UPDATED ACTUAL Questions and
CORRECT Answers
What is the meaning of ethics in the context of ethical judgment? - CORRECT
ANSWER - The code of behavior defined by a group an individual belongs to
Which area of ethical concerns in IT deals directly with information ownership? - CORRECT
ANSWER - Property
A car manufacturer decides to alter its emission testing to pass regulatory requirements. The
emission reduction system is only used during tests. The system is not engaged during normal
driving conditions in order to improve fuel efficiency, torque, and acceleration. Which step in the
ethical decision-making process should have been used to evaluate the environmental impact of
this decision? - CORRECT ANSWER - Choose Alternatives
Which two ways may advances in technology affect common ethical assumptions? - CORRECT
ANSWER - Companies take advantage of their privileged access to personal user data to
benefit their shareholders.
Surveillance allows companies to increase productivity by closely watching their employees'
behavior.
Which ethics-related consideration is addressed by the California Online Privacy Protection Act
of 2003 and its amendments? - CORRECT ANSWER - Do Not Track Signals
Which two aspects of an IT worker's responsibilities involve ethical issues that might arise in the
relationship between IT workers and IT users? - CORRECT ANSWER - Discouraging
Software Piracy
Controlling Information Sharing
, A well-respected IT professional from a small software company uses resume inflation when
searching for a new position. Which two ethical challenges may encourage this behavior? -
CORRECT ANSWER - Prioritization of Personal Loyalty
Disregard for the Professional Code of Conduct
What is an objective of a professional code of ethics in IT? - CORRECT ANSWER -
Provide Benchmarks for Self-Assessment
Which type of cyberattack uses text messages to trick victims into disclosing personal
information that can subsequently be exploited for a financial gain? - CORRECT
ANSWER - Smishing
What is the goal of a white hat hacker in cyberattacks in IT? - CORRECT ANSWER - To
identify vulnerabilities of a company's information system to remediate them
Which major U.S. regulation governs the collection, disclosure, and protection of consumers'
personally identifiable information (PII) data by companies that provide financial products and
services? - CORRECT ANSWER - Gramm-Leach-Bliley Act
What are the consequences of more lenient bring-your-own-devices (BYOD) policies for IT? -
CORRECT ANSWER - Increased productivity and increased vulnerability to data system
breaches
What are two reasons why professional codes of ethics in IT are important? - CORRECT
ANSWER - They identify the unacceptable behaviors for interacting with customers.
They identify the acceptable behaviors for interacting with customers.
What is the primary goal for a supply chain relating to corporate social responsibility (CSR)? -
CORRECT ANSWER - Sustainability