D333 Ethics in Technology - Set 1 - Part 1
Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.
Question 1: A car manufacturer decides to alter its emission testing to pass regulatory requirements. The emission reduction system is only used during tests, and not during normal driving conditions in order to improve fuel efficiency. Which step in the ethical decision-making process should have been used to evaluate the environmental impact of this decision?
Question 2: Which two aspects of an IT worker's responsibilities involve ethical issues that might arise in the relationship between IT workers and IT users?
Question 3: What is the primary goal for a supply chain relating to corporate social responsibility (CSR)?
Question 4: Which type of cyberattack uses text messages to trick victims into disclosing personal information for financial gain?
Question 5: What is an objective of a professional code of ethics in IT?
Question 6: Which two intellectual property items are protected by a patent?
Question 7: Which aspect of the computer security triad provides guidance when dealing with data accuracy in IT?
Question 8: A consulting firm that provides security services is conducting an independent security audit for a company and recommends remediation methods. What ethical issue may arise in this scenario?
Question 9: Which major U.S. regulation governs the collection, disclosure, and protection of consumers' personally identifiable information (PII) data by companies that provide financial products and services?
Question 10: An IT professional discovers a security vulnerability in a product close to release. They are encouraged by a colleague to remain silent, but the professional believes they have a duty to report it. Which ethical theory supports their decision?
Question 11: Which law was passed in 1998 and aimed at prohibiting the distribution of harmful material to minors via the internet?
Question 12: A hospital is implementing an electronic bridge to improve the speed and security of data transfer between facilities. Which solution should they use?
Question 13: What is the goal of a white hat hacker in cyberattacks in IT?
Question 14: A manager is preparing an employee for a sales trip and instructs them to give expensive gifts to clients to secure business. The employee expresses concern about the ethical implications of bribery. The manager responds by saying bribery is culturally acceptable in some regions. Which ethical theory does this reflect?
Question 15: A company's bring-your-own-device (BYOD) policy allows employees to use personal devices for work, resulting in increased productivity. What other impact might this policy have?
Question 16: A software engineer inflates their resume when applying for a new position. Which two ethical challenges might encourage this behavior?
Question 17: What is a primary consequence of allowing unrestricted access to public internet usage in a corporate environment?
Question 18: Which regulation is designed to strengthen data protection for individuals within the European Union, specifically addressing the export of personal data outside the EU?
Question 19: Which ethical framework suggests that actions are morally right or wrong based solely on their consequences?
Question 20: A security company is found to have issued a root cause analysis that misses key details about remediating existing vulnerabilities due to insufficient expertise. What is the potential impact of this behavior?
Need Guaranteed Results?
Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!
Get Exam Support