OBJECTIVE ASSESSMENT Study Guide
Comprehensive Resource To Help You Ace 2026-2027
Includes Frequently Tested Questions With ELABORATED
100% Correct COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!! Current Update!!
1. What is the role of ethical guardrails within an artificial intelligence (AI)
environment? - ANSWER To mitigate risks
2. How does personal bias influence artificial intelligence (AI)? - ANSWER
It influences the patterns of how a system responds.
3. What beliefs of cultural relativism may lead a person to disobey the law in
IT? - ANSWER Different cultures have different norms and do not follow
the laws.
4. How do relevant laws influence an organization's ethical decision-making? -
ANSWER Organizations want to avoid penalties for breaking laws.
5. Which two ways may advances in technology affect common ethical
assumptions? - ANSWER Companies take advantage of their privileged
access to personal user data to benefit their shareholders.
,Surveillance allows companies to increase productivity by closely watching
their employees' behavior.
6. A car manufacturer decides to alter its emission testing to pass regulatory
requirements. The emission reduction system is only used during tests. The
system is not engaged during normal driving conditions in order to improve
fuel efficiency, torque, and acceleration.
Which step in the ethical decision-making process should have been used to
evaluate the environmental impact of this decision? - ANSWER Choose
alternatives
7. Which area of ethical concerns in IT deals directly with information
ownership? - ANSWER Property
8. Which ethics-related consideration is addressed by the California Online
Privacy Protection Act of 2003 and its amendments? - ANSWER Do Not
Track signals
9. Which two aspects of an IT worker's responsibilities involve ethical issues
that might arise in the relationship between IT workers and IT users? -
ANSWER Discouraging software piracy
Controlling information sharing
10.A well-respected IT professional from a small software company uses
resume inflation when searching for a new position.
Which two ethical challenges may encourage this behavior? - ANSWER
Prioritization of personal loyalty
,Disregard for the professional code of conduct
11.What is an objective of a professional code of ethics in IT? - ANSWER
Provide benchmarks for self-assessment
12.What are the consequences of more lenient bring your own devices (BYOD)
policies for IT? - ANSWER Increased productivity and increased
vulnerability to data system breaches
13.Which type of cyberattack uses text messages to trick victims into disclosing
personal information that can subsequently be exploited for a financial
gain? - ANSWER Smishing
14.What is the goal of a white hat hacker in cyberattacks in IT? - ANSWER
To identify vulnerabilities of a company's information system to remediate
them
15.Which major U.S. regulation governs the collection, disclosure, and
protection of consumers' personally identifiable information (PII) data by
companies that provide financial products and services? - ANSWER
Gramm-Leach-Bliley Act
16.What is the meaning of morals in the context of ethical judgment? -
ANSWER The personal principles that determine what an individual
considers to be right or wrong
, 17.What is the primary goal for a supply chain relating to corporate social
responsibility (CSR)? - ANSWER Sustainability
18.Which factor is primarily used by deontology to evaluate morality of human
actions? - ANSWER Duty
19.Which part of the decision-making process involves defining a transition
plan? - ANSWER Implementing the decision
20.In response to the pressure from its shareholders, a publicly owned
software company plans to implement a strict, globally consistent approach
to prevent software piracy of its products that help with implementing
green energy solutions.
Which impact should be considered from an ethical standpoint due to digital
divide? - ANSWER A negative impact on demographics in less-developed
countries
21.Which measure of the confidentiality, integrity, and availability (CIA) triad
should be used by IT professionals at the organization level to supply
validation of non-repudiation regarding data access in IT? - ANSWER
Security audit
22.An IT professional wants the proper credentials and knowledge that is
required to collect data from devices affected by cyberattacks to ensure
such data would be admissible as evidence in a court of law.
Which two certifications should the IT professional obtain? - ANSWER
Certified Computer Examiner