OA Exams

  • web.groovymark@gmail.com
  • December 26, 2024

Question 01

Which regulation mandates schools and libraries to implement filters to block inappropriate content for minors accessing the internet?

a) Children’s Online Privacy Protection Act (COPPA)

b) Health Insurance Portability and Accountability Act (HIPAA)

c) Children’s Internet Protection Act (CIPA)

d) CAN-SPAM Act

Correct Answer: c) Children’s Internet Protection Act (CIPA)

Explanation: CIPA requires schools and libraries receiving federal funding to install internet filters to protect minors from accessing harmful or inappropriate content online.

Question 02

Which ethical concern arises when an IT worker prioritizes personal gain over the company’s or client’s interest?

a) Conflict of interest

b) Data integrity

c) Intellectual property theft

d) Lack of transparency

Correct Answer: a) Conflict of interest

Explanation: Conflict of interest occurs when an IT worker’s personal interest conflicts with the interests of the company or client, leading to biased or unethical decision-making.

Question 03

What is the primary purpose of the Communications Assistance for Law Enforcement Act (CALEA)?

a) To allow law enforcement to monitor electronic communications with proper authorization

b) To protect online privacy through encryption

c) To regulate corporate information-sharing practices

d) To require cybersecurity audits for major corporations

Correct Answer: a) To allow law enforcement to monitor electronic communications with proper authorization

Explanation: CALEA mandates that telecommunications companies build in technical capabilities to allow law enforcement to intercept electronic communications when authorized by a court.

Question 04

Which ethical framework focuses on maximizing the greatest good for the greatest number of people?

a) Deontology

b) Virtue ethics

c) Utilitarianism

d) Relativism

Correct Answer: c) Utilitarianism

Explanation: Utilitarianism is a consequentialist ethical theory that evaluates actions based on their outcomes, focusing on maximizing overall happiness or benefit.

Question 05

A company decides to implement machine learning for customer profiling but fails to obtain consent from customers. Which data privacy principle has been violated?

a) Accountability

b) Transparency

c) User consent

d) Data accuracy

Correct Answer: c) User consent

Explanation: Collecting data without obtaining user consent violates the principle that users must agree to how their personal information is collected and used.

Question 06

Which organization is known for setting industry standards and providing certification in the field of cybersecurity?

a) SIIA

b) CompTIA

c) ACM

d) SANS

Correct Answer: d) SANS

Explanation: The SANS Institute provides training, certification, and research in the field of cybersecurity, helping professionals stay up-to-date on security best practices.

Question 07

Which type of intellectual property protection can be used to protect the source code of a new software program?

a) Utility patent

b) Copyright

c) Trademark

d) Design patent

Correct Answer: b) Copyright

Explanation: Copyright law protects original works of authorship, including software code, by giving the creator exclusive rights to use, modify, and distribute their work.

Question 08

A developer intentionally writes malicious code into a program that activates on a specific date. What type of malware is this?

a) Virus

b) Trojan horse

c) Logic bomb

d) Worm

Correct Answer: c) Logic bomb

Explanation: A logic bomb is a piece of malicious code programmed to execute a harmful action when triggered by a specific condition or event, such as a date.

Question 09

Which law requires companies in the European Union to follow strict guidelines for the protection and processing of personal data?

a) General Data Protection Regulation (GDPR)

b) Communications Assistance for Law Enforcement Act (CALEA)

c) Children’s Online Privacy Protection Act (COPPA)

d) USA Freedom Act

Correct Answer: a) General Data Protection Regulation (GDPR)

Explanation: GDPR enforces strict guidelines for the collection, use, and storage of personal data within the EU, and applies to companies that handle EU residents' data.

Question 10

A company uses customer data without consent to target ads more effectively. What ethical issue does this practice raise?

a) Data integrity

b) Lack of transparency

c) Breach of duty

d) Misrepresentation

Correct Answer: b) Lack of transparency

Explanation: Lack of transparency arises when organizations use customer data for purposes not disclosed to or agreed upon by the users, creating ethical and privacy concerns.

Question 11

A company fails to encrypt sensitive financial data, leading to unauthorized access. Which regulation has likely been violated?

a) Gramm-Leach-Bliley Act (GLBA)

b) Health Insurance Portability and Accountability Act (HIPAA)

c) Children’s Internet Protection Act (CIPA)

d) CAN-SPAM Act

Correct Answer: a) Gramm-Leach-Bliley Act (GLBA)

Explanation: The Gramm-Leach-Bliley Act requires financial institutions to safeguard sensitive data, including implementing encryption to prevent unauthorized access to personal information.

Question 12

Which ethical theory focuses on fulfilling moral duties regardless of the outcomes?

a) Consequentialism

b) Utilitarianism

c) Deontology

d) Relativism

Correct Answer: c) Deontology

Explanation: Deontology emphasizes that actions are morally right if they follow established moral duties or rules, regardless of the outcomes or consequences of the action.

Question 13

What is the primary function of the CAN-SPAM Act?

a) To regulate the use of encryption in electronic communications

b) To protect personal financial information from unauthorized access

c) To limit the ability of companies to send unsolicited commercial emails

d) To enforce privacy protections for health records

Correct Answer: c) To limit the ability of companies to send unsolicited commercial emails

Explanation: The CAN-SPAM Act regulates the sending of unsolicited commercial emails, requiring senders to include opt-out mechanisms and accurate sender information.

Question 14

A manager asks an employee to engage in unethical behavior to meet a tight project deadline. Which ethical issue does this create?

a) Conflict of interest

b) Data privacy

c) Lack of accountability

d) Breach of duty

Correct Answer: d) Breach of duty

Explanation: Breach of duty occurs when an individual fails to fulfill their ethical obligations, such as asking someone to compromise ethical standards to meet a business goal.

Question 15

A company allows employees to access the company network remotely, but fails to implement two-factor authentication. What risk does this create?

a) Reduced system performance

b) Increased security vulnerabilities

c) Misrepresentation

d) Intellectual property theft

Correct Answer: b) Increased security vulnerabilities

Explanation: Remote access without two-factor authentication increases the risk of unauthorized access, as additional layers of security are needed to verify user identities.

Question 16

What is the ethical issue raised when a company reverse engineers a competitor’s software to gain a competitive advantage?

a) Breach of duty

b) Conflict of interest

c) Intellectual property theft

d) Lack of transparency

Correct Answer: c) Intellectual property theft

Explanation: Reverse engineering a competitor's software without permission can violate intellectual property laws, raising both ethical and legal concerns.

Question 17

A company uses its internal system to monitor employee emails without informing them. What ethical issue does this practice raise?

a) Lack of transparency

b) Misrepresentation

c) Conflict of interest

d) Data integrity

Correct Answer: a) Lack of transparency

Explanation: Monitoring employees without their knowledge or consent violates transparency principles and can lead to mistrust, as individuals have the right to know how their communications are monitored.

Question 18

Which type of malware disguises itself as a legitimate program in order to gain access to a system?

a) Virus

b) Trojan horse

c) Worm

d) Rootkit

Correct Answer: b) Trojan horse

Explanation: A Trojan horse is a type of malware that masquerades as a legitimate application to trick users into granting access to their systems.

Question 19

A healthcare organization allows unauthorized access to patient records due to insufficient encryption. Which law has likely been violated?

a) Family Educational Rights and Privacy Act (FERPA)

b) Health Insurance Portability and Accountability Act (HIPAA)

c) General Data Protection Regulation (GDPR)

d) Children’s Online Privacy Protection Act (COPPA)

Correct Answer: b) Health Insurance Portability and Accountability Act (HIPAA)

Explanation: HIPAA requires healthcare organizations to protect patient information, including using encryption to prevent unauthorized access to health records.

Question 20

What is the main ethical concern with using biased data sets to train an AI system?

a) Lack of transparency

b) Algorithmic bias

c) Misrepresentation

d) Intellectual property theft

Correct Answer: b) Algorithmic bias

Explanation: Algorithmic bias occurs when an AI system is trained on biased or unrepresentative data, resulting in unfair or discriminatory outcomes.

Complete the Captcha to view next question set.

Prev Post
WGU D365 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D333 Practice Exam Questions – Set 5 – Part 2