100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D333 Exam (Latest 2025/ 2026 Update) Ethics in Technology | Questions with Verified Answers| 100% Correct| Grade A.

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
23-02-2025
Written in
2024/2025

What is a reason for organizations to pursue corporate social responsibility (CSR) goals? Gain goodwill A police department employee has access to data related to an ongoing investigation. A local politician whom the employee supports has come under investigation. The employee accesses the data relating to the investigation and provides the file to the politician anonymously. How should this behavior be classified? Industrial espionage An IT manager implements security measures at the organization, network, application, and employee levels. Which approach to security is the manager using? Layered A new startup tech company plans to provide secure wireless access within its office for employees and other trusted visitors. The company has concerns about competitors eavesdropping or compromising the connections and obtaining unauthorized access to the company's intellectual property. The company is considering using Wireless Protected Access 2 (WPA2) to secure data in transit. Which protocol does this wireless protection implement? Advanced Encryption Standard (AES) A Federal Bureau of Investigation (FBI) agent monitors a telephone conversation between a 12-year-old child and the child's stepfather. The monitoring is part of a criminal investigation. A warrant was not obtained prior to commencement of the monitoring. Which law or regulation did the agent violate? Wiretap Act A U.S. company launched an e-commerce platform in the European Union (EU). The board of directors raised concerns about compliance with applicable privacy regulations and the collection of customer information. Which regulation applies to this scenario? General Data Protection Regulation A social media website collected personal information about consumers when they subscribed to the service. Subscribers opted in or out before creating their online profiles. Which European Union Data Protection Directive did the website follow? Choice A company is engaged as a third party to perform debt collection on behalf of a telecommunications provider. The company operates an outbound call center to contact debtors and set up payment arrangements. The company needs to ensure that the debtors' data privacy is not at risk. Which two areas should the company ensure are properly managed? Network security & Insider access WGU D333 Exam (Latest 2025/ 2026 Update) Ethics in Technology | Questions with Verified Answers| 100% Correct| Grade A. WGU D333 Exam (Latest 2025/ 2026 Update) Ethics in Technology | Questions with Verified Answers| 100% Correct| Grade A.

Show more Read less
Institution
WGU D333
Course
WGU D333











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D333
Course
WGU D333

Document information

Uploaded on
February 23, 2025
Number of pages
39
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D333 Exam (Latest 2025/ 2026 Update)
i,- i,- i,- i,- i,- i,- i,-




Ethics in Technology | Questions with Verified
i,- i,- i,- i,- i,- i,- i,-




Answers| 100% Correct| Grade A. i,- i,- i,- i,-




What is a reason for organizations to pursue corporate social
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



responsibility (CSR) goals? Gain goodwill i,- i,- i,-i,- i,- i,-




A police department employee has access to data related to an
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



ongoing investigation. A local politician whom the employee
i,- i,- i,- i,- i,- i,- i,- i,-



supports has come under investigation. The employee accesses
i,- i,- i,- i,- i,- i,- i,- i,-



the data relating to the investigation and provides the file to the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



politician anonymously. How should this behavior be classified?
i,- i,- i,- i,- i,- i,- i,- i,-i,-



Industrial espionage
i,- i,-




An IT manager implements security measures at the organization,
i,- i,- i,- i,- i,- i,- i,- i,- i,-



network, application, and employee levels. Which approach to
i,- i,- i,- i,- i,- i,- i,- i,-



security is the manager using? Layered
i,- i,- i,- i,- i,-i,- i,-




A new startup tech company plans to provide secure wireless
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



access within its office for employees and other trusted visitors.
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



The company has concerns about competitors eavesdropping or
i,- i,- i,- i,- i,- i,- i,- i,-



compromising the connections and obtaining unauthorized i,- i,- i,- i,- i,- i,-



access to the company's intellectual property. The company is
i,- i,- i,- i,- i,- i,- i,- i,- i,-



considering using Wireless Protected Access 2 (WPA2) to secure
i,- i,- i,- i,- i,- i,- i,- i,- i,-

,data in transit. Which protocol does this wireless protection
i,- i,- i,- i,- i,- i,- i,- i,- i,-



implement? Advanced Encryption Standard (AES) i,-i,- i,- i,- i,- i,-




A Federal Bureau of Investigation (FBI) agent monitors a
i,- i,- i,- i,- i,- i,- i,- i,- i,-



telephone conversation between a 12-year-old child and the i,- i,- i,- i,- i,- i,- i,- i,-



child's stepfather. The monitoring is part of a criminal
i,- i,- i,- i,- i,- i,- i,- i,- i,-



investigation. A warrant was not obtained prior to i,- i,- i,- i,- i,- i,- i,- i,-



commencement of the monitoring. Which law or regulation did i,- i,- i,- i,- i,- i,- i,- i,- i,-



the agent violate?i,- Wiretap Act i,- i,-i,- i,- i,-




A U.S. company launched an e-commerce platform in the
i,- i,- i,- i,- i,- i,- i,- i,- i,-



