100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D333- Ethics In Technology Questions & Answers Latest.pdf

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
22-02-2025
Written in
2024/2025

WGU D333- Ethics In Technology Questions & Answers L

Institution
WGU D333 Ethics In Technology
Module
WGU D333 Ethics In Technology









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D333 Ethics In Technology
Module
WGU D333 Ethics In Technology

Document information

Uploaded on
February 22, 2025
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D333- Ethics In Technology
5.0 (1 review)

Save




Students also studied


Flashcard sets Study guides Practice tests



WGU D333 Ethics in Technology - W... D333 Ethics in Technology BA 300 Se

332 terms 169 terms 31 terms 45




Drkintrudr Preview blove871 Preview wesley_361 Preview




Practice questions for this set


Learn 1 /7 Study with Learn




a habit that inclines people to do what's acceptable



Give this one a try later!



1 justice 2 blended threat




vitrue 4 smishing



Don't know?




Terms in this set (176)


vitrue a habit that inclines people to do what's acceptable

vice A habit of unacceptable behavior

Integrirty acts in accordance with personal code of principles

the moral corruption of people in power, also a tendency for people to look the
Bathesheba Syndrome
other way when leaders act inappropriately

Software & Information Industry trade groups that represent largest software and hardware manufactures, stop
Association (SIIA) & BSA unauthorized copyright, protect intellectual property, provides education

Misrepresentation A false statement or lie that can render the contract void.

, breach of contract A failure to perform, as promised, at the time the performance was due.

Organization's internal control all people, policies, processes, procedures, & systems controlled by management

makes it a crime to bribe a foreign official, foreign party official, or candidate for
Foreign Corrupt Practices Act 1977 foreign political office. This act applies to all US citizens and companies listed on
any US stock exchange

An agreed-upon sets of skills and abilities that all licensed professionals must
body of knowledge
possess.

National Council of Examiners & develops, administers, and scores the examinations used for engineering and
Surveying survey licensure in the US

not doing something a reasonable person would do/ something a reasonable
Negligence
person would not do

the obligation people owe each other not to cause any unreasonable harm or risk
Duty of Care
of harm

A legal standard that defendants who have particular expertise or competence
Reasonable Professional Standard
are measured against.

A legal standard that defines how an objective, careful, and conscientious person
Reasonable Person Standard
would have acted in the same circumstances.

Professional Malpractice break of duty of care by a professional

A cyberattack that takes place before the security community and/or software
Zero-Day Exploit
developers become aware of and fix a security vulnerability.

someone who violates computer or internet security maliciously or for illegal
Black Hat Hacker
personal gain

An employee or contractor who attempts to gain financially and/or disrupt a
Malicious Insider
company's information systems and business operations

Cybercriminal Someone who attacks a computer system or network for financial gain

Someone who attempts to destroy the infrastructure components of
Cyberterrorist
governments, financial institutions, utilities, and emergency response units

Cracker An individual who causes problems, steals data, and corrupts systems

Ransomware malware until you meet certain demands

A piece of programming code, usually disguised as something else, that causes a
Virus
computer to behave in an unexpected and usually undesirable manner.

a harmful program that resides in the active memory of the computer and
Worm
duplicates itself

Trojan Horse A seemingly harmless program in which malicious code is hidden.

Blended Threat combines various types of exploits and vulnerabilities in one payload

a malicious hacker takes over computers via the internet and causes them to flood
DDoS Attack/ Denial of Service Attack
a target site with demands for data/small tasks

A set of programs that enables its user to gain administrator level access to a
Rootkit
computer without the end user's consent or knowledge.

APT (Advanced Persistent Threat) An intruder gains access and stays undetected for a long time.

Spear Phishing Fraudulent emails to a certain organizations employees.

Smishing Phishing attacks committed using text messages (SMS).

Large federal agency with a budget of almost $65 billion whose goal is to provide
Department of Homeland Security DHS a more safer, more secure America, which is resistant to terrorism and potential
threats

Computer Fraud and Abuse Act (CFAA) Address fraud and related activities in association with computers including
1986 access. transmission, password trafficking, and threats/
£4.55
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Epitomizer

Get to know the seller

Seller avatar
Epitomizer Exam
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
11 months
Number of followers
0
Documents
74
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions