100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D333 ETHICS IN TECHNOLOGY – INTENSIVE NCLEX-STYLE QUESTIONS WITH RATIONALES (QUESTIONS 1–332)

Rating
-
Sold
-
Pages
64
Uploaded on
10-01-2026
Written in
2025/2026

WGU D333 ETHICS IN TECHNOLOGY – INTENSIVE NCLEX-STYLE QUESTIONS WITH RATIONALES (QUESTIONS 1–332)

Institution
WGU D333
Course
WGU D333











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D333
Course
WGU D333

Document information

Uploaded on
January 10, 2026
Number of pages
64
Written in
2025/2026
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

ESTUDYR




WGU D333 ETHICS IN TECHNOLOGY – INTENSIVE
NCLEX-STYLE QUESTIONS WITH RATIONALES
(QUESTIONS 1–332)

1. What is an Acceptable Use Policy (AUP)?

A. A document that defines hardware specifications for employees
B. A set of rules for ethical behavior in the workplace
C. A document that stipulates restrictions and practices that a user must agree to in order
to use organizational computing and network resources
D. A privacy policy for customer data

Rationale: An AUP defines what users can and cannot do when accessing company computing
resources. It helps protect both the organization and its users from misuse of technology.



2. What does it mean when an organization accepts a risk?

A. The organization eliminates the risk completely
B. The organization decides to accept a risk because the cost of avoiding it outweighs the
potential loss
C. The organization transfers the risk to another party
D. The organization ignores the risk

Rationale: Risk acceptance occurs when avoiding a risk is costlier than the potential loss, often
requiring judgment calls in high-stakes systems.



3. What is an Advanced Persistent Threat (APT)?

A. A malware program that deletes files randomly
B. A phishing scam targeting multiple users
C. A network attack in which an intruder gains access and remains undetected to steal data
over a long period
D. A temporary virus that infects a computer for a few hours

Rationale: APTs are long-term, stealthy cyberattacks aimed at stealing data over weeks or
months.

,ESTUDYR




4. Agile development is characterized by:

A. A rigid step-by-step software development process
B. Documentation-heavy software design
C. Iterative development cycles of 1–4 weeks allowing evolving requirements
D. Full specification of system requirements before coding

Rationale: Agile development embraces changing requirements and develops software
incrementally, unlike the waterfall model.



5. What does the Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS) enforce?

A. Free access to all intellectual property for developing countries
B. Enforcement of intellectual property rights with penalties for infringement
C. Limitations on patents for pharmaceuticals only
D. Trade agreements for agricultural products

Rationale: TRIPS ensures global enforcement of IP rights and deterrence against violations.



6. Which of the following is true about the American Recovery and Reinvestment Act
(ARRA)?

A. It primarily focused on environmental issues
B. It eliminated privacy protections for electronic health records
C. It provided $787 billion in spending with strong privacy provisions for health records
D. It was a military defense act

Rationale: ARRA included privacy protections, such as banning the sale of health info and
promoting encryption.



7. What does Annualized Loss Expectancy (ALE) calculate?

A. Total assets of a company
B. Cost of insurance premiums
C. Estimated loss from a potential risk event over a year (ALE = ARO × SLE)
D. Annual profits lost to taxes

,ESTUDYR


Rationale: ALE measures the expected yearly loss from a risk, factoring in probability (ARO)
and single loss value (SLE).



8. What is the Annualized Rate of Occurrence (ARO)?

A. The total revenue of a company in one year
B. The probability that a risk event will occur over the course of a year
C. The financial impact of a risk if it occurs
D. The legal liability associated with a risk

Rationale: ARO is a measure of risk frequency used in calculating ALE.



9. What defines anonymous expression?

A. Expressing opinions publicly under your real name
B. Sending emails through company servers only
C. Expression of opinions by people who do not reveal their identity
D. Posting on social media with a verified account

Rationale: Anonymity protects identity while allowing the expression of ideas or opinions.



10. An anonymous remailer service allows:

A. Tracking email origins for legal purposes
B. Securing email with encryption
C. Sending emails without revealing the sender's header or IP address
D. Automatic spam filtering

Rationale: Anonymous remailers strip identifying info to protect the sender’s identity online.



11. Anti-SLAPP laws are designed to:

A. Promote lawsuits against whistleblowers
B. Reduce frivolous lawsuits filed to intimidate public participation
C. Eliminate freedom of speech online
D. Protect corporate intellectual property

Rationale: Anti-SLAPP laws prevent entities from using legal action to silence critics.

, ESTUDYR




12. What is the main function of antivirus software?

A. Encrypts network traffic
B. Protects against phishing emails only
C. Scans for virus signatures to detect specific malware
D. Monitors employee computer usage

Rationale: Antivirus programs identify known malware by scanning for unique sequences (virus
signatures).



13. Artificial Intelligence (AI) systems include:

A. Only software that plays games
B. Only robots in factories
C. People, procedures, hardware, software, data, and knowledge to simulate human
intelligence
D. Only cloud-based machine learning models

Rationale: AI systems encompass all components needed to simulate learning, reasoning, and
self-correction.



14. An audit committee is responsible for:

A. Managing all IT operations
B. Creating marketing campaigns
C. Oversight of accounting, reporting practices, compliance, and internal/external audits
D. Writing company policies

Rationale: Audit committees ensure the integrity of financial reporting and compliance with
laws.



15. Avoidance in risk management means:

A. Transferring the risk to another organization
B. Ignoring the risk
C. Eliminating the vulnerability causing the risk altogether
D. Accepting the consequences of the risk

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Estudyr Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1159
Member since
3 year
Number of followers
829
Documents
10960
Last sold
3 days ago
ESTUDY

Get best related and owned assignment help online, this is your youngest Proffesor around.Be Smart! , I will be sharing all materials, Nclex, study guides, tests, Question ,Answers and Rationales , test banks, Hesi questions, etc. on my page for , All are based on my experiences with Nursing school.| Feel free to message me with any questions, happy to help!

3.9

209 reviews

5
103
4
43
3
27
2
12
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions