Answers (Most Recent Version, Complete Study
Material)
Ways to include ethical considerations in decision making?
1. Employ this decision-making model:
1. Define the ____
2. Identify _____
3. Choose an ____
4. Implement the _____
5. Monitor the _____
2. Involve ____
3. Weigh laws, guidelines, and principles that may apply
4. Consider the ___ of your decisions - Correct Answers ✅Problem,
alternatives, alternative, decision, results, stakeholders, impact
What relationships must an IT worker manage, and what key ethical
issues can arise in each?
IT worker-____ relationship issues:
1. Setting and enforcing ____ regarding the ethical use of IT
2. The potential for ______
3. The safeguarding of ___ ___
IT worker-___ relationship issues:
1. Defining, sharing, and fulfilling each party's responsibilities for
successfully completing an IT project
,D333 ETHICS IN TECHNOLOGY Exam Questions and
Answers (Most Recent Version, Complete Study
Material)
2. The IT worker must remain objective and guard against conflicts of
interest, fraud, misrepresentation, or breach of contract
IT workers-___ ____ relationships:
1. _____ inexperienced colleagues
2. Demonstrating professional _____
3. Avoiding ____ ____ and the inappropriate sharing of corporate
information
For IT workers-__ ____, important issues include:
1. ___ ____
2. Inappropriate use of __ ____
3. Inappropriate sharing of ____ - Correct Answers ✅Employer, policies,
whistleblowing, trade secrets, client, unethical, other professionals,
mentoring, loyalty, resume inflation, IT users, software piracy, IT
resources, information
_____ _____ is a process designed to provide assurance for the
effectiveness and efficiency of operations, the reliability of financial
reporting, and compliance with laws and regulations.
The goal of ___ ____ in IT security is to ensure that the ____ of control
does not exceed the ____ or ____. - Correct Answers ✅Internal control,
reasonable assurance, cost, benefits, risk
, D333 ETHICS IN TECHNOLOGY Exam Questions and
Answers (Most Recent Version, Complete Study
Material)
The ___-____ is a partnership between DHS and the public and private
sectors that was established to protect the nation's Internet
infrastructure against ____ by serving as a clearinghouse for information
on new viruses, worms, etc. - Correct Answers ✅US-CERT, cyberattacks
Organizations need a risk-based strategy with an active ___ ___ to
minimize the potential impact of security incidents and to ensure
business continuity
Key elements of such a strategy include...
1. A ___ ____
2. A ___ ___ ___
3. Definition of ___ ____ needed to ensure employees follow best
processes and practices
4. Periodic ___ ____
5. Compliance standards defined by external parties
6. Use of a ___ ____ to track key performance indicators - Correct
Answers ✅Governance process, risk assessment, disaster recovery
plan, security policies, security audits, security dashboard
Actions to take in the event of a successful security intrusion;
An incident response plan must be approved by both the organization's
___ ____ and ___ ___. It should address (FECEAN) ...