WGU D333 ETHICS IN TECHNOLOGY (2026) EXAM
QUESTIONS AND ALL CORRECT ANSWERS 100%
SOLVED AND GUARANTEED SUCCESS
A document that stipulates restrictions and practices that a user must
agree in order to use organizational computing and network resources.
- ANSWER -acceptable use policy (AUP)
A network attack in which an intruder gains access to a network and
stays there—undetected—with the intention of stealing data over a
long period of time (weeks or even months). - ANSWER -advanced
persistent threat (APT)
An agreement of the World Trade Organization that requires member
governments to ensure that intellectual property rights can be enforced
under their laws and that penalties for infringement are tough enough
to deter further violations. - ANSWER -Agreement on Trade-Related
Aspects of Intellectual Property Rights (TRIPS)
A wide-ranging act that authorized $787 billion in spending and tax cuts
over a 10-year period and included strong privacy provisions for
electronic health records, such as banning the sale of health
information, promoting the use of audit trails and encryption, and
providing rights of access for patients. - ANSWER -American Recovery
and Reinvestment Act
,2|Page
The estimated loss from a potential risk event over the course of a year.
The following equation is used to calculate the annual loss expectancy:
ARO × SLE = ALE. Where ARO is the annualized rate of occurrence, an
estimate of the probability that this event will occur over the course of
a year and SLE is the single loss expectancy, the estimated loss that
would be incurred if the event happens. - ANSWER -annualized loss
expectancy (ALE)
An estimate of the probability that a risk event will occur over the
course of a year. - ANSWER -annualized rate of occurrence (ARO)
A service that allows anonymity on the Internet by using a computer
program that strips the originating header and/or IP address from the
message and then forwards the message to its intended recipient. -
ANSWER -anonymous remailer service
Laws designed to reduce frivolous SLAPPs (strategic lawsuit against
public participation (SLAPP), which is a lawsuit filed by corporations,
government officials, and others against citizens and community groups
who oppose them on matters of concern). - ANSWER -anti-SLAPP laws
A group that provides assistance to the board of directors in fulfilling its
responsibilities with respect to the oversight of the quality and integrity
of the organization's accounting and reporting practices and controls,
including financial statements and reports; the organization's
compliance with legal and regulatory requirements; the qualifications,
independence, and performance of the company's independent
,3|Page
auditor; and the performance of the company's internal audit team. -
ANSWER -audit committee
The moral corruption of people in power, which is often facilitated by a
tendency for people to look the other way when their leaders act
inappropriately. - ANSWER -Bathsheba syndrome
The first 10 amendments to the United States Constitution that spell
out additional rights of individuals. - ANSWER -Bill of Rights
A type of dynamic testing that involves viewing the software unit as a
device that has expected input and output behaviors but whose internal
workings are unknown (a black box). - ANSWER -black-box testing
A sophisticated threat that combines the features of a virus, worm,
Trojan horse, and other malicious code into a single payload. - ANSWER
-blended threat
An agreed-upon sets of skills and abilities that all licensed professionals
must possess. - ANSWER -body of knowledge
A large group of computers, which are controlled from one or more
remote locations by hackers, without the knowledge or consent of their
owners. - ANSWER -botnet
, 4|Page
The failure to act as a reasonable person would act. - ANSWER -breach
of the duty of care
A trade group that represent the world's largest software and hardware
manufacturers. - ANSWER -BSA | The Software Alliance
A risk-based strategy that includes an occupant emergency evacuation
plan, a continuity of operations plan, and an incident management plan
with an active governance process to minimize the potential impact of
any security incident and to ensure business continuity in the event of a
cyberattack or some form of disaster. - ANSWER -business continuity
plan
A set of interrelated components—including hardware, software,
databases, networks, people, and procedures—that collects and
processes data and disseminates the output. - ANSWER -business
information system
Collection of best practices that help organizations improve their
processes. - ANSWER -Capability Maturity Model Integration (CMMI)
models
Software that generates and grades tests that humans can pass and all
but the most sophisticated computer programs cannot. - ANSWER -
CAPTCHA (Completely Automated Public Turing Test to Tell Computers
and Humans Apart)