{"id":130350,"date":"2023-12-13T06:51:23","date_gmt":"2023-12-13T06:51:23","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=130350"},"modified":"2023-12-13T06:51:24","modified_gmt":"2023-12-13T06:51:24","slug":"wgu-d333-pre-assessment-version-2-latest-2023-2024-update-ethics-in-technology-exam-questions-and-verified-answers-100-correct-grade-a","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/12\/13\/wgu-d333-pre-assessment-version-2-latest-2023-2024-update-ethics-in-technology-exam-questions-and-verified-answers-100-correct-grade-a\/","title":{"rendered":"WGU D333 Pre- Assessment Version 2 (Latest 2023\/ 2024 Update) Ethics in Technology Exam| Questions and Verified Answers| 100% Correct| Grade A"},"content":{"rendered":"\n<p>WGU D333 Pre- Assessment Version 2 (Latest 2023\/ 2024 Update) Ethics in Technology Exam| Questions and Verified Answers| 100% Correct| Grade A<\/p>\n\n\n\n<p>WGU D333 Pre- Assessment Version 2<br>(Latest 2023\/ 2024 Update) Ethics in<br>Technology Exam| Questions and Verified<br>Answers| 100% Correct| Grade A<br>Q: A new startup tech company plans to provide secure wireless access with- in its office for<br>employees and other trusted visitors. The company has con- cerns about competitors<br>eavesdropping or compromising the connections and obtaining unauthorized access to the<br>company&#8217;s intellectual property. The company is considering using Wireless Protected Access 2<br>(WPA2) to secure data in transit.<br>Which protocol does this wireless protection implement?<br>Answer:<br>Advanced Encryp- tion Standard (AES)<br>Q: A Federal Bureau of Investigation (FBI) agent monitors a telephone conver- sation between<br>a 12-year-old child and the child&#8217;s stepfather. The monitoring is part of a criminal investigation.<br>A warrant was not obtained prior to com- mencement of the monitoring.<br>Which law or regulation did the agent violate?<br>Answer:<br>Wiretap Act<br>Q: A U.S. company launched an e-commerce platform in the European Union (EU). The board<br>of directors raised concerns about compliance with applicable privacy regulations and the<br>collection of customer information.<br>Which regulation applies to this scenario?<br>Answer:<br>General Data Protection Regulation<\/p>\n\n\n\n<p>Q: A social media website collected personal information about consumers when they<br>subscribed to the service. Subscribers opted in or out before creating their online profiles.<br>Which European Union Data Protection Directive did the website follow?<br>Answer:<br>&#8211;<br>Choice<br>Q: A company is engaged as a third party to perform debt collection on behalf of a<br>telecommunications provider. The company operates an outbound call center to contact debtors<br>and set up payment arrangements. The company needs to ensure that the debtors&#8217; data privacy is<br>not at risk.<br>Which two areas should the company ensure are properly managed?<br>Answer:<br>Insider access\/Network security<br>Q: A company is using software to track workforce operational activity. Man- agement<br>communicates that the data collected will be treated as sensitive. Administrative and technical<br>security measures are put in place to protect employee data. These measures include periodically<br>culling records that are no longer relevant.<br>Which additional measure should be taken to safeguard employee data from misuse?<br>Answer:<br>Limit who can view employee data<br>Q: A retail company experiences a data breach. Customer data is stolen, including credit card<br>numbers, names, addresses, and account passwords. The attackers have amassed enough<br>combinations of personally identifiable information (PII) to commit identity theft.<br>Which adverse impacts, in addition to the loss of business, does the company face?<br>Answer:<br>Reputational damage and the need to provide support for victims<\/p>\n\n\n\n<p>Q: An attending physician at a local hospital receives an email with a link that appears to be<br>from a neighboring clinic. When the physician clicks the link, computers throughout the hospital<br>freeze, and patient information can no longer be accessed. A message appears demanding<br>payment of five bitcoins within 48 hours to decrypt the hospital database and threatening that<br>without payment, all information will be deleted.<br>Which type of exploit is this?<br>Answer:<br>Ransomware<br>Q: What is the cause of the rise in computer-related security issues, par- ticularly among smalland medium-sized businesses?<br>Answer:<br>Bring your own device policies<br>Q: A company is notified of a breach of its systems. An investigation reveals that although no<br>financial information was taken, the customer records for all its customers, including names,<br>email addresses, and passwords, may have been taken. Although it is uncertain whether the<br>records were taken, evidence suggests that the intruders accessed the database containing the<br>information. The investigation team indicates that, given six weeks, they will be able to identify<br>what, if anything, has been taken.<br>Which action should the company take?<br>Answer:<br>Notify all customers that there may have been a data breach<br>Q: A government contractor is rebuilding a telecommunications network. One of the<br>contractor&#8217;s employees discovers that the company is participating in illegal and unethical acts to<br>defraud the government. The employee considers<br>filing a lawsuit against the company on behalf of the government.<br>Which law protects the employee if the lawsuit is filed?<br>Answer:<br>False Claims Act<\/p>\n\n\n\n<p>Q: An organization enters customer information in different formats, styles, and varieties into a<br>database. Two customers placed an order on January 12,<br>2022, but one customer&#8217;s purchase date is entered as 01\/12\/22, whereas the other&#8217;s is entered as<br>12\/01\/22.<br>Which aspect of data could be negatively impacted by the format issue?<br>Answer:<br>Ac- curacy<br>Q: An organization is evaluating potential harm to its networks to ensure data is stored<br>accurately and securely from both internal and external threats.<br>What is the process the organization is following?<br>Answer:<br>Risk assessment<br>Q: A store manager of a home service company hires a data entry clerk to process customer<br>returns. The data entry clerk is trained to enter data in<br>the system for every customer record. An internal audit shows typographical mistakes in<br>customers&#8217; records for the last two weeks.<br>Which data aspect does the home service company need to address to reduce errors?<br>Answer:<br>Accuracy<br>Q: A patient visited a primary care doctor for headaches and was referred to a specialist clinic<br>that deals with neuroimaging. After visiting the specialist, the patient receives results that do not<br>seem to match their symptoms. After calling the clinic, the patient discovers that their electronic<br>health records (EHRs) from the primary care provider were mismatched with another patient&#8217;s<br>records when the patient visited the specialist.<br>What is the cause of the mismatch?<br>Answer:<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU D333 Pre- Assessment Version 2 (Latest 2023\/ 2024 Update) Ethics in Technology Exam| Questions and Verified Answers| 100% Correct| Grade A WGU D333 Pre- Assessment Version 2(Latest 2023\/ 2024 Update) Ethics inTechnology Exam| Questions and VerifiedAnswers| 100% Correct| Grade AQ: A new startup tech company plans to provide secure wireless access with- in its [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-130350","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/130350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=130350"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/130350\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=130350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=130350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=130350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}