i,- i,- i,- i,- i,- i,- i,-
Ethics in Technology | Questions with Verified
i,- i,- i,- i,- i,- i,- i,-
Answers| 100% Correct| Grade A. i,- i,- i,- i,-
What is a reason for organizations to pursue corporate social
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
responsibility (CSR) goals? Gain goodwill i,- i,- i,-i,- i,- i,-
A police department employee has access to data related to an
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
ongoing investigation. A local politician whom the employee
i,- i,- i,- i,- i,- i,- i,- i,-
supports has come under investigation. The employee accesses
i,- i,- i,- i,- i,- i,- i,- i,-
the data relating to the investigation and provides the file to the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
politician anonymously. How should this behavior be classified?
i,- i,- i,- i,- i,- i,- i,- i,-i,-
Industrial espionage
i,- i,-
An IT manager implements security measures at the organization,
i,- i,- i,- i,- i,- i,- i,- i,- i,-
network, application, and employee levels. Which approach to
i,- i,- i,- i,- i,- i,- i,- i,-
security is the manager using? Layered
i,- i,- i,- i,- i,-i,- i,-
A new startup tech company plans to provide secure wireless
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
access within its office for employees and other trusted visitors.
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
The company has concerns about competitors eavesdropping or
i,- i,- i,- i,- i,- i,- i,- i,-
compromising the connections and obtaining unauthorized i,- i,- i,- i,- i,- i,-
access to the company's intellectual property. The company is
i,- i,- i,- i,- i,- i,- i,- i,- i,-
considering using Wireless Protected Access 2 (WPA2) to secure
i,- i,- i,- i,- i,- i,- i,- i,- i,-
,data in transit. Which protocol does this wireless protection
i,- i,- i,- i,- i,- i,- i,- i,- i,-
implement? Advanced Encryption Standard (AES) i,-i,- i,- i,- i,- i,-
A Federal Bureau of Investigation (FBI) agent monitors a
i,- i,- i,- i,- i,- i,- i,- i,- i,-
telephone conversation between a 12-year-old child and the i,- i,- i,- i,- i,- i,- i,- i,-
child's stepfather. The monitoring is part of a criminal
i,- i,- i,- i,- i,- i,- i,- i,- i,-
investigation. A warrant was not obtained prior to i,- i,- i,- i,- i,- i,- i,- i,-
commencement of the monitoring. Which law or regulation did i,- i,- i,- i,- i,- i,- i,- i,- i,-
the agent violate?i,- Wiretap Act i,- i,-i,- i,- i,-
A U.S. company launched an e-commerce platform in the
i,- i,- i,- i,- i,- i,- i,- i,- i,-
European Union (EU). The board of directors raised concerns
i,- i,- i,- i,- i,- i,- i,- i,- i,-
about compliance with applicable privacy regulations and the
i,- i,- i,- i,- i,- i,- i,- i,-
collection of customer information. Which regulation applies to
i,- i,- i,- i,- i,- i,- i,- i,-
this scenario? General Data Protection Regulation
i,- i,-i,- i,- i,- i,- i,-
A social media website collected personal information about
i,- i,- i,- i,- i,- i,- i,- i,-
consumers when they subscribed to the service. Subscribers i,- i,- i,- i,- i,- i,- i,- i,-
opted in or out before creating their online profiles. Which
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
European Union Data Protection Directive did the website follow?
i,- i,- i,- i,- i,- i,- i,- i,- i,-
i,- Choice i,-
A company is engaged as a third party to perform debt collection
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
on behalf of a telecommunications provider. The company
i,- i,- i,- i,- i,- i,- i,- i,-
operates an outbound call center to contact debtors and set up
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
,payment arrangements. The company needs to ensure that the
i,- i,- i,- i,- i,- i,- i,- i,- i,-
debtors' data privacy is not at risk. Which two areas should the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
company ensure are properly managed? Network security &
i,- i,- i,- i,- i,-i,- i,- i,- i,- i,-
Insider access i,-
A company is using software to track workforce operational
i,- i,- i,- i,- i,- i,- i,- i,- i,-
activity. Management communicates that the data collected will
i,- i,- i,- i,- i,- i,- i,- i,-
be treated as sensitive. Administrative and technical security
i,- i,- i,- i,- i,- i,- i,- i,-
measures are put in place to protect employee data. These
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
measures include periodically culling records that are no longer
i,- i,- i,- i,- i,- i,- i,- i,- i,-
relevant. Which additional measure should be taken to safeguard
i,- i,- i,- i,- i,- i,- i,- i,- i,-
employee data from misuse? Limit who can view employee
i,- i,- i,- i,-i,- i,- i,- i,- i,- i,- i,-
data
A retail company experiences a data breach. Customer data is
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
stolen, including credit card numbers, names, addresses, and
i,- i,- i,- i,- i,- i,- i,- i,-
account passwords. The attackers have amassed enough
i,- i,- i,- i,- i,- i,- i,-
combinations of personally identifiable information (PII) to i,- i,- i,- i,- i,- i,- i,-
commit identity theft. Which adverse impacts, in addition to the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
loss of business, does the company face?
i,- i,- Reputational i,- i,- i,- i,- i,-i,- i,- i,-
damage and the need to provide support for victims
i,- i,- i,- i,- i,- i,- i,- i,-
Two programmers disagree about which philosophical theory is
i,- i,- i,- i,- i,- i,- i,- i,-
best suited for their autonomous vehicles. One programmer
i,- i,- i,- i,- i,- i,- i,- i,-
suggests their vehicle should always choose the greatest good for
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
the greatest number of people.
i,- i,- i,- i,-
, Which philosophical theory encapsulates this stance?
i,- i,- i,- i,- i,- i,-i,- i,-
Utilitarianism
What is the difference between ethics and morals?
i,- i,- Ethics
i,- i,- i,- i,- i,- i,-i,- i,- i,-
reflect a societal code of behavior, whereas morals reflect
i,- i,- i,- i,- i,- i,- i,- i,- i,-
personal principles. i,-
An IT company holds itself accountable for how its actions affect
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
its shareholders, consumers, employees, community, the
i,- i,- i,- i,- i,- i,-
environment, and suppliers. What is this company i,- i,- i,- i,- i,- i,- i,-
demonstrating? Corporate social responsibility i,-i,- i,- i,- i,-
A homeowners' association (HOA) installs license plate readers
i,- i,- i,- i,- i,- i,- i,- i,-
after an increase in reported crime in the neighborhood. Two
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
domestic workers petition the HOA, requesting that their data be
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
deleted to protect their privacy. The HOA considers this but
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
denies their request, citing the greater need for security
i,- i,- i,- i,- i,- i,- i,- i,- i,-
protection for residents. Which ethical theory does this
i,- i,- i,- i,- i,- i,- i,- i,-
represent? Consequentialism i,-i,- i,-
A project team at an animal welfare agency is using predictive
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
analytics to help take animals out of abusive environments. The
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
algorithm the team designed has a false positive rate that is
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
higher than zero, which means that some animals could be
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
removed erroneously if the algorithm's recommendations are
i,- i,- i,- i,- i,- i,- i,-