100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D333 Ethical Issues in Data $7.99   Add to cart

Exam (elaborations)

WGU D333 Ethical Issues in Data

 0 view  0 purchase
  • Course
  • Institution

WGU D333 Ethical Issues in Data

Preview 2 out of 5  pages

  • August 29, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU D333 Ethical Issues in Data
Corruption - ANS-A police department employee has access to data related to an ongoing
investigation. A local politician whom the employee supports has come under investigation. The
employee accesses the data relating to the investigation and provides the file to the politician
anonymously. How should this behavior be classified?

Layered Security - ANS-An IT manager implements security measures at the organization,
network, application, and employee levels. Which approach to security is the manager using?

AES (Advanced Encryption Standard) - ANS-A new startup tech company plans to provide
secure wireless access within its office for employees and other trusted visitors. The company
has concerns about competitors eavesdropping or compromising the connections and obtaining
unauthorized access to the company's intellectual property. The company is considering using
Wireless Protected Access 2 (WPA2) to secure data in transit. Which protocol does this wireless
protection implement?

Wiretap Act - ANS-A Federal Bureau of Investigation (FBI) agent monitors a telephone
conversation between a 12-year-old child and the child's stepfather. The monitoring is part of a
criminal investigation. A warrant was not obtained prior to commencement of the monitoring.
Which law or regulation did the agent violate?

General Data Protection Regulation (GDPR) - ANS-A U.S. company launched an e-commerce
platform in the European Union (EU). The board of directors raised concerns about compliance
with applicable privacy regulations and the collection of customer information. Which regulation
applies to this scenario?

Choice - ANS-A social media website collected personal information about consumers when
they subscribed to the service. Subscribers opted in or out before creating their online profiles.
Which European Union Data Protection Directive did the website follow?

Network Security // Insider Access - ANS-A company is engaged as a third party to perform debt
collection on behalf of a telecommunications provider. The company operates an outbound call
center to contact debtors and set up payment arrangements. The company needs to ensure that
the debtors' data privacy is not at risk. Which two areas should the company ensure are
properly managed?

Limit who can view employee data - ANS-A company is using software to track workforce
operational activity. Management communicates that the data collected will be treated as
sensitive. Administrative and technical security measures are put in place to protect employee
data. These measures include periodically culling records that are no longer relevant. Which
additional measure should be taken to safeguard employee data from misuse?

, Reputational damage and the need to provide support for victims. - ANS-A retail company
experiences a data breach. Customer data is stolen, including credit card numbers, names,
addresses, and account passwords. The attackers have amassed enough combinations of
personally identifiable information (PII) to commit identity theft. Which adverse impacts, in
addition to the loss of business, does the company face?

Ransomware - ANS-An attending physician at a local hospital receives an email with a link that
appears to be from a neighboring clinic. When the physician clicks the link, computers
throughout the hospital freeze, and patient information can no longer be accessed. A message
appears demanding payment of five bitcoins within 48 hours to decrypt the hospital database
and threatening that without payment, all information will be deleted. Which type of exploit is
this?

Bring Your Own Device (BYOD) Policies - ANS-What is the cause of the rise in
computer-related security issues, particularly among small- and medium-sized businesses?

Notify all customers that there may have been a data breach - ANS-A company is notified of a
breach of its systems. An investigation reveals that although no financial information was taken,
the customer records for all its customers, including names, email addresses, and passwords,
may have been taken. Although it is uncertain whether the records were taken, evidence
suggests that the intruders accessed the database containing the information. The investigation
team indicates that, given six weeks, they will be able to identify what, if anything, has been tak

False Claims Act - ANS-A government contractor is rebuilding a telecommunications network.
One of the contractor's employees discovers that the company is participating in illegal and
unethical acts to defraud the government. The employee considers filing a lawsuit against the
company on behalf of the government. Which law protects the employee if the lawsuit is filed?

Accuracy - ANS-An organization enters customer information in different formats, styles, and
varieties into a database. Two customers placed an order on January 12, 2022, but one
customer's purchase date is entered as 01/12/22, whereas the other's is entered as 12/01/22.
Which aspect of data could be negatively impacted by the format issue?

Risk Assessment - ANS-An organization is evaluating potential harm to its networks to ensure
data is stored accurately and securely from both internal and external threats. What is the
process the organization is following?

Accuracy - ANS-A store manager of a home service company hires a data entry clerk to process
customer returns. The data entry clerk is trained to enter data in the system for every customer
record. An internal audit shows typographical mistakes in customers' records for the last two
weeks. Which data aspect does the home service company need to address to reduce errors?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller topgradesdr. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart