.

Pluralism

B.

Utilitarianism

C.

Virtue ethics

D.

Deontology

Question 4

A new IT employee has questions about how the organization determines resolutions to issues that impact its values and overarching principles. What should the employee refer to first for guidance?

Options:

A.

Corporate responsibility matrix

B.

Ethical decision-making processes

C.

Code of ethics

D.

Board of directors

Question 5

A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.

What should the consulting firm use to help achieve this goal?

Options:

A.

Electronic Product Environmental Assessment Tool (EPEAT).

B.

Environmental impact assessment (EIA).

C.

Professional employer organization (PEO)

D.

Restriction of Hazardous Substances Directive (RoHS)

Question 6

A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.

What is a disadvantage of using contingent workers to support the company's goals?

Options:

A.

Any skills gained during employment will be lost to the company at the project's completion.

B.

Internal business process understanding will be minimal given the temporary nature of the workers.

C.

The company may require the same worker tor other projects.

D.

The company does not have to provide benefits throughout the project's lifecycle.

Question 7

Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?

Options:

A.

Digital Millennium Copyright Act

B.

Copyright Term Extension Act

C.

Digital Performance Right in Sound Recordings Act

D.

Leahy-Smith America Invents Act

Question 8

An organization creating a new consumer-profiling software tool has concerns about the software's ability to accurately capture and process data. The team decides to use an iterative approach to write the code, allowing for continuous testing and adjustment of requirements. The organization believes this will help ensure the software's data collection capabilities are both efficient and accurate.

Which methodology has the organization employed?

Options:

A.

Total quality management

B.

Waterfall development

C.

Quality assurance

D.

Agile development

Question 9

A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.

Which ethical theory does this approach represent?

Options:

A.

Deontology

B.

Relativism

C.

Virtue

D.

Consequentialism

Question 10

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

Options:

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

Question 11

A consulting company employs H-1B workers. Even though companies applying for H*1B visas must offer a wage that is at least 95% of the average salary for the occupation, a close review of salarieswithin the consulting firm suggests that its H-1B workers are often paid 20% less on average than those with similar skill sets.

Which loophole is the company using to avoid paying H-1B workers a fair wage?

Options:

A.

Laying off employees with U.S. citizenship to lower the average salary numbers

B.

Classifying an H-1B worker as entry level when they fill a position of an experienced worker

C.

Pressuring H-1B workers to file petitions with the government to allow lower salary

D.

Employing H-1 B workers to work remotely from countries where the cost of living is lower

Question 12

A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.

Which method of attack was used to compromise the worker's machine?

Options:

A.

Blended threat

B.

Trojan horse

C.

Spear phishing

D.

Zero-day exploit

Question 13

A malicious hacker takes over several computers via the internet and causes them to flood a target site with high volumes of data queries and other small tasks. Which type of attack is the hacker performing against the target site?

Options:

A.

Zero-day exploit

B.

Ransomware

C.

Denial-of-service (DoS)

D.

Worm

Question 14

Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?

Options:

A.

PRISM

B.

Cookies

C.

MYSTIC

D.

Stingray

Question 15

What is the first step in ethical decision-making for an IT professional?

Options:

A.

Choose an alternative

B.

Develop a problem statement

C.

Implement a solution

D.

Identify alternatives

Question 16

A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team's moral character.

Which ethical theory does this represent?

Options:

A.

Deontology

B.

Virtue

C.

Consequentialism

D.

Relativism

Question 17

An auto manufacturer is developing a new line of autonomous vehicles. Multiple accidents, including fatalities, involving competitors' autonomous vehicles have already occurred. Management is concerned about potential liability, reputational damage, and financial loss. In response, the system safety engineer conducts a review at each stage of the software development process to record, assess, and account for detected issues.

Which type of log is the system safety engineer using?

Options:

A.

Risk

B.

Change

C.

Hazard

D.

Defect

Question 18

A bank customer recently received a mailer from a third party affiliated with the customer's bank. The customer is concerned because the mailer includes information about the customer's remaining mortgage amount.

What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the customer to control this type of information?

Options:

A.

Financial privacy

B.

Pretexting

C.

Consumer protection

D.

Safeguards

Question 19

Which piece of legislation outlines who may access a person's credit data?

Options:

A.

Fair and Accurate Credit Transactions Act

B.

General Data Protection Regulation

C.

European Union Data Protection Directive

D.

Fair Credit Reporting Act