European Union (EU). The board of directors raised concerns
i,- i,- i,- i,- i,- i,- i,- i,- i,-



about compliance with applicable privacy regulations and the
i,- i,- i,- i,- i,- i,- i,- i,-



collection of customer information. Which regulation applies to
i,- i,- i,- i,- i,- i,- i,- i,-



this scenario? General Data Protection Regulation
i,- i,-i,- i,- i,- i,- i,-




A social media website collected personal information about
i,- i,- i,- i,- i,- i,- i,- i,-



consumers when they subscribed to the service. Subscribers i,- i,- i,- i,- i,- i,- i,- i,-



opted in or out before creating their online profiles. Which
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



European Union Data Protection Directive did the website follow?
i,- i,- i,- i,- i,- i,- i,- i,- i,-



i,- Choice i,-




A company is engaged as a third party to perform debt collection
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



on behalf of a telecommunications provider. The company
i,- i,- i,- i,- i,- i,- i,- i,-



operates an outbound call center to contact debtors and set up
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-

,payment arrangements. The company needs to ensure that the
i,- i,- i,- i,- i,- i,- i,- i,- i,-



debtors' data privacy is not at risk. Which two areas should the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



company ensure are properly managed? Network security &
i,- i,- i,- i,- i,-i,- i,- i,- i,- i,-



Insider access i,-




A company is using software to track workforce operational
i,- i,- i,- i,- i,- i,- i,- i,- i,-



activity. Management communicates that the data collected will
i,- i,- i,- i,- i,- i,- i,- i,-



be treated as sensitive. Administrative and technical security
i,- i,- i,- i,- i,- i,- i,- i,-



measures are put in place to protect employee data. These
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



measures include periodically culling records that are no longer
i,- i,- i,- i,- i,- i,- i,- i,- i,-



relevant. Which additional measure should be taken to safeguard
i,- i,- i,- i,- i,- i,- i,- i,- i,-



employee data from misuse? Limit who can view employee
i,- i,- i,- i,-i,- i,- i,- i,- i,- i,- i,-



data


A retail company experiences a data breach. Customer data is
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



stolen, including credit card numbers, names, addresses, and
i,- i,- i,- i,- i,- i,- i,- i,-



account passwords. The attackers have amassed enough
i,- i,- i,- i,- i,- i,- i,-



combinations of personally identifiable information (PII) to i,- i,- i,- i,- i,- i,- i,-



commit identity theft. Which adverse impacts, in addition to the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



loss of business, does the company face?
i,- i,- Reputational i,- i,- i,- i,- i,-i,- i,- i,-



damage and the need to provide support for victims
i,- i,- i,- i,- i,- i,- i,- i,-




Two programmers disagree about which philosophical theory is
i,- i,- i,- i,- i,- i,- i,- i,-



best suited for their autonomous vehicles. One programmer
i,- i,- i,- i,- i,- i,- i,- i,-



suggests their vehicle should always choose the greatest good for
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



the greatest number of people.
i,- i,- i,- i,-

, Which philosophical theory encapsulates this stance?
i,- i,- i,- i,- i,- i,-i,- i,-



Utilitarianism


What is the difference between ethics and morals?
i,- i,- Ethics
i,- i,- i,- i,- i,- i,-i,- i,- i,-



reflect a societal code of behavior, whereas morals reflect
i,- i,- i,- i,- i,- i,- i,- i,- i,-



personal principles. i,-




An IT company holds itself accountable for how its actions affect
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



its shareholders, consumers, employees, community, the
i,- i,- i,- i,- i,- i,-



environment, and suppliers. What is this company i,- i,- i,- i,- i,- i,- i,-



demonstrating? Corporate social responsibility i,-i,- i,- i,- i,-




A homeowners' association (HOA) installs license plate readers
i,- i,- i,- i,- i,- i,- i,- i,-



after an increase in reported crime in the neighborhood. Two
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



domestic workers petition the HOA, requesting that their data be
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



deleted to protect their privacy. The HOA considers this but
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



denies their request, citing the greater need for security
i,- i,- i,- i,- i,- i,- i,- i,- i,-



protection for residents. Which ethical theory does this
i,- i,- i,- i,- i,- i,- i,- i,-



represent? Consequentialism i,-i,- i,-




A project team at an animal welfare agency is using predictive
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



analytics to help take animals out of abusive environments. The
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



algorithm the team designed has a false positive rate that is
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



higher than zero, which means that some animals could be
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-



removed erroneously if the algorithm's recommendations are
i,- i,- i,- i,- i,- i,- i,-

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AcademiaExpert Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1695
Member since
4 year
Number of followers
762
Documents
3965
Last sold
2 hours ago
EXAMS, STUDY GUIDES, ESSAYS, NOTES & GOOD GRADES

Hello, my name is Archie. I am an experienced tutor and I am here to provide you with all your study solutions ranging from exams, study guides, essays, notes and just to make school a little bit easier for you. Engage me if you have any questions about your course and I will swiftly and gladly assist. Good luck with studying and all the best going forward.

3.8

429 reviews

5
199
4
81
3
74
2
25
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions