• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU - Introduction to IT - D322 Section 8 Review

Latest WGU Jan 15, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU - Introduction to IT - D322 Section 8 Review 5.0 (1 review) Students also studied Terms in this set (66) Western Governors UniversityD 322 Save

WGU D322

Teacher 489 terms iamvictor_udeh Preview D322 - Introduction to IT - Final Exa...129 terms Chris_Brantley9 Preview Intro to IT - WGU Section 2 Starter S...55 terms anna_striedel1 Preview WGU - 69 terms Atra Which regulation governs the actions of a company in the case of data records being compromised, lost, or stolen?Computer Matching and Primary Protection Act of 1988 Security Breach Notification laws The Electronic Communication Privacy Act of 1986 Digital Signature and Electronic Authorization laws Security Breach Notification laws What is part of the role of an IT professional association?Engages in best practices for information systems Provides professional standards for ethical behavior Writes laws dealing with information technology Engages in best practices for information systems Provides professional standards for ethical behavior What is not part of the role of an IT professional association?Engages in best practices for information systems Provides professional standards for ethical behavior Writes laws dealing with information technology Writes laws dealing with information technology How can an organization assist employees with the ethical use of information technology?By developing policies for information usage By monitoring network throughput By ensuring databases are backed up By establishing optimal server performance By developing policies for information usage

Computer SecurityFocuses on protecting data from unauthorized use and the exploitation of stolen data for profit.Computer EthicsMoral guidelines that govern the use of computers and information systems.Computer PrivacyFocuses on the use and governance of personal data, ensuring that it is collected, shared, and used appropriately.What does the acronym CIA stand for in cybersecurity?Central Intelligence Agency Confidentiality, integrity, and availability Confidentiality, intelligence, accessibility Cybersecurity, internet, accessibility Confidentiality, integrity, and availability Confidentiality [CIA triad]the rules that restrict access to only those who need to know.Integrity [CIA triad]Addresses the level of assurance that can be given as to how accurate and trustworthy data is.Availability [CIA triad]Data being available to the people who need it when they need it.Ways to enforce confidentiality- Implementing access controls

  • Training clients to identify and reduce security risks by doing the following:
  • Create strong password policies and Recognize social engineering attacks.Social Engineeringa general term that describes any attack that takes advantage of humans' trusting nature.Ways to maintain Integrity- file permissions

  • user access controls
  • version control
  • redundant systems or copies.
  • Ways to ensure availability- rigorously maintaining all hardware

  • testing compatibility with operating systems and installed applications
  • keeping systems patched and up-to-date.
  • Mei is buying equipment from an online retail site, and she finds that she is able to change the price of the equipment from $1,000 to $10.Which part of the CIA triad has been broken in this scenario?Confidentiality Availability Integrity None of the above Integrity

Mei is downloading payment details from the portal of an insurance company when the portal crashes. She is unable to continue the download of records.Which part of the CIA triad has been compromised in this scenario?Availability Confidentiality Integrity None of the above Availability Mei gets the company's phone service invoice in the mail.The bill was supposed to be for $800, but the receptionist spilled water on it and smeared the ink. The bill now asks for $80.Which part of the CIA triad has been compromised in this scenario?Confidentiality Integrity Availability None of the above Integrity conflict of interesta situation in which a person has two relationships that might be incompatible with each other.Organizations should provide clear outlines on how to handle conflicts of interest.true information privacythe right to control how your personal information is collected, used, and exchanged.1st commandment of computer ethicsThou shalt not use a computer to harm other people.2nd commandment of computer ethicsThou shalt not interfere with other people's computer work.3rd commandment of computer ethicsThou shalt not snoop around in other people's computer files.4th commandment of computer ethicsThou shalt not use a computer to steal.5th commandment of computer ethicsThou shalt not use a computer to bear false witness.6th commandment of computer ethicsThou shalt not copy or use proprietary software for which you have not paid.7th commandment of computer ethicsThou shalt not use other people's computer resources without authorization or proper compensation.8th commandment of computer ethicsThou shalt not appropriate other people's intellectual output.

9th commandment of computer ethicsThou shalt think about the social consequences of the program you are writing or the system you are designing.10th commandment of computer ethicsThou shalt always use a computer in ways that ensure consideration and respect for other humans.Asimov's Three Laws of Robotics1. A robot may not injure a human being or, through inaction, allow a human being to come to harm.

  • A robot must obey orders given it by human beings except where such orders
  • would conflict with the First Law.

  • A robot must protect its own existence as long as such protection does not
  • conflict with the First or Second Law.EPSRCEngineering and Physical Sciences Research Council - creates knowledge in engineering and physical sciences for UK capability to benefit society and the economy.AHRCArts and Humanities Research Council - funds outstanding original research across the whole range of the arts and humanities.Engineering and Physical Sciences Research Council (EPSRC) and the Arts and Humanities Research Council (AHRC) of Great Britain's set of five ethical "principles for

designers, builders and users or robots:"

  • Robots should not be designed solely or primarily to kill or harm humans.
  • Humans, not robots, are responsible agents. Robots are tools designed to
  • achieve human goals.

  • Robots should be designed in ways that assure their safety and security.
  • Robots are artifacts; they should not be designed to exploit vulnerable users by
  • evoking an emotional response or dependency. It should always be possible to tell a robot from a human.

  • It should always be possible to find out who is legally responsible for a robot.
  • IEEEInstitute of Electrical and Electronics Engineers. A professional organization that develops communications and network standards, among other activities.ACMAssociation for Computing Machinery Membership organization for computing professionals Provides resources Professional development Promotes policies and research for the benefit of society AUPAcceptable Use Policy - Rules or guidelines for the proper use of technology or digital devices within an organization.AITPAssociation of Information Technology Professionals - a professional association that focuses on information technology education for business professionals.Network TypesPersonal area network (PAN) local area network (LAN) wireless LAN (WLAN) metropolitan area network (MAN) virtual private network (VPN) wide area network (WAN) virtual LAN (VLAN) home network

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

I was amazed by the detailed explanations in this document. It made learning easy. Truly impressive!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 15, 2026
Description:

WGU - Introduction to IT - D322 Section 8 Review 5.0 (1 review) Students also studied Terms in this set Western Governors UniversityD 322 Save WGU D322 Teacher 489 terms iamvictor_udeh Preview D322...

Unlock Now
$ 11.00