Technology Latest Real Exam Questions and
Solutions | Updated Question Bank | A+ Verified
• Which area of ethical concerns in IT deals directly with information ownership? -
✓✓Property
• A car manufacturer decides to alter its emission testing to pass regulatory
requirements. The emission reduction system is only used during tests. The system is
not engaged during normal driving conditions in order to improve fuel efficiency, torque,
and acceleration. Which step in the ethical decision-making process should have been
used to evaluate the environmental impact of this decision? -✓✓Choose Alternatives
• Which two ways may advances in technology affect common ethical assumptions? -
✓✓Companies take advantage of their privileged access to personal user data to
benefit their shareholders.
Surveillance allows companies to increase productivity by closely watching their
employees' behavior.
• Which ethics-related consideration is addressed by the California Online Privacy
Protection Act of 2003 and its amendments? -✓✓Do Not Track Signals
• Which two aspects of an IT worker's responsibilities involve ethical issues that might
arise in the relationship between IT workers and IT users? -✓✓Discouraging Software
Piracy
Controlling Information Sharing
• A well-respected IT professional from a small software company uses resume inflation
when searching for a new position. Which two ethical challenges may encourage this
behavior? -✓✓Prioritization of Personal Loyalty
Disregard for the Professional Code of Conduct
• What is an objective of a professional code of ethics in IT? -✓✓Provide Benchmarks
for Self-Assessment
• Which type of cyberattack uses text messages to trick victims into disclosing personal
information that can subsequently be exploited for a financial gain? -✓✓Smishing
• What is the goal of a white hat hacker in cyberattacks in IT? -✓✓To identify
vulnerabilities of a company's information system to remediate them
, • Which major U.S. regulation governs the collection, disclosure, and protection of
consumers' personally identifiable information (PII) data by companies that provide
financial products and services? -✓✓Gramm-Leach-Bliley Act
• What are the consequences of more lenient bring-your-own-devices (BYOD) policies
for IT? -✓✓Increased productivity and increased vulnerability to data system breaches
• What are two reasons why professional codes of ethics in IT are important? -✓✓They
identify the unacceptable behaviors for interacting with customers.
They identify the acceptable behaviors for interacting with customers.
• What is the primary goal for a supply chain relating to corporate social responsibility
(CSR)? -✓✓Sustainability
• Which aspect of the computer security triad provides guidance when dealing with data
accuracy in IT? -✓✓Integrity
• An IT professional wants the proper credentials and knowledge that are required to
collect data from devices affected by cyberattacks to ensure such data would be
admissible as evidence in a court of law. Which two certifications should the IT
professional obtain? -✓✓Certified Computer Examiner
EnCase Certified Examiner
• Which type of guidance is provided by professional codes of ethics within IT? -
✓✓Course of action in cases of conflict of interest
• What are two main elements of a professional code of ethics in IT? -✓✓Core Values
Common Beliefs
• What is the meaning of morals in the context of ethical judgment? -✓✓The personal
principles that determine what an individual considers to be right or wrong
• Which measure of the confidentiality, integrity, and availability (CIA) triad should be
used by IT professionals at the organization level to supply validation of non-repudiation
regarding data access in IT? -✓✓Security Audit
• What are two components of the concept of information privacy? -✓✓Communication
Privacy
Data Privacy