- web.groovymark@gmail.com
- November 19, 2024
Question 01
Which U.S. regulation governs the privacy and protection of personal health information in healthcare?
a) Sarbanes-Oxley Act
b) General Data Protection Regulation (GDPR)
c) Health Insurance Portability and Accountability Act (HIPAA)
d) Gramm-Leach-Bliley Act
Correct Answer: c) Health Insurance Portability and Accountability Act (HIPAA)
Explanation: HIPAA ensures the protection and privacy of individuals’ health information and sets standards for its handling in the healthcare industry.
Question 02
A manager promotes a bring-your-own-device (BYOD) policy in the company to improve productivity but doesn’t account for increased security risks. What are the two main consequences of this approach?
(Select two)
a) Lower employee morale
b) Increased vulnerability to data breaches
c) Higher IT infrastructure costs
d) Greater risk of lost or stolen devices
Correct Answer: b) Increased vulnerability to data breaches, d) Greater risk of lost or stolen devices
Explanation: While BYOD policies can enhance productivity, they increase the risk of data breaches and physical device loss, which may compromise security.
Question 03
Which cybersecurity attack is characterized by an attacker taking control of multiple devices to flood a target server with traffic, causing it to crash?
a) Phishing
b) Distributed Denial-of-Service (DDoS)
c) Ransomware
d) Rootkit
Correct Answer: b) Distributed Denial-of-Service (DDoS)
Explanation: A DDoS attack overwhelms a server by sending a massive amount of traffic from multiple sources, making the server inaccessible to legitimate users.
Question 04
Which ethical concern arises when AI is used to monitor employees’ work habits and productivity?
a) Data accuracy
b) Employee privacy
c) System performance
d) Algorithm bias
Correct Answer: b) Employee privacy
Explanation: Using AI to monitor employee work habits raises privacy concerns, especially if monitoring occurs without informed consent or transparency.
Question 05
A software developer misrepresents the capabilities of a new system to expedite a sale. What legal issue does this behavior raise?
a) Bribery
b) Intellectual property infringement
c) Misrepresentation
d) Copyright violation
Correct Answer: c) Misrepresentation
Explanation: Misrepresenting a product’s capabilities to secure a sale is legally considered misrepresentation and can lead to legal and financial penalties.
Question 06
Which ethical theory focuses on doing what is morally correct regardless of the outcome?
a) Utilitarianism
b) Deontology
c) Virtue ethics
d) Relativism
Correct Answer: b) Deontology
Explanation: Deontology focuses on duty and the morality of actions themselves, rather than their consequences, when determining whether an action is right or wrong.
Question 07
What is the primary objective of the Children’s Online Privacy Protection Act (COPPA)?
a) To prevent data breaches
b) To protect children’s privacy online
c) To ensure companies use encryption
d) To regulate copyright infringement
Correct Answer: b) To protect children’s privacy online
Explanation: COPPA ensures that websites collecting personal data from children under 13 comply with privacy protections and obtain parental consent.
Question 08
A software company faces penalties for failing to provide customers with a free annual credit report. Which regulation did the company violate?
a) Gramm-Leach-Bliley Act
b) Fair Credit Reporting Act
c) General Data Protection Regulation (GDPR)
d) CAN-SPAM Act
Correct Answer: b) Fair Credit Reporting Act
Explanation: The Fair Credit Reporting Act requires companies to provide consumers with free annual access to their credit reports to monitor and correct inaccuracies.
Question 09
Which type of malware disguises itself as a legitimate program but carries hidden malicious code?
a) Virus
b) Trojan horse
c) Worm
d) Rootkit
Correct Answer: b) Trojan horse
Explanation: A Trojan horse appears to be a legitimate software program but secretly contains malicious code that can compromise systems once executed.
Question 10
A manager requests that all employees’ emails be monitored to identify potential data leaks. Which ethical concern does this request raise?
a) System performance
b) Intellectual property rights
c) Employee privacy
d) Misuse of resources
Correct Answer: c) Employee privacy
Explanation: Monitoring employee emails without their knowledge or consent raises privacy concerns and may violate employee rights to confidentiality.
