Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Ethics-In-Technology WGU Ethics In Technology QCO1 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Ethics-In-Technology WGU Ethics In Technology QCO1 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 66 questions

An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?

A.

Property

B.

Privacy

C.

Access

D.

Accuracy

A company wants to improve its chances of winning business with a prospective client. The company sends an expensive watch to the home address of each of the client's directors. Which ethical issue is the company engaging in?

A.

Fraud

B.

Conflict of interest

C.

Bribery

D.

Misrepresentation

During an investigation into a bank robbery, the Federal Bureau of Investigation (FBI) wants to monitor the telephone calls of identified suspects in the case for a two-week period. Due to the short time frame of the investigation, the FBI does not have time to pursue judicial authorization and get a warrant for surveillance.

Which type of telephone calls is legal for the FBI to monitor under the Foreign Intelligence Surveillance Act (FlSA). given the time frame of the investigation?

A.

Calls between two non-U.S. citizens

B.

Calls initiated by a U.S. citizen to a non-U.S. citizen

C.

Calls initiated by a non-U.S. citizen to a U.S. citizen

D.

Calls between two U.S. citizens

Which data retention practice complies with the General Data Protection Regulation (GDPR)?

A.

Storing personal data for a maximum of six months

B.

Prohibiting the storage of personal data with financial data

C.

Performing biannual data quality audits and reporting findings

D.

Securely erasing data that is no longer needed

A new Al-driven software package helps schools determine the best type of online learning support based on the current racial segments of students. The developer selected zip codes as a method for identifying specific groups.

Which source of bias does this approach introduce into the system?

A.

Tainted examples

B.

Skewed sample

C.

Proxy discrimination

D.

Limited features

After Alliah Company and Quiet Flag Industries signed an exclusive data exchange deal, Alliah Company received a better offer from Endothon Company. Despite legal obligations. Alliah Company signs a deal with Endothon Company and immediately ceases activities with Quiet Flag Industries.

Which ethical issue is Alliah Company engaging in by signing the deal with Endothon Company and ceasing activities with Quiet Flag Industries?

A.

Computer fraud

B.

Misrepresentation

C.

Breach of contract

D.

Conflict of interest

Which principle, according to the Organisation for Economic Co-operation and Development's (OECD) privacy guidelines, states that people have the right to review their data, challenge its correctness, and have incorrect data changed?

A.

Individual participation

B.

Purpose specification

C.

Use limitation

D.

Security safeguard

Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?

A.

PRISM

B.

Cookies

C.

MYSTIC

D.

Stingray

An organization creating a new consumer-profiling software tool has concerns about the software's ability to accurately capture and process data. The team decides to use an iterative approach to write the code, allowing for continuous testing and adjustment of requirements. The organization believes this will help ensure the software's data collection capabilities are both efficient and accurate.

Which methodology has the organization employed?

A.

Total quality management

B.

Waterfall development

C.

Quality assurance

D.

Agile development

What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?

A.

Opt-in

B.

Safeguard

C.

Opt-out

D.

Pretexting

A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?

A.

Anonymous expression

B.

Doxing

C.

Hate speech

D.

Libel

A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team's moral character.

Which ethical theory does this represent?

A.

Deontology

B.

Virtue

C.

Consequentialism

D.

Relativism

A university brought legal proceedings against a student who posted negative comments anonymously on the internet about the university's dean. Which type of lawsuit is this?

A.

Strategic lawsuit against public participation (SLAPP)

B.

Anti-strategic lawsuit against public participation (Anti-SLAPP)

C.

Hate speech

D.

John Doe lawsuit

An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.

Which security practice has been violated?

A.

Availability

B.

Accessibility

C.

Integrity

D.

Confidentiality

What are two outcomes of adherence to a professional code of ethics for individuals, their profession, and society as a whole? Choose 2 answers.

A.

Standardized business practices

B.

Consistent decision-making

C.

Assured employer integrity

D.

Faster career advancement

A hospital is struggling with adverse patient outcomes caused by avoidable medication errors. Many of these errors are due to illegible writing by the prescribing physician or incomplete data (or the prescribed medication and dose.

Which technology system reduces these errors?

A.

Computerized provider order entry

B.

Health information exchange

C.

Electronic medical record

D.

Clinical decision support

An organization gathers data using various technologies to optimize sales processes for its current and prospective customers. The data consists of demographic, geographic, and behavioral customer changes.

Which data collection method is the organization using?

A.

Advanced surveillance

B.

Electronic discovery

C.

Workplace monitoring

D.

Consumer profiling

To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?

A.

Unethical and legal

B.

Unethical and illegal

C.

Ethical and legal

D.

Ethical and Illegal

A group of hackers manipulated data to disable the national energy infrastructure for its political goals. Which type of attack did the group employ?

A.

Advanced persistent threat

B.

Cyberterrorism

C.

Cyberespionage

D.

Trojan horse

Page: 1 / 1
Total 66 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved