-
web.groovymark@gmail.com
- November 19, 2024
Question 21
A company is concerned about storing sensitive financial data in the cloud due to potential legal risks. Which regulation should the company review to ensure compliance?
a) Health Insurance Portability and Accountability Act (HIPAA)
b) Sarbanes-Oxley Act (SOX)
c) CAN-SPAM Act
d) General Data Protection Regulation (GDPR)
Correct Answer: b) Sarbanes-Oxley Act (SOX)
Explanation: SOX regulates financial practices and data management, ensuring companies securely store and handle sensitive financial data.
Question 22
A cybersecurity team uses predictive coding to sort through a large volume of documents during a data breach investigation. Which challenge does predictive coding help address?
a) System vulnerability
b) Data overload
c) Misuse of encryption
d) Slow network performance
Correct Answer: b) Data overload
Explanation: Predictive coding helps manage large volumes of documents by automatically identifying relevant information, addressing the challenge of data overload.
Question 23
A company uses a third-party service to manage customer data. The service provider experiences a security breach. What is the primary ethical issue the company faces?
a) Loss of productivity
b) Misrepresentation of data
c) Accountability for customer data security
d) Unfair competition
Correct Answer: c) Accountability for customer data security
Explanation: Even when using a third-party service, the company remains accountable for ensuring the security and privacy of its customers’ data.
Question 24
A manager allows employees to use personal devices for work purposes, leading to increased productivity but higher data security risks. Which two consequences arise from this bring-your-own-device (BYOD) policy?
(Select two)
a) Reduced employee satisfaction
b) Increased vulnerability to data breaches
c) Increased productivity
d) Reduced system performance
Correct Answer: b) Increased vulnerability to data breaches, c) Increased productivity
Explanation: While BYOD policies can improve productivity, they also expose the organization to higher security risks, such as data breaches.
Question 25
Which method is commonly used to obtain personal information about consumers in e-commerce transactions?
a) Encryption
b) Phishing
c) Cookies
d) Spyware
Correct Answer: c) Cookies
Explanation: Cookies are commonly used in e-commerce to collect information about users’ browsing habits and preferences, often without explicit consent.
Question 26
A developer creates software to automate processes within a healthcare system. The software fails to include identity and access controls, leading to unauthorized changes in patient data. Which existential risk does this pose?
a) Loss of system performance
b) Public health misinformation
c) Unauthorized data access
d) Reduced patient satisfaction
Correct Answer: b) Public health misinformation
Explanation: The lack of identity and access controls could lead to unauthorized changes in sensitive patient data, which can result in misinformation and pose significant risks to public health.
Question 27
What is the primary goal of supply chain sustainability in corporate social responsibility (CSR)?
a) Improve customer satisfaction
b) Reduce legal liabilities
c) Ensure sustainability for future generations
d) Increase supply chain efficiency
Correct Answer: c) Ensure sustainability for future generations
Explanation: Supply chain sustainability aims to create environmentally and socially responsible processes that meet present needs without compromising future generations.
Question 28
Which ethical consideration is addressed by the Children’s Online Privacy Protection Act (COPPA)?
a) Transparency in data collection
b) User consent for tracking
c) Protection of children’s personal data
d) Avoidance of identity theft
Correct Answer: c) Protection of children’s personal data
Explanation: COPPA regulates how websites and online services collect and manage data from children under the age of 13, ensuring their privacy and safety.
Question 29
A developer designs a fitness tracking app that shares users’ health data with third-party companies. What should the developer prioritize to address potential ethical concerns?
a) Security encryption
b) User consent
c) Improved interface design
d) Faster data processing
Correct Answer: b) User consent
Explanation: To ensure ethical data handling, the developer must prioritize obtaining explicit consent from users before sharing their health data with third parties.
Question 30
What are two common sources of bias in artificial intelligence (AI) systems that pose ethical challenges?
(Select two)
a) School district data
b) Website performance
c) Zip code information
d) System memory size
Correct Answer: a) School district data, c) Zip code information
Explanation: Both school district and zip code data can introduce bias into AI systems, particularly when they are used as proxies for sensitive variables like race or income.
