100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D333 ETHICS IN TECHNOLOGY OBJECTIVE ASSESSMENT Study Guide Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!!

Rating
-
Sold
-
Pages
190
Grade
A+
Uploaded on
20-01-2026
Written in
2025/2026

WGU D333 ETHICS IN TECHNOLOGY OBJECTIVE ASSESSMENT Study Guide Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!! 1. What are the Six Ethical Lenses that can help when choosing a proper framework for ethics? - ANSWER 1. The Justice Lens: Justice is the idea that each person should be given their due, and what people are due is often interpreted as fair or equal treatment. 2. The Utilitarian Lens: A results-based approach, says that the ethical action is the one that produces the greatest balance of good over harm for as many stakeholders as possible. 3. The Common Good Lens: According to the common good approach, community life is good in itself and our actions should contribute to that life. 4. The Virtue Lens: A very ancient approach to ethics argues that ethical actions ought to be consistent with certain ideal virtues that provide for the full development of our humanity. 5. The Care Ethics Lens: A very ancient approach to ethics argues that ethical actions ought to be consistent with certain ideal virtues that provide for the full development of our humanity. 6. The Rights Lens: Some suggest that the ethical action is the one that best protects and respects the moral rights of those affected. 2. Why are computer incidents so prevalent, and what are their effects? - ANSWER 1. Complexity: So many devices/environments in an infrastructure introduce vulnerabilities. 2. Incorrect authentication/Compromised login: Personal information being taken/manipulated for authentication of someone's account. 3. Technological advancements: Information out in the open of certain builds can allow individuals to gather information for exploits. 4. Delayed Fixes: Software updates take time to be pushed out, so the possibility for vulnerabilities to occur is high. Extra: Bring Your Own Device (BYOD) all-time availability introduces extra security treats, where data can be accessed and used maliciously. 3. What can be done to implement a strong security program to prevent cyberattacks? - ANSWER 1. Creating data backups and encrypting sensitive information. 2. Updating all security systems and software. 3. Conducting regular employee cybersecurity training. 4. Using strong and complex passwords. 5. Installing firewalls. 6. Reducing your attack surfaces. 4. What are the 3 key prevention measures of cyber attacks? - ANSWER 1. Use antivirus software to protect your computer against malware. 2. Use firewalls to filter the traffic that may enter your device. 3. Stay alert and avoid clicking on a suspicious link. 5. What are the ways to implement cyber security? - ANSWER 1. Use strong passwords. Strong passwords are vital to good online security. 2. Control access to data and systems. 3. Put up a firewall. 4. Use security software. 5. Update programs and systems regularly. 6. Monitor for intrusion. 7. Raise awareness. 6. What actions must be taken in the event of a successful security intrusion? - ANSWER The security incident response process is centered on the 1. preparation 2. detection and analysis 3. containment 4. investigation 5. eradication 6. recovery 7. post-incident activity 7. What actions should be taken in response to a security incident? - ANSWER 1. Gather the team. 2. Identify, evaluate and contain the incident. 3. Recover and restore. 4. Notify those affected by the breach. 5. Resolve internal issues. 6. Get the word out. 7. Perform a security incident postmortem. 8. What are the 5 steps to incident response? - ANSWER Step 1: Preparation is key to an effective response. Step 2: Detection and analysis. Step 3: Containment, eradication, and recovery. Step 4: Post-incident activity. Step 5: Test your plan.

Show more Read less
Institution
WGU D333
Course
WGU D333

Content preview

WGU D333 ETHICS IN TECHNOLOGY OBJECTIVE
ASSESSMENT Study Guide

Comprehensive Resource To Help You Ace 2026-2027
Includes Frequently Tested Questions With ELABORATED
100% Correct COMPLETE SOLUTIONS

Guaranteed Pass First Attempt!! Current Update!!

1. What are the Six Ethical Lenses that can help when choosing a proper
framework for ethics? - ANSWER 1. The Justice Lens: Justice is the idea
that each person should be given their due, and what people are due is
often interpreted as fair or equal treatment.
2. The Utilitarian Lens: A results-based approach, says that the ethical action
is the one that produces the greatest balance of good over harm for as many
stakeholders as possible.
3. The Common Good Lens: According to the common good approach,
community life is good in itself and our actions should contribute to that life.
4. The Virtue Lens: A very ancient approach to ethics argues that ethical
actions ought to be consistent with certain ideal virtues that provide for the full
development of our humanity.
5. The Care Ethics Lens: A very ancient approach to ethics argues that ethical
actions ought to be consistent with certain ideal virtues that provide for the full
development of our humanity.
6. The Rights Lens: Some suggest that the ethical action is the one that best
protects and respects the moral rights of those affected.

,2. Why are computer incidents so prevalent, and what are their effects? -
ANSWER 1. Complexity: So many devices/environments in an infrastructure
introduce vulnerabilities.
2. Incorrect authentication/Compromised login: Personal information being
taken/manipulated for authentication of someone's account.
3. Technological advancements: Information out in the open of certain builds can
allow individuals to gather information for exploits.
4. Delayed Fixes: Software updates take time to be pushed out, so the possibility
for vulnerabilities to occur is high.


Extra:
Bring Your Own Device (BYOD) all-time availability introduces extra security treats,
where data can be accessed and used maliciously.


3. What can be done to implement a strong security program to prevent
cyberattacks? - ANSWER 1. Creating data backups and encrypting sensitive
information.
2. Updating all security systems and software.
3. Conducting regular employee cybersecurity training.
4. Using strong and complex passwords.
5. Installing firewalls.
6. Reducing your attack surfaces.



4. What are the 3 key prevention measures of cyber attacks? - ANSWER 1.
Use antivirus software to protect your computer against malware.
2. Use firewalls to filter the traffic that may enter your device.

,3. Stay alert and avoid clicking on a suspicious link.



5. What are the ways to implement cyber security? - ANSWER 1. Use strong
passwords. Strong passwords are vital to good online security.
2. Control access to data and systems.
3. Put up a firewall.
4. Use security software.
5. Update programs and systems regularly.
6. Monitor for intrusion.
7. Raise awareness.


6. What actions must be taken in the event of a successful security intrusion? -
ANSWER The security incident response process is centered on the

1. preparation
2. detection and analysis
3. containment
4. investigation
5. eradication
6. recovery
7. post-incident activity


7. What actions should be taken in response to a security incident? - ANSWER
1. Gather the team.
2. Identify, evaluate and contain the incident.

, 3. Recover and restore.
4. Notify those affected by the breach.
5. Resolve internal issues.
6. Get the word out.
7. Perform a security incident postmortem.



8. What are the 5 steps to incident response? - ANSWER Step 1: Preparation
is key to an effective response.
Step 2: Detection and analysis.
Step 3: Containment, eradication, and recovery.
Step 4: Post-incident activity.
Step 5: Test your plan.



9. How do I demonstrate the use of the CIA triad? - ANSWER CIA =
confidentiality, integrity, and availability.
- Categorize data and assets being handled based on their privacy requirements.
Require data encryption and two-factor authentication to be basic security
hygiene.



10. What does the individual meaning of acronym CIA/AIC? - ANSWER
Confidentiality is a set of high-level rules that limit access to all types of data and
information.
- Integrity is the assurance that the information is trustworthy and accurate.

Written for

Institution
WGU D333
Course
WGU D333

Document information

Uploaded on
January 20, 2026
Number of pages
190
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EWLindy Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
716
Member since
3 year
Number of followers
431
Documents
7558
Last sold
3 days ago
EN.CY.CLO.PE.DI.A

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
3.8

108 reviews

5
56
4
13
3
16
2
6
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions