with Verified Answers
What is the meaning of ethics in the context of ethical judgment - CORRECT
ANSWER The code of behavior defined by a group an individual belongs to
Which two way may advance in technology affect common ethical assumptions? -
CORRECT ANSWER Companies take advantage of their privileged access to
personal user data to benefit their shareholders and surveillance allows
companies to increase productivity by closely watching their employees behavior
A car manufacturer decides to alter its emission testing to pass regulatory
requirements. the emission reduction system is only used during tests. the system
is not engaged during normal driving conditions in order to improve fuel
efficiency, torque, and acceleration. which step in the ethical decision-making
process should have been used to evaluate the environmental impact of this
decision? - CORRECT ANSWER Choose Alternatives
Which area of ethical concerns in IT deals directly with information ownership? -
CORRECT ANSWER Property
Which ethics-related consideration is addressed by the California Online Privacy
Protection Act of 2003 and Its amendments? - CORRECT ANSWER Do not Track
Signals
Which two aspects of an IT worker's responsibilities involve ethical issues that
might arise in the relationship between IT workers and IT users? - CORRECT
ANSWER Discouraging software piracy and Controlling Information sharing
,Searching for a new position. - CORRECT ANSWER Prioritization of personal loyalty
and Disregard for the professional code of conduct
What is an objective of a professional code of ethics in IT? - CORRECT ANSWER
Provide benchmarks for self-assessment
What are the consequences of more lenient bring your own devices (BYOD)
policies for IT? - CORRECT ANSWER Increased productivity and increased
vulnerability to data system breaches
Which type of cyberattack uses text messages to tick victims into disclosing
personal information that can subsequently be exploited for a financial gain? -
CORRECT ANSWER Smishing
What is the goal of a white hat hacker in cyberattacks in IT? - CORRECT ANSWER
To identify vulnerabilities of a company's information system to remediate the
Which major U.S regulation governs the collection, disclosure, and protection of
consumers personally identifiable information (PII) data by companies that
provide financial products and services? - CORRECT ANSWER Gramm-Leach-Bliley
Act
What is the meaning of morals in the context of ethical judgment? - CORRECT
ANSWER The personal principles that determine what an individual considers to
be right or wrong
,What is the primary used by deontology to evaluate morality of human actions? -
CORRECT ANSWER Duty
Which part of the decision-making process involves defining a transition plan? -
CORRECT ANSWER Implementing the decision
In response to the pressure from its shareholders, a publicly owned software
company plans to implement a strict, globally consistent approach to prevent
software piracy of its products that help with implementing green energy
solutions. Which impact should be considered from an ethical standpoint due to
digital divide? - CORRECT ANSWER A negative impact on demographics in less-
developed countries
Which measure of the confidentiality, integrity. and availability (CIA) triad should
be used by IT professionals at the organization level to supply validation of non-
repudiation regarding data access in IT? - CORRECT ANSWER Security Audit
An IT professional wants the proper credentials and knowledge that is required to
collect data from devices affected by cyberattacks to ensure such data would be
admissible as evidence in a court of law. Which two certifications should the IT
professional obtain? - CORRECT ANSWER Certified Computer Examiner, EnCase
Certified Examiner
What are two reasons why professional codes of ethics in IT are important? -
CORRECT ANSWER They Identify the acceptable behaviors for interacting with
customers and they identify the unacceptable behaviors for interacting with
customers
, What are two main elements of a professional code of ethics in IT? - CORRECT
ANSWER Core Values and Common Beliefs
Which scenario may create a conflict of interest between IT workers and clients? -
CORRECT ANSWER A consulting firm that provides security is conducting an
independent security audit for a company and is recommending remediation
methods
Which type of guidance is provided by professional codes of ethics within IT? -
CORRECT ANSWER Professional codes of ethics within IT provide the course of
action in cases of conflict of interest
What are two components of the concept of information privacy? - CORRECT
ANSWER Communication privacy and Data privacy
Which aspect of the computer security triad provides guidance when dealing with
data accuracy in IT? - CORRECT ANSWER Integrity
How should an IT professional respond to a cyberattack prior to the incident
eradication? - CORRECT ANSWER Preserve evidence and activity logs
Which type of attack is a common cause of data-level breaches with global scope?
- CORRECT ANSWER Phishing
What should be the primary ethical obligation of an IT professional regarding
customer profiling data? - CORRECT ANSWER Preventing unauthorized data
disclosure