WGU - ETHICS IN TECHNOLOGY 2025
|LATEST EXAM QUESTIONS WITH
VERIFIED ANSWERS
What is the form of the intellectual property in this scenario? - correct-answer-
copyright
What is the source of the threat identified in this scenario? - correct-answer-
reverse engineering
This business is contracted to create a resource management system to automate
processes. The company modifies an open source code and markets it as
proprietary software, charging other companies thousands of dollars to use it.
What may this open source community obtain to avoid this practice? - correct-
answer-open source license
, 2|Page
A software developer's code defines the business. An employee creates a product
to corrupt data every couple of weeks. During the testing phase, the code works
as planned, and the company and the end user accepts it. After one week, the end
user's data is corrupted.
What should this threat be described as? - correct-answer-Malware
The product the firm produces dictates its viability, but the software has a
reputation of being defective. To ensure the success of the firm, several
developers are terminated for producing malicious software.What should these
terminated employees be classified as? - correct-answer-Black hat hackers
Which type of ethics is absent when workers purposely defame their employer by
demonstrating unethical behaviors without considering the impact on information
systems? - correct-answer-virtue ethics
What is the source of the threat identified in this scenario? - correct-answer-
Plagiarism
What is the ethical issue in this scenario? - correct-answer-misrepresentation