Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

D333- Ethics In Technology Latest Exam Questions With Complete Solutions, Exams of Ethics

D333- Ethics In Technology Latest Exam Questions With Complete Solutions D333- Ethics In Technology Latest Exam Questions With Complete Solutions

Typology: Exams

2024/2025

Available from 01/03/2025

Nursesam
Nursesam 🇺🇸

3.3

(3)

222 documents

1 / 52

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
D333- Ethics In Technology Latest Exam
Questions With Complete Solutions
A Habit That Inclines People To Do What's Acceptable:
Virtue
Honesty
Integrity
Discipline
Answer: Virtue
A Habit Of Unacceptable Behavior:
Vice
Immorality
Greed
Laziness
Answer: Vice
Acts In Accordance With Personal Code Of Principles:
Integrity
Honor
Conscience
Ethics
Answer: Integrity
The Moral Corruption Of People In Power, Also A Tendency For People To Look The
Other Way When Leaders Act Inappropriately:
Bathsheba Syndrome
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34

Partial preview of the text

Download D333- Ethics In Technology Latest Exam Questions With Complete Solutions and more Exams Ethics in PDF only on Docsity!

D333- Ethics In Technology Latest Exam

Questions With Complete Solutions

  • A Habit That Inclines People To Do What's Acceptable:
    • Virtue
    • Honesty
    • Integrity
    • Discipline Answer: Virtue
  • A Habit Of Unacceptable Behavior:
    • Vice
    • Immorality
    • Greed
    • Laziness Answer: Vice
  • Acts In Accordance With Personal Code Of Principles:
    • Integrity
    • Honor
    • Conscience
    • Ethics Answer: Integrity
  • The Moral Corruption Of People In Power, Also A Tendency For People To Look The Other Way When Leaders Act Inappropriately:
    • Bathsheba Syndrome
  • Power Corruption
  • Political Corruption
  • Tyranny Answer: Bathsheba Syndrome
  • Trade Groups That Represent Largest Software And Hardware Manufacturers, Stop Unauthorized Copyright, Protect Intellectual Property, Provides Education:
  • Software & Information Industry Association (Siia) & Bsa
  • National Software Association (Nsa)
  • Digital Rights Group
  • Electronic Frontier Foundation (Eff) Answer: Software & Information Industry Association (Siia) & Bsa
  • A False Statement Or Lie That Can Render The Contract Void:
  • Misrepresentation
  • Deception
  • Fraud
  • Falsification Answer: Misrepresentation
  • A Failure To Perform, As Promised, At The Time The Performance Was Due:
  • Breach Of Contract
  • Default
  • Non-Performance
  • Violation Of Terms Answer: Breach Of Contract
  • All People, Policies, Processes, Procedures, & Systems Controlled By Management:
  • Organization's Internal Control
  • Not Doing Something A Reasonable Person Would Do/ Something A Reasonable Person Would Not Do:
    • Negligence
    • Recklessness
    • Inattention
    • Carelessness Answer: Negligence
  • The Obligation People Owe Each Other Not To Cause Any Unreasonable Harm Or Risk Of Harm:
    • Duty Of Care
    • Moral Responsibility
    • Legal Obligation
    • Civic Duty Answer: Duty Of Care
  • A Legal Standard That Defendants Who Have Particular Expertise Or Competence Are Measured Against:
    • Reasonable Professional Standard
    • Expert Witness Standard
    • Professional Code Of Conduct
    • Specialized Knowledge Standard Answer: Reasonable Professional Standard
  • A Legal Standard That Defines How An Objective, Careful, And Conscientious Person Would Have Acted In The Same Circumstances:
    • Reasonable Person Standard
    • Average Person Standard
    • Ordinary Person Standard
  • Careful Person Standard Answer: Reasonable Person Standard
  • Breach Of Duty Of Care By A Professional:
  • Professional Malpractice
  • Negligence
  • Medical Error
  • Breach Of Trust Answer: Professional Malpractice
  • A Cyberattack That Takes Place Before The Security Community And/Or Software Developers Become Aware Of And Fix A Security Vulnerability:
  • Zero-Day Exploit
  • Pre-Emptive Attack
  • First-Strike Cyberattack
  • Hidden Threat Answer: Zero-Day Exploit
  • Someone Who Violates Computer Or Internet Security Maliciously Or For Illegal Personal Gain:
  • Black Hat Hacker
  • Cyber Thief
  • Online Attacker
  • Malicious User Answer: Black Hat Hacker
  • An Employee Or Contractor Who Attempts To Gain Financially And/Or Disrupt A Company's Information Systems And Business Operations:
  • Malicious Insider
  • Trojan Horse
  • Lockware
  • Extortion Malware Answer: Ransomware
  • A Piece Of Programming Code, Usually Disguised As Something Else, That Causes A Computer To Behave In An Unexpected And Usually Undesirable Manner:
  • Virus
  • Malware
  • Trojan Horse
  • Spyware Answer: Virus
  • A Harmful Program That Resides In The Active Memory Of The Computer And Duplicates Itself:
  • Worm
  • Virus
  • Ransomware
  • Adware Answer: Worm
  • A Seemingly Harmless Program In Which Malicious Code Is Hidden:
  • Trojan Horse
  • Spyware
  • Virus
  • Keylogger Answer: Trojan Horse
  • Combines Various Types Of Exploits And Vulnerabilities In One Payload:
    • Blended Threat
    • Hybrid Attack
    • Multi-Stage Attack
    • Complex Exploit Answer: Blended Threat
  • A Malicious Hacker Takes Over Computers Via The Internet And Causes Them To Flood A Target Site With Demands For Data/Small Tasks:
    • Ddos Attack/ Denial Of Service Attack
    • Botnet Attack
    • Syn Flood Attack
    • Distributed Flood Attack Answer: Ddos Attack/ Denial Of Service Attack
  • A Set Of Programs That Enables Its User To Gain Administrator Level Access To A Computer Without The End User's Consent Or Knowledge:
    • Rootkit
    • Backdoor
    • Trojan Horse
    • Keylogger Answer: Rootkit
  • An Intruder Gains Access And Stays Undetected For A Long Time:
    • Apt (Advanced Persistent Threat)
    • Stealth Attack
    • Silent Hack
    • Covert Access Answer: Apt (Advanced Persistent Threat)
  • Anti-Fraud Act Answer: Computer Fraud And Abuse Act (Cfaa) 1986
  • Covers Sales Claims Regarding Unauthorized Use Of Credit Cards:
  • Fraud And Related Activity In Connection With Access Devices Statute
  • Credit Card Fraud Act
  • Electronic Fraud Law
  • Payment Systems Security Law Answer: Fraud And Related Activity In Connection With Access Devices Statute
  • Focuses On Unlawful Access To Stored Communications To Obtain, Alter, Or Prevent Unauthorized Access To Electronic Communication While It Is In Electrical Storage:
  • Stored Wire And Electronic Communications And Transactional Records Access Statutes (U.S. Code Title 18, Chapter 121)
  • Stored Data Protection Act
  • Communications Privacy Act
  • Digital Communication Protection Law Answer: Stored Wire And Electronic Communications And Transactional Records Access Statutes (U.S. Code Title 18, Chapter 121)
  • Defines Cyberterrorism And Associated Penalties. Gave New Powers To Domestic Law Enforcement And International Intelligence Agencies. Increasing The Ability Of Law Enforcement Agencies To Search All Kinds Of Records. It Also Eased Restrictions On Foreign Intelligence Gathering In The Us:
  • Usa Patriot Act 2001
  • Homeland Security Act
  • Cybersecurity Enhancement Act
  • National Security Act Answer: Usa Patriot Act 2001
  • The Recognition That Managers Must Use Their Judgment To Ensure That The Cost Of Control Does Not Exceed The System's Benefits Or The Risks Involved:
    • Reasonable Assurance
    • Cost-Benefit Analysis
    • Risk Management
    • Effective Control Assessment Answer: Reasonable Assurance
  • Guidelines And Arrangements For Response To Disruption Of Critical Business Functions, To Restore And Maintain Operation:
    • Business Continuity Plan
    • Disaster Recovery Plan
    • Crisis Management Plan
    • Risk Mitigation Plan Answer: Business Continuity Plan
  • Requires Financial Institutions In The United States To Assist U.S. Government Agencies To Detect And Prevent Money Laundering:
    • Bank Secrecy Act 1970
    • Anti-Money Laundering Act
    • Financial Crimes Enforcement Network (Fincen) Act
    • Usa Patriot Act Answer: Bank Secrecy Act 1970
  • Makes Certain Payments To Foreign Officials And Other Foreign Persons Illegal And Requires Companies To Maintain Accurate Records:
    • Foreign Corrupt Practices Act 1977
    • Anti-Corruption Act 2010
    • Global Anti-Bribery Law
  • Protects Shareholders And The General Public From Accounting Errors And Fraudulent Practices In The Enterprise:
    • Sarbanes-Oxley Act 2002
    • Corporate Accountability Act
    • Financial Transparency Act
    • Investor Protection Act Answer: Sarbanes-Oxley Act 2002 A Firewall That Combines Firewall Software With Anti-Malware Software And Other Software That Protects Resources On A Network. Goes Deeper To Inspect:
  • Next Generation Firewall (Ngfw)
  • Unified Threat Management (Utm)
  • Stateful Inspection Firewall
  • Deep Packet Inspection (Dpi) Answer: Next Generation Firewall (Ngfw) A Set Of Characters That The Originator Of The Data Uses To Encrypt The Plaintext And The Recipient Of The Data Uses To Decrypt The Ciphertext. Unreadable To Those Without It:
  • Encryption Key
  • Private Key
  • Secret Code
  • Public Key Answer: Encryption Key Ensures Privacy Between Communicating Applications, And Users To The Internet:
  • Triple Layer Security
  • End-To-End Encryption
  • Ssl/Tls Encryption
  • Vpn Encryption Answer: Triple Layer Security Capture Valuable Evidence For Future Prosecution, Provides Data To Help During Incident Eradication And Follow-Up Phases:
  • Activity Logs
  • System Audit Trails
  • Forensic Data Logs
  • Incident Response Logs Answer: Activity Logs Third-Party Provision Of Security Configuration And Monitoring As An Outsourced Service:
  • Mssp (Managed Security Service Provider)
  • Managed It Service Provider
  • Cloud Security Service
  • Security Operations Center (Soc) Answer: Mssp (Managed Security Service Provider) Right To Privacy, The Right To Be Left Alone:
  • 4th Amendment
  • Right To Privacy Act
  • Privacy Protection Act
  • Digital Privacy Act Answer: 4th Amendment The Combination Of Communications Privacy And Data Privacy:
  • Information Privacy
  • Data Protection

Includes Strong Privacy Provisions For Electronic Health Records (Ehr's), Including Ban Of The Sale Of Health Info, Promoting The Use Of Audit Trails And Encryption, And Providing Rights To Access For Patients. Individuals Whose Health Info Has Been Exposed Must Be Notified Within 60 Days:

  • American Recovery And Reinvestment Act Of 2009
  • Health Information Technology For Economic And Clinical Health (Hitech) Act
  • Health Privacy And Security Act
  • Health Data Protection Act Answer: American Recovery And Reinvestment Act Of 2009 Assigns Rights To Parents Regarding Their Children's Educational Records. Includes The Rights To Access, Request, And Amend School Records; Along With File Complaints For Disclosure Violations:
  • Family Educational Rights And Privacy Act Of 1974 (Ferpa)
  • Student Privacy Protection Act
  • Child Education Privacy Act
  • School Records Access Law Answer: Family Educational Rights And Privacy Act Of 1974 (Ferpa) Any Websites That Cater To Children Must Offer Comprehensive Privacy Policies, Notify Parents About Its Data Collection Practices, And Receive Parental Consent Before Collecting Any Personal Information From Children Under 13:
  • Children's Online Privacy Protection Act Of 1998 (Coppa)
  • Child Data Protection Act
  • Online Children's Privacy Law
  • Youth Privacy Protection Act Answer: Children's Online Privacy Protection Act Of 1998 (Coppa)

Allows State And Federal Law Enforcement To Use Wiretapping And Electronic Eavesdropping, Under Strict Limitations. A Warrant Must Be Obtained From A Judge To Conduct A Wiretap. Also Known As The Wiretap Act:

  • Title Iii Of The Omnibus Crime Control And Safe Streets Act Of 1968
  • Communications Assistance For Law Enforcement Act (Calea)
  • Electronic Communications Privacy Act (Ecpa)
  • Wiretapping Regulations Act Answer: Title Iii Of The Omnibus Crime Control And Safe Streets Act Of 1968 Describes Procedures For The Electronic Surveillance And Collection Of Foreign Intelligence Information In Communications Between Foreign Powers And The Agents Of Foreign Powers, Requires The Government To Obtain A Court Order Before It Can Intentionally Target A Us Person:
  • Foreign Intelligence Surveillance Act 1978 (Fisa)
  • Usa Patriot Act 2001
  • Foreign Espionage Act 1978
  • Intelligence Surveillance Act Of 1980 Answer: Foreign Intelligence Surveillance Act 1978 (Fisa) Identifies The Various U.S. Governmental Intelligence-Gathering Agencies, And Defines What Information Can Be Collected, Retained, And Disseminated By These Agencies. These Agencies Are Allowed To Collect Info, Including Messages Obtained During Lawful Investigations:
  • Executive Order 12333 1981
  • National Intelligence Authorization Act
  • National Security Act 1947
  • Federal Intelligence And Surveillance Act Answer: Executive Order 12333 1981

Grants The Nsa Authority To Collect Without Court-Approved Warrants, International Communications As They Flow Through The Us Telecommunications Network. The Targets Of The Warrantless Eavesdropping Had To Be Reasonably Believed To Be Outside The Us:

  • Foreign Intelligence Surveillance Act Of 1978 Amendments Act Of 2008
  • Nsa Surveillance Enhancement Act
  • International Intelligence Collection Act
  • Usa Patriot Act Expansion Act Answer: Foreign Intelligence Surveillance Act Of 1978 Amendments Act Of 2008 Replaced The Patriot Act When It Expired On June 1, 2015. Banned Bulk Collection Of Data (By The Nsa), New Reporting Requirements, Telecommunications Providers Are Now Required To Hold The Data And Respond To Nsa Queries On The Data, Extended The Expiration Of Roving Wiretaps And Lone Wolf Surveillance Authority:
  • Usa Freedom Act 2015
  • National Security Surveillance Act
  • Reformed Intelligence Act
  • Usa Intelligence Transparency Act Answer: Usa Freedom Act 2015 Model For Ethical Treatment Of Consumer Data. These Guidelines Have 8 Principles; Collection, Limitation, Data Quality, Purpose, Use Limitation, Safeguards, Openness, Individual Participation, And Accountability:
  • Organization For Economic Co-Operation And Development 1980 (Oecd)
  • Data Protection Ethics Model
  • Privacy Rights Framework
  • Consumer Protection Data Guidelines Answer: Organization For Economic Co-Operation And Development 1980 (Oecd)

Requires Any Company Doing Business Within The Borders Of The Countries Compromising The Eu, To Implement A Set Of Privacy Directives On The Fair And Appropriate Use Of Information:

  • European Union Data Protection Directive 1995
  • Eu Privacy Protection Framework
  • Eu General Data Protection Regulation (Gdpr)
  • Eu Information Privacy Act Answer: European Union Data Protection Directive 1995 Strengthens Data Protection For Individuals Within The Eu By Addressing The Export Of Personal Data Outside The Eu, Enabling Citizens To See And Correct Their Personal Data, And Ensuring Data Protection Consistency Across The Eu:
  • General Data Protection Regulation 2018 (Gdpr)
  • Eu Data Protection Enhancement Act
  • Eu Personal Data Security Regulation
  • Eu Privacy And Security Act Answer: General Data Protection Regulation 2018 (Gdpr) Allows Access To Federal Agency Records Or Information Not Determined To Be A Matter Of National Security:
  • Freedom Of Information Act 1966 (Foia)
  • Federal Information Access Act
  • Public Access To Government Data Act
  • Transparency In Government Act Answer: Freedom Of Information Act 1966 (Foia) Code Of Fair Information Practices That Governs The Personal Info About Individuals That Is Maintained In Systems Of Records By Federal Agencies. Prohibits Government Agencies From Hiding Any Personal Data-Keeping System: