Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 19 questions
Exam Code: Ethics-In-Technology                Update: Oct 3, 2025
Exam Name: WGU Ethics In Technology QCO1

WGU WGU Ethics In Technology QCO1 Ethics-In-Technology Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.

Which law has the nurse violated?

A.

Electronic Communications Privacy Act (ECPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Gramm-Leach-Bliley Act (GLBA)

D.

Children's Online Privacy Protection Act (COPPA)

Question # 2

An organization is concerned about its cybersecurity after identifying unauthorized records in its payroll database. The organization hires a consultant to test its cyberdefenses. The consultant executes several test attacks on the organization's software and successfully demonstrates that by using Structured Query Language (SOL) injection, the consultant can add rows to the payroll database without obtaining the proper permissions.

Which hacker classification does the consultant fall under?

A.

Cybercriminal

B.

White hat hacker

C.

Cyberterrorist

D.

Black hat hacker

Question # 3

A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.

A.

Privacy violation

B.

Predictive coding

C.

Proxy discrimination

D.

Small sample size

Question # 4

A company wants to improve its chances of winning business with a prospective client. The company sends an expensive watch to the home address of each of the client's directors. Which ethical issue is the company engaging in?

A.

Fraud

B.

Conflict of interest

C.

Bribery

D.

Misrepresentation

Question # 5

A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team's moral character.

Which ethical theory does this represent?

A.

Deontology

B.

Virtue

C.

Consequentialism

D.

Relativism

Question # 6

A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.

Which ethical theory does this approach represent?

A.

Deontology

B.

Relativism

C.

Virtue

D.

Consequentialism

Question # 7

A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.

Which method of attack was used to compromise the worker's machine?

A.

Blended threat

B.

Trojan horse

C.

Spear phishing

D.

Zero-day exploit

Question # 8

An organization gathers data using various technologies to optimize sales processes for its current and prospective customers. The data consists of demographic, geographic, and behavioral customer changes.

Which data collection method is the organization using?

A.

Advanced surveillance

B.

Electronic discovery

C.

Workplace monitoring

D.

Consumer profiling

Question # 9

Which principle, according to the Organisation for Economic Co-operation and Development's (OECD) privacy guidelines, states that people have the right to review their data, challenge its correctness, and have incorrect data changed?

A.

Individual participation

B.

Purpose specification

C.

Use limitation

D.

Security safeguard

Question # 10

An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.

Which doctrine covers the company's employment and reproduction of these materials?

A.

Safe harbor

B.

First sale

C.

Derivative work

D.

Fair use

Page: 1 / 2
Total 19 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 03 Oct 2025