Question 11
A company wants to ensure its operations are environmentally friendly and socially responsible. Which business concept addresses these goals?
a) Intellectual property management
b) Corporate social responsibility (CSR)
c) Competitive intelligence
d) Strategic marketing
Correct Answer: b) Corporate social responsibility (CSR)
Explanation: CSR involves ensuring that companies act ethically, taking responsibility for their environmental and social impact.
Question 12
What ethical issue arises when a company uses AI algorithms that unintentionally discriminate against certain demographic groups?
a) Bias in data
b) Violation of privacy
c) System failure
d) Reduced productivity
Correct Answer: a) Bias in data
Explanation: AI systems can perpetuate biases present in the data they are trained on, leading to discrimination and unfair outcomes for specific demographic groups.
Question 13
Which action should an IT professional take if they encounter evidence of a data breach while conducting a security audit?
a) Notify law enforcement immediately
b) Preserve evidence and activity logs
c) Delete all compromised data
d) Report the breach to the media
Correct Answer: b) Preserve evidence and activity logs
Explanation: IT professionals must preserve all evidence and activity logs to ensure an accurate investigation and avoid tampering with critical information.
Question 14
Which law ensures that U.S. citizens have access to information and records from federal agencies?
a) Privacy Act
b) Freedom of Information Act (FOIA)
c) General Data Protection Regulation (GDPR)
d) USA PATRIOT Act
Correct Answer: b) Freedom of Information Act (FOIA)
Explanation: FOIA grants U.S. citizens the right to request and access information held by federal agencies, promoting transparency and accountability.
Question 15
A company allows users to opt out of data collection but continues to collect personal data after users exercise this right. Which ethical principle is being violated?
a) Transparency
b) Consent
c) Data accuracy
d) System security
Correct Answer: b) Consent
Explanation: Continuing to collect data after users have opted out violates the principle of informed consent, as users are not agreeing to further data collection.
Question 16
Which two factors contribute to ethical challenges associated with the rise of internet censorship?
(Select two)
a) Government surveillance
b) Transparency in data sharing
c) Totalitarian governments
d) Dependency on regional providers
Correct Answer: c) Totalitarian governments, d) Dependency on regional providers
Explanation: Internet censorship is often driven by totalitarian governments and the reliance on regional providers, which can limit access to free information and free speech.
Question 17
What is the primary concern when AI systems rely on outdated or incomplete training data?
a) Reduced system speed
b) Loss of system integrity
c) Skewed decision-making
d) Increased customer satisfaction
Correct Answer: c) Skewed decision-making
Explanation: AI systems trained on incomplete or outdated data may produce biased or inaccurate results, leading to skewed decision-making and unfair outcomes.
Question 18
A company is using encrypted data storage to protect customer information. Which aspect of the CIA triad does this practice represent?
a) Confidentiality
b) Integrity
c) Availability
d) Accountability
Correct Answer: a) Confidentiality
Explanation: Encrypting data ensures that unauthorized parties cannot access sensitive information, thereby maintaining the confidentiality of customer data.
Question 19
A developer publishes an app that collects user location data but fails to disclose this in the app’s privacy policy. Which regulation is likely violated?
a) Children’s Online Privacy Protection Act (COPPA)
b) General Data Protection Regulation (GDPR)
c) CAN-SPAM Act
d) Fair Credit Reporting Act
Correct Answer: b) General Data Protection Regulation (GDPR)
Explanation: GDPR requires companies to be transparent about the collection and use of personal data, including location information, ensuring users are fully informed.
Question 20
A company gathers competitive intelligence by analyzing publicly available data on its competitors. Which ethical principle should the company follow in this practice?
a) Transparency
b) Fairness
c) Consent
d) Responsibility
Correct Answer: b) Fairness
Explanation: When gathering competitive intelligence, the company must ensure fairness by using only legally obtained and publicly available data without infringing on competitors’ rights.