WGU C961 ETHICS IN TECHNOLOGY GLOSSARY EXAM
QUESTION AND ANSWERS (2025-2026)
Question 1
A document that stipulates restrictions and practices that a user must agree in order to use
organizational computing and network resources.
Acceptable use policy (AUP)
Question 2
A network attack in which an intruder gains access to a network and stays there—undetected— with the
intention of stealing data over a long period of time (weeks or even months).
Advanced persistent threat (APT)
Question 3
An agreement of the World Trade Organization that requires member governments to ensure that
intellectual property rights can be enforced under their laws and that penalties for infringement are
tough enough to deter further violations.
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Question 4
The expression of opinions by people who do not reveal their identity.
Anonymous expression
,Question 5
A service that allows anonymity on the internet by using a computer program that strips the originating
header and/or IP address from the message and then forwards the message to its intended recipient.
Anonymous remailer service
Question 6
Laws designed to reduce frivolous slapps (strategic lawsuit against public participation [SLAPP], which is
a lawsuit filed by corporations, government officials, and others against citizens and community groups
who oppose them on matters of concern).
Anti-SLAPP laws
Question 7
Software that scans for a specific sequence of bytes, known as a virus signature, that indicates the
presence of a specific virus.
Antivirus software
Question 8
The people, procedures, hardware, software, data, and knowledge needed to develop computer
systems and machines that can simulate human intelligence processes, including learning (the
acquisition of information and rules for using the information), reasoning (using rules to reach
conclusions), and self-correction (using the outcome from one scenario to improve its performance on
future scenarios).
Artificial intelligence systems
Question 9
A group that provides assistance to the board of directors in fulfilling its responsibilities with respect to
the oversight of the quality and integrity of the organization's accounting and reporting practices and
controls, including financial statements and reports; the organization's compliance with legal and
regulatory requirements; the qualifications, independence, and performance of the company's
independent auditor; and the performance of the company's internal audit team.
Audit committee
Question 10
,The moral corruption of people in power, which is often facilitated by a tendency for people to look the
other way when their leaders act inappropriately.
Bathsheba syndrome
Question 11
A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious
code into a single payload.
Blended threat
Question 12
An agreed-upon sets of skills and abilities that all licensed professionals must possess.
Body of knowledge
Question 13
A large group of computers, which are controlled from one or more remote locations by hackers,
without the knowledge or consent of their owners.
Botnet
Question 14
The failure of one party to meet the terms of a contract.
Breach of contract
Question 15
The failure to act as a reasonable person would act.
Breach of the duty of care
Question 16
, The act of providing money, property, or favors to someone in business or government in order to
obtain a business advantage.
Bribery
Question 17
A business policy that permits, and in some cases, encourages employees to use their own mobile
devices (smartphones, tablets, or laptops) to access company computing resources and applications,
including email, corporate databases, the corporate intranet, and the Internet.
Bring your own device (BYOD)
Question 18
A trade group that represent the world's largest software and hardware manufacturers.
BSA | The Software Alliance (BSA)
Question 19
A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations
plan, and an incident management plan with an active governance process to minimize the potential
impact of any security incident and to ensure business continuity in the event of a cyberattack or some
form of disaster.
Business continuity plan
Question 20
Software that generates and grades tests that humans can pass and all but the most sophisticated
computer programs cannot.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Question 21
Indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of
the certifying organization. Certification can also apply to products (e.g., the Wi-Fi CERTIFIED logo
assures that the product has met rigorous interoperability testing to ensure that it will work with other
Wi-Fi-certified products) and is generally voluntary.
QUESTION AND ANSWERS (2025-2026)
Question 1
A document that stipulates restrictions and practices that a user must agree in order to use
organizational computing and network resources.
Acceptable use policy (AUP)
Question 2
A network attack in which an intruder gains access to a network and stays there—undetected— with the
intention of stealing data over a long period of time (weeks or even months).
Advanced persistent threat (APT)
Question 3
An agreement of the World Trade Organization that requires member governments to ensure that
intellectual property rights can be enforced under their laws and that penalties for infringement are
tough enough to deter further violations.
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Question 4
The expression of opinions by people who do not reveal their identity.
Anonymous expression
,Question 5
A service that allows anonymity on the internet by using a computer program that strips the originating
header and/or IP address from the message and then forwards the message to its intended recipient.
Anonymous remailer service
Question 6
Laws designed to reduce frivolous slapps (strategic lawsuit against public participation [SLAPP], which is
a lawsuit filed by corporations, government officials, and others against citizens and community groups
who oppose them on matters of concern).
Anti-SLAPP laws
Question 7
Software that scans for a specific sequence of bytes, known as a virus signature, that indicates the
presence of a specific virus.
Antivirus software
Question 8
The people, procedures, hardware, software, data, and knowledge needed to develop computer
systems and machines that can simulate human intelligence processes, including learning (the
acquisition of information and rules for using the information), reasoning (using rules to reach
conclusions), and self-correction (using the outcome from one scenario to improve its performance on
future scenarios).
Artificial intelligence systems
Question 9
A group that provides assistance to the board of directors in fulfilling its responsibilities with respect to
the oversight of the quality and integrity of the organization's accounting and reporting practices and
controls, including financial statements and reports; the organization's compliance with legal and
regulatory requirements; the qualifications, independence, and performance of the company's
independent auditor; and the performance of the company's internal audit team.
Audit committee
Question 10
,The moral corruption of people in power, which is often facilitated by a tendency for people to look the
other way when their leaders act inappropriately.
Bathsheba syndrome
Question 11
A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious
code into a single payload.
Blended threat
Question 12
An agreed-upon sets of skills and abilities that all licensed professionals must possess.
Body of knowledge
Question 13
A large group of computers, which are controlled from one or more remote locations by hackers,
without the knowledge or consent of their owners.
Botnet
Question 14
The failure of one party to meet the terms of a contract.
Breach of contract
Question 15
The failure to act as a reasonable person would act.
Breach of the duty of care
Question 16
, The act of providing money, property, or favors to someone in business or government in order to
obtain a business advantage.
Bribery
Question 17
A business policy that permits, and in some cases, encourages employees to use their own mobile
devices (smartphones, tablets, or laptops) to access company computing resources and applications,
including email, corporate databases, the corporate intranet, and the Internet.
Bring your own device (BYOD)
Question 18
A trade group that represent the world's largest software and hardware manufacturers.
BSA | The Software Alliance (BSA)
Question 19
A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations
plan, and an incident management plan with an active governance process to minimize the potential
impact of any security incident and to ensure business continuity in the event of a cyberattack or some
form of disaster.
Business continuity plan
Question 20
Software that generates and grades tests that humans can pass and all but the most sophisticated
computer programs cannot.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Question 21
Indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of
the certifying organization. Certification can also apply to products (e.g., the Wi-Fi CERTIFIED logo
assures that the product has met rigorous interoperability testing to ensure that it will work with other
Wi-Fi-certified products) and is generally voluntary.