OA Exams

  • web.groovymark@gmail.com
  • December 26, 2024

Question 21

A company uses deceptive marketing to lure customers into buying a product that does not meet advertised standards. What ethical issue does this practice raise?

a) Data privacy

b) Lack of transparency

c) Misrepresentation

d) Conflict of interest

Correct Answer: c) Misrepresentation

Explanation: Misrepresentation occurs when false or misleading information is provided, in this case, by advertising a product that fails to meet the claimed standards.

Question 22

Which legal framework regulates the transfer of personal data from the European Union to non-EU countries?

a) USA Freedom Act

b) Gramm-Leach-Bliley Act (GLBA)

c) General Data Protection Regulation (GDPR)

d) Foreign Intelligence Surveillance Act (FISA)

Correct Answer: c) General Data Protection Regulation (GDPR)

Explanation: GDPR regulates the transfer of personal data outside the EU, ensuring that such data is adequately protected in non-EU countries.

Question 23

Which type of cyberattack involves sending a large volume of traffic to a target system to overwhelm and disable it?

a) Phishing

b) Spear phishing

c) Distributed Denial of Service (DDoS) attack

d) Smishing

Correct Answer: c) Distributed Denial of Service (DDoS) attack

Explanation: A DDoS attack floods a target system with traffic, overwhelming its resources and causing it to become unavailable to legitimate users.

Question 24

What is the primary function of a firewall in network security?

a) To encrypt sensitive data

b) To prevent unauthorized access to a network

c) To monitor user activity on the network

d) To improve system performance

Correct Answer: b) To prevent unauthorized access to a network

Explanation: A firewall acts as a barrier between a trusted internal network and untrusted external networks, preventing unauthorized access while allowing legitimate communication.

Question 25

Which type of intellectual property protection is primarily used to distinguish a company’s products from competitors’?

a) Patent

b) Copyright

c) Trademark

d) Trade secret

Correct Answer: c) Trademark

Explanation: A trademark protects distinctive logos, names, or symbols that distinguish a company’s products from those of its competitors, helping to establish brand identity.

Question 26

Which law governs the protection of consumers’ financial data in the United States?

a) Health Insurance Portability and Accountability Act (HIPAA)

b) Family Educational Rights and Privacy Act (FERPA)

c) Gramm-Leach-Bliley Act (GLBA)

d) Children’s Internet Protection Act (CIPA)

Correct Answer: c) Gramm-Leach-Bliley Act (GLBA)

Explanation: The Gramm-Leach-Bliley Act (GLBA) regulates how financial institutions collect, share, and protect consumers’ personal financial information.

Question 27

What ethical issue arises when a company tracks a user’s online behavior without obtaining their explicit consent?

a) Intellectual property theft

b) Lack of transparency

c) Conflict of interest

d) Breach of duty

Correct Answer: b) Lack of transparency

Explanation: Tracking users' online behavior without their consent violates the principle of transparency, as users should be informed about how their data is collected and used.

Question 28

A hacker gains administrative access to a company’s network without the owner’s knowledge. What type of malware is this most likely associated with?

a) Virus

b) Rootkit

c) Worm

d) Logic bomb

Correct Answer: b) Rootkit

Explanation: A rootkit is a type of malware that allows attackers to gain administrator-level access to a system without detection, making it difficult to identify and remove.

Question 29

Which ethical framework asserts that moral judgments are subjective and depend on individual or cultural viewpoints?

a) Utilitarianism

b) Deontology

c) Virtue ethics

d) Relativism

Correct Answer: d) Relativism

Explanation: Relativism holds that moral judgments are based on individual or cultural perspectives, meaning that there is no absolute standard of right or wrong.

Question 30

Which law protects the privacy of student educational records in the United States?

a) Health Insurance Portability and Accountability Act (HIPAA)

b) Family Educational Rights and Privacy Act (FERPA)

c) General Data Protection Regulation (GDPR)

·d) USA Freedom Act

Correct Answer: b) Family Educational Rights and Privacy Act (FERPA)

Explanation: FERPA provides students and their parents with rights regarding the privacy and accuracy of educational records maintained by educational institutions.

Question 31

Which ethical challenge is associated with the widespread use of artificial intelligence (AI) in decision-making processes?

a) Increased system performance

b) Algorithmic bias

c) Data transparency

d) Lack of accountability

Correct Answer: b) Algorithmic bias

Explanation: Algorithmic bias is a significant ethical concern in AI, as it can lead to unfair or discriminatory outcomes based on biased training data or flawed algorithms.

Question 32

A company chooses not to implement security patches on its systems to avoid downtime. Which type of risk management strategy is this?

a) Mitigation

b) Transference

c) Avoidance

d) Acceptance

Correct Answer: d) Acceptance

Explanation: Risk acceptance occurs when a company decides to accept the potential risks associated with not addressing a vulnerability, often due to cost or operational concerns.

Question 33

Which form of digital communication is most vulnerable to smishing attacks?

a) Email

b) Social media posts

c) Text messages

d) Online forums

Correct Answer: c) Text messages

Explanation: Smishing is a type of phishing attack that uses text messages to deceive individuals into providing sensitive information, such as passwords or financial details.

Question 34

What is the primary function of a digital signature in secure communications?

a) To encrypt the message

b) To provide non-repudiation

c) To improve system performance

d) To manage system access

Correct Answer: b) To provide non-repudiation

Explanation: A digital signature ensures non-repudiation by verifying the identity of the sender and ensuring that the message cannot be denied after being sent.

Question 35

A software developer inflates their resume to claim expertise in areas where they lack experience. What ethical issue does this represent?

a) Conflict of interest

b) Misrepresentation

c) Data integrity

d) Intellectual property theft

Correct Answer: b) Misrepresentation

Explanation: Inflating a resume is an example of misrepresentation, as it involves providing false information to gain a position or advantage.

Question 36

Which ethical principle is violated when a company tracks user behavior online without their knowledge or consent?

a) Data availability

b) Transparency

c) Integrity

d) Accountability

Correct Answer: b) Transparency

Explanation: Tracking user behavior without their knowledge or consent violates the principle of transparency, as users should be informed about how their data is collected and used.

Question 37

A company prioritizes data integrity over other security measures. Which aspect of the CIA triad is being emphasized?

a) Availability

b) Confidentiality

c) Integrity

d) Accountability

Correct Answer: c) Integrity

Explanation: Data integrity ensures that information remains accurate and unaltered, preventing unauthorized changes to critical data during storage or transmission.

Question 38

Which law provides legal protections for trade secrets in the U.S.?

a) Fair Credit Reporting Act

b) Defend Trade Secrets Act

c) Gramm-Leach-Bliley Act

d) Communications Decency Act

Correct Answer: b) Defend Trade Secrets Act

Explanation: The Defend Trade Secrets Act provides federal protection for trade secrets in the U.S., allowing companies to pursue civil remedies for trade secret misappropriation.

Question 39

Which type of malicious code executes its payload when triggered by a specific event or time?

a) Trojan horse

b) Logic bomb

c) Worm

d) Virus

Correct Answer: b) Logic bomb

Explanation: A logic bomb is a type of malicious code that is programmed to execute when triggered by a specific event, such as a particular date or system activity.

Question 40

What is the purpose of the Children’s Internet Protection Act (CIPA)?

a) To regulate online advertising

b) To protect minors from harmful online content

c) To enforce intellectual property rights

d) To enhance data encryption

Correct Answer: b) To protect minors from harmful online content

Explanation: CIPA requires schools and libraries that receive federal funding to implement measures that protect minors from accessing harmful content on the internet.

Complete the Captcha to view next question set.

Prev Post
WGU D333 Practice Exam Questions – Set 5 – Part 1
Next Post
WGU D333 Practice Exam Questions – Set 5 – Part 3