Question 31
A company stores customers’ financial information but fails to secure it with encryption. What is the ethical issue with this practice?
a) Data integrity
b) Lack of transparency
c) Misuse of resources
d) Data privacy
Correct Answer: d) Data privacy
Explanation: Storing sensitive financial data without encryption puts customer privacy at risk, making it vulnerable to unauthorized access or breaches.
Question 32
Which ethical challenge is associated with internet censorship by authoritarian governments?
a) Increased access to information
b) Encouragement of free speech
c) Silencing of critical opinions
d) Enhanced national security
Correct Answer: c) Silencing of critical opinions
Explanation: Authoritarian governments often use internet censorship to suppress dissent and limit access to information, thus violating principles of free expression and transparency.
Question 33
Which law was enacted to prohibit employment discrimination based on race, color, creed, or national origin?
a) Age Discrimination in Employment Act
b) Executive Order 11246
c) Americans with Disabilities Act
d) Civil Rights Act
Correct Answer: b) Executive Order 11246
Explanation: Executive Order 11246 prohibits employment discrimination on the basis of race, color, creed, or national origin and promotes affirmative action.
Question 34
A software developer wants to ensure that their application is open for modification and use by the public. Which method should the developer use to release the software?
a) Patent the software
b) Publish under an open-source license
c) Register the software under copyright
d) Implement strict access controls
Correct Answer: b) Publish under an open-source license
Explanation: Releasing the software under an open-source license ensures that others can freely use, modify, and distribute the application, promoting collaboration and transparency.
Question 35
A social media company sells user data to third-party advertisers without user consent. Which regulation is likely violated by this action?
a) Children’s Online Privacy Protection Act (COPPA)
b) Health Insurance Portability and Accountability Act (HIPAA)
c) General Data Protection Regulation (GDPR)
d) Communications Decency Act
Correct Answer: c) General Data Protection Regulation (GDPR)
Explanation: The GDPR requires that companies obtain explicit consent before using or sharing users’ personal data with third parties, and violating this can result in significant penalties.
Question 36
A company is using tracking technology to monitor employees’ activities during remote work hours. Which ethical issue does this practice raise?
a) Fair compensation
b) Employee privacy
c) Corporate security
d) Task management
Correct Answer: b) Employee privacy
Explanation: Tracking employee activities during work hours, especially without their consent, raises significant privacy concerns and can lead to ethical violations.
Question 37
A company creates an artificial intelligence system to manage loan applications. However, the system unintentionally discriminates against certain demographic groups. Which type of bias might this represent?
a) Zip code bias
b) Proxy bias
c) Sampling bias
d) Algorithmic bias
Correct Answer: d) Algorithmic bias
Explanation: Algorithmic bias occurs when AI systems make decisions that systematically disadvantage certain groups, often due to the data or models used to train the system.
Question 38
An IT professional notices their company engaging in practices that could harm the environment but is unsure whether to speak out. Which ethical principle is most relevant in this situation?
a) Corporate social responsibility
b) Data integrity
c) Intellectual property
d) Customer privacy
Correct Answer: a) Corporate social responsibility
Explanation: Corporate social responsibility (CSR) involves ensuring that a company’s actions do not negatively impact the environment or society, which is central to ethical business practices.
Question 39
A developer is asked to create a mobile app for collecting users’ location data. To avoid ethical issues, what must the developer ensure before deploying the app?
a) The app functions smoothly
b) The app uses a small amount of data
c) Users are informed and provide consent
d) The app has encryption
Correct Answer: c) Users are informed and provide consent
Explanation: Informing users and obtaining their consent to collect location data ensures that the app respects privacy laws and ethical data handling principles.
Question 40
A government contractor implements a system that collects user data for surveillance purposes. What should the contractor ensure to minimize ethical concerns?
a) Clear communication of the system’s purpose
b) Collection of as much data as possible
c) Sharing of the data with all government agencies
d) Avoidance of data encryption
Correct Answer: a) Clear communication of the system’s purpose
Explanation: Transparent communication about the data being collected and its purpose helps minimize ethical concerns related to privacy and surveillance.