WGU D333 ETHICS IN TECHNOLOGY – INTENSIVE
NCLEX-STYLE QUESTIONS WITH RATIONALES
(QUESTIONS 1–332)
1. What is an Acceptable Use Policy (AUP)?
A. A document that defines hardware specifications for employees
B. A set of rules for ethical behavior in the workplace
C. A document that stipulates restrictions and practices that a user must agree to in order
to use organizational computing and network resources
D. A privacy policy for customer data
Rationale: An AUP defines what users can and cannot do when accessing company computing
resources. It helps protect both the organization and its users from misuse of technology.
2. What does it mean when an organization accepts a risk?
A. The organization eliminates the risk completely
B. The organization decides to accept a risk because the cost of avoiding it outweighs the
potential loss
C. The organization transfers the risk to another party
D. The organization ignores the risk
Rationale: Risk acceptance occurs when avoiding a risk is costlier than the potential loss, often
requiring judgment calls in high-stakes systems.
3. What is an Advanced Persistent Threat (APT)?
A. A malware program that deletes files randomly
B. A phishing scam targeting multiple users
C. A network attack in which an intruder gains access and remains undetected to steal data
over a long period
D. A temporary virus that infects a computer for a few hours
Rationale: APTs are long-term, stealthy cyberattacks aimed at stealing data over weeks or
months.
,ESTUDYR
4. Agile development is characterized by:
A. A rigid step-by-step software development process
B. Documentation-heavy software design
C. Iterative development cycles of 1–4 weeks allowing evolving requirements
D. Full specification of system requirements before coding
Rationale: Agile development embraces changing requirements and develops software
incrementally, unlike the waterfall model.
5. What does the Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS) enforce?
A. Free access to all intellectual property for developing countries
B. Enforcement of intellectual property rights with penalties for infringement
C. Limitations on patents for pharmaceuticals only
D. Trade agreements for agricultural products
Rationale: TRIPS ensures global enforcement of IP rights and deterrence against violations.
6. Which of the following is true about the American Recovery and Reinvestment Act
(ARRA)?
A. It primarily focused on environmental issues
B. It eliminated privacy protections for electronic health records
C. It provided $787 billion in spending with strong privacy provisions for health records
D. It was a military defense act
Rationale: ARRA included privacy protections, such as banning the sale of health info and
promoting encryption.
7. What does Annualized Loss Expectancy (ALE) calculate?
A. Total assets of a company
B. Cost of insurance premiums
C. Estimated loss from a potential risk event over a year (ALE = ARO × SLE)
D. Annual profits lost to taxes
,ESTUDYR
Rationale: ALE measures the expected yearly loss from a risk, factoring in probability (ARO)
and single loss value (SLE).
8. What is the Annualized Rate of Occurrence (ARO)?
A. The total revenue of a company in one year
B. The probability that a risk event will occur over the course of a year
C. The financial impact of a risk if it occurs
D. The legal liability associated with a risk
Rationale: ARO is a measure of risk frequency used in calculating ALE.
9. What defines anonymous expression?
A. Expressing opinions publicly under your real name
B. Sending emails through company servers only
C. Expression of opinions by people who do not reveal their identity
D. Posting on social media with a verified account
Rationale: Anonymity protects identity while allowing the expression of ideas or opinions.
10. An anonymous remailer service allows:
A. Tracking email origins for legal purposes
B. Securing email with encryption
C. Sending emails without revealing the sender's header or IP address
D. Automatic spam filtering
Rationale: Anonymous remailers strip identifying info to protect the sender’s identity online.
11. Anti-SLAPP laws are designed to:
A. Promote lawsuits against whistleblowers
B. Reduce frivolous lawsuits filed to intimidate public participation
C. Eliminate freedom of speech online
D. Protect corporate intellectual property
Rationale: Anti-SLAPP laws prevent entities from using legal action to silence critics.
, ESTUDYR
12. What is the main function of antivirus software?
A. Encrypts network traffic
B. Protects against phishing emails only
C. Scans for virus signatures to detect specific malware
D. Monitors employee computer usage
Rationale: Antivirus programs identify known malware by scanning for unique sequences (virus
signatures).
13. Artificial Intelligence (AI) systems include:
A. Only software that plays games
B. Only robots in factories
C. People, procedures, hardware, software, data, and knowledge to simulate human
intelligence
D. Only cloud-based machine learning models
Rationale: AI systems encompass all components needed to simulate learning, reasoning, and
self-correction.
14. An audit committee is responsible for:
A. Managing all IT operations
B. Creating marketing campaigns
C. Oversight of accounting, reporting practices, compliance, and internal/external audits
D. Writing company policies
Rationale: Audit committees ensure the integrity of financial reporting and compliance with
laws.
15. Avoidance in risk management means:
A. Transferring the risk to another organization
B. Ignoring the risk
C. Eliminating the vulnerability causing the risk altogether
D. Accepting the consequences of the risk