OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 19, 2024

Question 01

Which U.S. regulation governs the privacy and protection of personal health information in healthcare?

a) Sarbanes-Oxley Act

b) General Data Protection Regulation (GDPR)

c) Health Insurance Portability and Accountability Act (HIPAA)

d) Gramm-Leach-Bliley Act

Correct Answer: c) Health Insurance Portability and Accountability Act (HIPAA)

Explanation: HIPAA ensures the protection and privacy of individuals’ health information and sets standards for its handling in the healthcare industry.

Question 02

A manager promotes a bring-your-own-device (BYOD) policy in the company to improve productivity but doesn’t account for increased security risks. What are the two main consequences of this approach?
(Select two)

a) Lower employee morale

b) Increased vulnerability to data breaches

c) Higher IT infrastructure costs

d) Greater risk of lost or stolen devices

Correct Answer: b) Increased vulnerability to data breaches, d) Greater risk of lost or stolen devices

Explanation: While BYOD policies can enhance productivity, they increase the risk of data breaches and physical device loss, which may compromise security.

Question 03

Which cybersecurity attack is characterized by an attacker taking control of multiple devices to flood a target server with traffic, causing it to crash?

a) Phishing

b) Distributed Denial-of-Service (DDoS)

c) Ransomware

d) Rootkit

Correct Answer: b) Distributed Denial-of-Service (DDoS)

Explanation: A DDoS attack overwhelms a server by sending a massive amount of traffic from multiple sources, making the server inaccessible to legitimate users.

Question 04

Which ethical concern arises when AI is used to monitor employees’ work habits and productivity?

a) Data accuracy

b) Employee privacy

c) System performance

d) Algorithm bias

Correct Answer: b) Employee privacy

Explanation: Using AI to monitor employee work habits raises privacy concerns, especially if monitoring occurs without informed consent or transparency.

Question 05

A software developer misrepresents the capabilities of a new system to expedite a sale. What legal issue does this behavior raise?

a) Bribery

b) Intellectual property infringement

c) Misrepresentation

d) Copyright violation

Correct Answer: c) Misrepresentation

Explanation: Misrepresenting a product’s capabilities to secure a sale is legally considered misrepresentation and can lead to legal and financial penalties.

Question 06

Which ethical theory focuses on doing what is morally correct regardless of the outcome?

a) Utilitarianism

b) Deontology

c) Virtue ethics

d) Relativism

Correct Answer: b) Deontology

Explanation: Deontology focuses on duty and the morality of actions themselves, rather than their consequences, when determining whether an action is right or wrong.

Question 07

What is the primary objective of the Children’s Online Privacy Protection Act (COPPA)?

a) To prevent data breaches

b) To protect children’s privacy online

c) To ensure companies use encryption

d) To regulate copyright infringement

Correct Answer: b) To protect children’s privacy online

Explanation: COPPA ensures that websites collecting personal data from children under 13 comply with privacy protections and obtain parental consent.

Question 08

A software company faces penalties for failing to provide customers with a free annual credit report. Which regulation did the company violate?

a) Gramm-Leach-Bliley Act

b) Fair Credit Reporting Act

c) General Data Protection Regulation (GDPR)

d) CAN-SPAM Act

Correct Answer: b) Fair Credit Reporting Act

Explanation: The Fair Credit Reporting Act requires companies to provide consumers with free annual access to their credit reports to monitor and correct inaccuracies.

Question 09

Which type of malware disguises itself as a legitimate program but carries hidden malicious code?

a) Virus

b) Trojan horse

c) Worm

d) Rootkit

Correct Answer: b) Trojan horse

Explanation: A Trojan horse appears to be a legitimate software program but secretly contains malicious code that can compromise systems once executed.

Question 10

A manager requests that all employees’ emails be monitored to identify potential data leaks. Which ethical concern does this request raise?

a) System performance

b) Intellectual property rights

c) Employee privacy

d) Misuse of resources

Correct Answer: c) Employee privacy

Explanation: Monitoring employee emails without their knowledge or consent raises privacy concerns and may violate employee rights to confidentiality.

Question 11

A company wants to ensure its operations are environmentally friendly and socially responsible. Which business concept addresses these goals?

a) Intellectual property management

b) Corporate social responsibility (CSR)

c) Competitive intelligence

d) Strategic marketing

Correct Answer: b) Corporate social responsibility (CSR)

Explanation: CSR involves ensuring that companies act ethically, taking responsibility for their environmental and social impact.

Question 12

What ethical issue arises when a company uses AI algorithms that unintentionally discriminate against certain demographic groups?

a) Bias in data

b) Violation of privacy

c) System failure

d) Reduced productivity

Correct Answer: a) Bias in data

Explanation: AI systems can perpetuate biases present in the data they are trained on, leading to discrimination and unfair outcomes for specific demographic groups.

Question 13

Which action should an IT professional take if they encounter evidence of a data breach while conducting a security audit?

a) Notify law enforcement immediately

b) Preserve evidence and activity logs

c) Delete all compromised data

d) Report the breach to the media

Correct Answer: b) Preserve evidence and activity logs

Explanation: IT professionals must preserve all evidence and activity logs to ensure an accurate investigation and avoid tampering with critical information.

Question 14

Which law ensures that U.S. citizens have access to information and records from federal agencies?

a) Privacy Act

b) Freedom of Information Act (FOIA)

c) General Data Protection Regulation (GDPR)

d) USA PATRIOT Act

Correct Answer: b) Freedom of Information Act (FOIA)

Explanation: FOIA grants U.S. citizens the right to request and access information held by federal agencies, promoting transparency and accountability.

Question 15

A company allows users to opt out of data collection but continues to collect personal data after users exercise this right. Which ethical principle is being violated?

a) Transparency

b) Consent

c) Data accuracy

d) System security

Correct Answer: b) Consent

Explanation: Continuing to collect data after users have opted out violates the principle of informed consent, as users are not agreeing to further data collection.

Question 16

Which two factors contribute to ethical challenges associated with the rise of internet censorship?
(Select two)

a) Government surveillance

b) Transparency in data sharing

c) Totalitarian governments

d) Dependency on regional providers

Correct Answer: c) Totalitarian governments, d) Dependency on regional providers

Explanation: Internet censorship is often driven by totalitarian governments and the reliance on regional providers, which can limit access to free information and free speech.

Question 17

What is the primary concern when AI systems rely on outdated or incomplete training data?

a) Reduced system speed

b) Loss of system integrity

c) Skewed decision-making

d) Increased customer satisfaction

Correct Answer: c) Skewed decision-making

Explanation: AI systems trained on incomplete or outdated data may produce biased or inaccurate results, leading to skewed decision-making and unfair outcomes.

Question 18

A company is using encrypted data storage to protect customer information. Which aspect of the CIA triad does this practice represent?

a) Confidentiality

b) Integrity

c) Availability

d) Accountability

Correct Answer: a) Confidentiality

Explanation: Encrypting data ensures that unauthorized parties cannot access sensitive information, thereby maintaining the confidentiality of customer data.

Question 19

A developer publishes an app that collects user location data but fails to disclose this in the app’s privacy policy. Which regulation is likely violated?

a) Children’s Online Privacy Protection Act (COPPA)

b) General Data Protection Regulation (GDPR)

c) CAN-SPAM Act

d) Fair Credit Reporting Act

Correct Answer: b) General Data Protection Regulation (GDPR)

Explanation: GDPR requires companies to be transparent about the collection and use of personal data, including location information, ensuring users are fully informed.

Question 20

A company gathers competitive intelligence by analyzing publicly available data on its competitors. Which ethical principle should the company follow in this practice?

a) Transparency

b) Fairness

c) Consent

d) Responsibility

Correct Answer: b) Fairness

Explanation: When gathering competitive intelligence, the company must ensure fairness by using only legally obtained and publicly available data without infringing on competitors’ rights.

Complete the Captcha to view next question set.

Prev Post
WGU D333 Practice Exam Questions – Set 2 – Part 3
Next Post
WGU D333 Practice Exam Questions – Set 3 – Part 2