100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D333 Ethics in Technology – questions with correct answers

Beoordeling
-
Verkocht
-
Pagina's
57
Cijfer
A+
Geüpload op
13-11-2024
Geschreven in
2024/2025

acceptable use policy (AUP) Correct Answer-A document that stipulates restrictions and practices that a user must agree in order to use organizational computing and network resources. acceptance Correct Answer-When an organization decides to accept a risk because the cost of avoiding the risk outweighs the potential loss of the risk. A decision to accept a risk can be extremely difficult and controversial when dealing with safety-critical systems because making that determination involves forming personal judgments about the value of human life, assessing potential liability in case of an accident, evaluating the potential impact on the surrounding natural environment, and estimating the system's costs and benefits. advanced persistent threat (APT) Correct Answer-A network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time (weeks or even months). agile development Correct Answer-A software development methodology in which a system is developed in iterations lasting from one to four weeks. Unlike the waterfall system development model, agile development accepts the fact that system requirements are evolving and cannot be fully understood or defined at the start of the project.

Meer zien Lees minder
Instelling
D333
Vak
D333











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
D333
Vak
D333

Documentinformatie

Geüpload op
13 november 2024
Aantal pagina's
57
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU D333 Ethics in Technology – questions with
correct answers
acceptable use policy (AUP) Correct Answer-A document that stipulates
restrictions and practices that a user must agree in order to use
organizational computing and network resources.


acceptance Correct Answer-When an organization decides to accept a
risk because the cost of avoiding the risk outweighs the potential loss of
the risk. A decision to accept a risk can be extremely difficult and
controversial when dealing with safety-critical systems because making
that determination involves forming personal judgments about the value
of human life, assessing potential liability in case of an accident,
evaluating the potential impact on the surrounding natural environment,
and estimating the system's costs and benefits.


advanced persistent threat (APT) Correct Answer-A network attack in
which an intruder gains access to a network and stays there—undetected
—with the intention of stealing data over a long period of time (weeks or
even months).


agile development Correct Answer-A software development
methodology in which a system is developed in iterations lasting from
one to four weeks. Unlike the waterfall system development model,
agile development accepts the fact that system requirements are evolving
and cannot be fully understood or defined at the start of the project.


Agreement on Trade-Related Aspects of Intellectual Property Rights
(TRIPS) Correct Answer-An agreement of the World Trade

,Organization that requires member governments to ensure that
intellectual property rights can be enforced under their laws and that
penalties for infringement are tough enough to deter further violations.


American Recovery and Reinvestment Act Correct Answer-A wide-
ranging act that authorized $787 billion in spending and tax cuts over a
10-year period and included strong privacy provisions for electronic
health records, such as banning the sale of health information, promoting
the use of audit trails and encryption, and providing rights of access for
patients.


annualized loss expectancy (ALE) Correct Answer-The estimated loss
from a potential risk event over the course of a year. The following
equation is used to calculate the annual loss expectancy: ARO × SLE =
ALE. Where ARO is the annualized rate of occurrence, an estimate of
the probability that this event will occur over the course of a year and
SLE is the single loss expectancy, the estimated loss that would be
incurred if the event happens.


annualized rate of occurrence (ARO) Correct Answer-An estimate of the
probability that a risk event will occur over the course of a year.


anonymous expression Correct Answer-The expression of opinions by
people who do not reveal their identity.


anonymous remailer service Correct Answer-A service that allows
anonymity on the Internet by using a computer program that strips the

,originating header and/or IP address from the message and then
forwards the message to its intended recipient.


anti-SLAPP laws Correct Answer-Laws designed to reduce frivolous
SLAPPs (strategic lawsuit against public participation (SLAPP), which
is a lawsuit filed by corporations, government officials, and others
against citizens and community groups who oppose them on matters of
concern).


antivirus software Correct Answer-Software that scans for a specific
sequence of bytes, known as a virus signature, that indicates the
presence of a specific virus.


artificial intelligence systems Correct Answer-The people, procedures,
hardware, software, data, and knowledge needed to develop computer
systems and machines that can simulate human intelligence processes,
including learning (the acquisition of information and rules for using the
information), reasoning (using rules to reach conclusions), and self-
correction (using the outcome from one scenario to improve its
performance on future scenarios).


audit committee Correct Answer-A group that provides assistance to the
board of directors in fulfilling its responsibilities with respect to the
oversight of the quality and integrity of the organization's accounting
and reporting practices and controls, including financial statements and
reports; the organization's compliance with legal and regulatory
requirements; the qualifications, independence, and performance of the
company's independent auditor; and the performance of the company's
internal audit team.

, avoidance Correct Answer-The elimination of a vulnerability that gives
rise to a particular risk in order to avoid the risk altogether. This is the
most effective solution but often not possible due to organizational
requirements and factors beyond an organization's control.


Bathsheba syndrome Correct Answer-The moral corruption of people in
power, which is often facilitated by a tendency for people to look the
other way when their leaders act inappropriately.


best practice Correct Answer-A method or technique that has
consistently shown results superior to those achieved with other means
and that is used as a benchmark within a particular industry.


Bill of Rights Correct Answer-The first 10 amendments to the United
States Constitution that spell out additional rights of individuals.


black-box testing Correct Answer-A type of dynamic testing that
involves viewing the software unit as a device that has expected input
and output behaviors but whose internal workings are unknown (a black
box).


blended threat Correct Answer-A sophisticated threat that combines the
features of a virus, worm, Trojan horse, and other malicious code into a
single payload.
€14,63
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
cracker Chamberlain School Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2022
Lid sinds
3 jaar
Aantal volgers
1344
Documenten
47128
Laatst verkocht
6 dagen geleden
✨ Cracker – Verified Study Powerhouse

Welcome to your shortcut to academic and certification success. I'm Cracker, a trusted top seller I specialize in high-quality study guides, test banks, certification prep, and real-world exam material all tailored to help you pass fast and score high.

3,8

369 beoordelingen

5
162
4
84
3
52
2
22
1
49

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen