WGU Ethics-In-Technology Exam (page: 2)
WGU Ethics In Technology QCO1
Updated on: 24-Mar-2026

To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?

  1. Unethical and legal
  2. Unethical and illegal
  3. Ethical and legal
  4. Ethical and Illegal

Answer(s): D

Explanation:

The intensive care specialist acts with good intent (saving the patient's life) but violates privacy laws in the process.

Why is this ethical?

The doctor prioritizes the patient's life and well-being, which aligns with the ethical principle of beneficence (doing good).

The action follows utilitarian ethics, where breaking a rule is justified if it results in a greater moral good (saving a life).

Why is this illegal?

Bypassing privacy protections (e.g., HIPAA, GDPR) violates legal and regulatory standards concerning patient data.

Medical institutions require proper authorization to access patient records, even in emergencies.

Why Not the Other Options?

A . Unethical and Legal: The action is not unethical because the intention is to save a life.

B . Unethical and Illegal: The action is illegal but not unethical, as it prioritizes the patient's survival.

C . Ethical and Legal: While ethical, privacy laws are still broken, making it illegal.

Thus, the correct answer is D. Ethical and Illegal, as the doctor acts ethically but violates privacy laws in the process.

Reference in Ethics in Technology:

Beauchamp, T., & Childress, J. (2019). Principles of Biomedical Ethics. Oxford University Press.

General Data Protection Regulation (GDPR) (2018).

Health Insurance Portability and Accountability Act (HIPAA) (1996).

Tavani, H. T. (2016). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing.



An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information.
Which ethical issue does this incident pose?

  1. Property
  2. Privacy
  3. Access
  4. Accuracy

Answer(s): B

Explanation:

The unauthorized change in the security key vault's database led to the disclosure of confidential information, which directly impacts privacy. Privacy concerns the protection of personal and sensitive information from unauthorized access, use, or exposure.

When confidential data is leaked, it violates fundamental principles of data privacy and security, raising ethical issues about how sensitive information is managed and protected.

Relevant Ethical Reference in Technology:

Privacy Ethics (Warren & Brandeis, 1890) ­ Defined privacy as "the right to be let alone."

Data Protection Regulations ­ GDPR (Europe), CCPA (California), and HIPAA (for health data) enforce ethical handling of personal information.

Confidentiality Principle in Cybersecurity ­ Ensuring only authorized access to sensitive information aligns with professional ethical standards (e.g., ACM Code of Ethics, IEEE Ethics Code).

Ethical Hacking & Incident Handling ­ Ethical frameworks emphasize preventing breaches that compromise privacy.

Thus, this incident primarily raises concerns about privacy, making option B the correct answer.



What is the first step in ethical decision-making for an IT professional?

  1. Choose an alternative
  2. Develop a problem statement
  3. Implement a solution
  4. Identify alternatives

Answer(s): B

Explanation:

The first step in ethical decision-making for IT professionals is to develop a problem statement, which involves clearly identifying and defining the ethical issue at hand. Before choosing solutions, an IT professional must fully understand the nature and scope of the problem.

Relevant Ethical Reference in Technology:

Ethical Decision-Making Models ­ Models like the Kidder Ethical Decision-Making Model and Rest's Four-Component Model emphasize problem identification as the first step.

ACM Code of Ethics ­ Encourages IT professionals to assess issues carefully before taking action.

Deontological Ethics (Kantian Ethics) ­ Ethical decisions require a clear understanding of duty and obligations, which begins with defining the problem.

Business & IT Governance (COBIT Framework) ­ Ethical IT management requires problem assessment before action.

Thus, the correct first step in ethical decision-making is B. Develop a problem statement



Which action can IT leaders take to encourage ethical behavior in their organizational culture?

  1. Include traditional criteria in employee appraisals
  2. Offer optional training for employees
  3. Establish a chief executive officer (CEO) position
  4. Conduct social audits and communicate goals

Answer(s): D

Explanation:

IT leaders can encourage ethical behavior by conducting social audits to evaluate the organization's ethical performance and then communicating clear goals for improvement.

A social audit is a structured evaluation of a company's ethical, social, and environmental impact, ensuring transparency and accountability. By sharing ethical goals, IT leaders create an organizational culture that values integrity and responsibility.

Relevant Ethical Reference in Technology:

Corporate Social Responsibility (CSR) ­ Ethical leadership requires accountability in areas like employee welfare, environmental impact, and digital ethics.

Stakeholder Theory (Freeman, 1984) ­ Ethical leadership involves transparency and engagement with employees, customers, and society.

IEEE and ACM Ethical Guidelines ­ Highlight the importance of corporate ethics policies and performance reviews.

Ethical IT Governance (ITIL & ISO 26000) ­ Emphasize corporate responsibility, ethical leadership, and transparency in IT decision-making.

Thus, conducting social audits and communicating ethical goals is the most effective way to promote an ethical culture.



A software development company's executive management team recently met to review its progress on ethical and social responsibility goals. After the review, the team planned a new set of goals for the upcoming year. The team shared the results of this review and the new goats with the employees and the board of directors.

Which process did the team complete?

  1. Establish code of ethics
  2. Model high ethical standards
  3. Deliver ethics training
  4. Conduct social audit

Answer(s): D

Explanation:

A social audit is the process of evaluating a company's ethical, social, and corporate responsibility performance. The executive team reviewed past ethical and social responsibility efforts, set new goals, and shared the results with employees and the board, which aligns directly with a social audit.

Relevant Ethical Reference in Technology:

Business Ethics and Corporate Accountability ­ Companies must evaluate their social and ethical impact to maintain ethical leadership.

Ethical IT Management (ISO 26000 & CSR Frameworks) ­ Businesses should regularly assess their ethical and social impact.

Transparency and Ethical Leadership ­ Sharing findings with employees and stakeholders promotes a culture of accountability.

IT and Digital Ethics ­ Ethical technology use involves regular review and reassessment of ethical commitments.

Since the company reviewed its ethical and social responsibility goals and communicated them, it completed a social audit (D is the correct answer).



A bank customer recently received a mailer from a third party affiliated with the customer's bank. The customer is concerned because the mailer includes information about the customer's remaining mortgage amount.

What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the customer to control this type of information?

  1. Financial privacy
  2. Pretexting
  3. Consumer protection
  4. Safeguards

Answer(s): A

Explanation:

The Gramm-Leach-Bliley Act (GLBA) is a (U.S. )federal law that governs the privacy and security of consumer financial information. It contains three key rules:

Financial Privacy Rule ­ Regulates how financial institutions collect and disclose personal financial information.

Safeguards Rule ­ Requires financial institutions to implement security programs to protect consumer data.

Pretexting Protection Rule ­ Prohibits deceptive attempts to obtain personal financial information.

In this case, the Financial Privacy Rule is relevant because it provides consumers with a way to control how their financial data is shared. This rule:

Requires financial institutions to provide privacy notices detailing how they collect, use, and share customer information.

Gives customers the right to opt-out of sharing certain types of financial information with third parties.

Since the customer is concerned about their mortgage details being shared, they can use the Financial Privacy Rule to control such disclosures.

Why Not the Other Options?

B . Pretexting ­ Involves identity theft or fraudulent attempts to access financial data, which is not relevant here.

C . Consumer Protection ­ A broad concept that does not specifically address financial data privacy.

D . Safeguards ­ Focuses on securing customer data from breaches, not on controlling data sharing.

Thus, the correct answer is A. Financial privacy as it directly addresses the customer's concern.

Reference in Ethics in Technology:

Gramm-Leach-Bliley Act (1999), 15 U.S.C. §§ 6801-6809.

Federal Trade Commission (FTC) Guide to the GLBA Financial Privacy Rule.

Solove, D. J. (2020). The Privacy Law Fundamentals. IAPP.



Which piece of legislation outlines who may access a person's credit data?

  1. Fair and Accurate Credit Transactions Act
  2. General Data Protection Regulation
  3. European Union Data Protection Directive
  4. Fair Credit Reporting Act

Answer(s): D

Explanation:

The Fair Credit Reporting Act (FCRA) is a (U.S. )law that regulates who can access a person's credit data and how credit reporting agencies handle consumer information.

Key Provisions of FCRA:

Limits access to credit reports to entities with a "permissible purpose" (e.g., lenders, employers, landlords).

Gives consumers the right to dispute inaccurate credit report information.

Mandates credit reporting agencies to ensure the accuracy and privacy of credit data.

Why Not the Other Options?

A . Fair and Accurate Credit Transactions Act (FACTA) ­ Amends FCRA but focuses more on preventing identity theft, not on access to credit data.

B . General Data Protection Regulation (GDPR) ­ A European law protecting personal data, but does not specifically regulate credit reporting.

C . European Union Data Protection Directive ­ The predecessor of GDPR, also unrelated to U.S.
credit laws.

Thus, the correct answer is D. Fair Credit Reporting Act (FCRA) as it governs access to credit data.

Reference in Ethics in Technology:

Fair Credit Reporting Act (1970), 15 U.S.C. § 1681.

Federal Trade Commission (FTC) Guide on FCRA.

Solove, D. J. (2019). Nothing to Hide: The False Tradeoff Between Privacy and Security.



What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?

  1. Opt-in
  2. Safeguard
  3. Opt-out
  4. Pretexting

Answer(s): C

Explanation:

The Financial Privacy Rule of the Gramm-Leach-Bliley Act (GLBA) allows consumers to control how their personal financial information is shared through an opt-out mechanism.

Why is "Opt-Out" a Threat to Data Privacy?

The opt-out model assumes that consumers consent to having their data shared unless they take action to refuse.

Many consumers may not be aware of their right to opt-out, leading to widespread data sharing without explicit consent.

This is less privacy-protective than an opt-in model, where consumers must actively give permission before their data is shared.

Why Not the Other Options?

A . Opt-in ­ This would enhance privacy, not threaten it.

B . Safeguard ­ Refers to data security, not data-sharing policies.

D . Pretexting ­ Involves fraudulent access to financial data, which is a different issue.

Thus, the correct answer is C. Opt-out, as it weakens consumer privacy protections by allowing data sharing unless the consumer takes action.

Reference in Ethics in Technology:

Gramm-Leach-Bliley Act (1999), 15 U.S.C. §§ 6801-6809.

Federal Trade Commission (FTC) Guide to GLBA Opt-Out Provisions.

Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life.



Viewing Page 2 of 10



Share your comments for WGU Ethics-In-Technology exam with other users:

NanoTek3 6/13/2022 10:44:00 PM

by far this is the most accurate exam dumps i have ever purchased. all questions are in the exam. i saw almost 90% of the questions word by word.
UNITED STATES


eriy 11/9/2023 5:12:00 AM

i cleared the az-104 exam by scoring 930/1000 on the exam. it was all possible due to this platform as it provides premium quality service. thank you!
UNITED STATES


Muhammad Rawish Siddiqui 12/8/2023 8:12:00 PM

question # 232: accessibility, privacy, and innovation are not data quality dimensions.
SAUDI ARABIA


Venkat 12/27/2023 9:04:00 AM

looks wrong answer for 443 question, please check and update
Anonymous


Varun 10/29/2023 9:11:00 PM

great question
Anonymous


Doc 10/29/2023 9:36:00 PM

question: a user wants to start a recruiting posting job posting. what must occur before the posting process can begin? 3 ans: comment- option e is incorrect reason: as part of enablement steps, sap recommends that to be able to post jobs to a job board, a user need to have the correct permission and secondly, be associated with one posting profile at minimum
UNITED KINGDOM


It‘s not A 9/17/2023 5:31:00 PM

answer to question 72 is d [sys_user_role]
Anonymous


indira m 8/14/2023 12:15:00 PM

please provide the pdf
UNITED STATES


ribrahim 8/1/2023 6:05:00 AM

hey guys, just to let you all know that i cleared my 312-38 today within 1 hr with 100 questions and passed. thank you so much brain-dumps.net all the questions that ive studied in this dump came out exactly the same word for word "verbatim". you rock brain-dumps.net!!! section name total score gained score network perimeter protection 16 11 incident response 10 8 enterprise virtual, cloud, and wireless network protection 12 8 application and data protection 13 10 network défense management 10 9 endpoint protection 15 12 incident d
SINGAPORE


Andrew 8/23/2023 6:02:00 PM

very helpful
Anonymous


latha 9/7/2023 8:14:00 AM

useful questions
GERMANY


ibrahim 11/9/2023 7:57:00 AM

page :20 https://exam-dumps.com/snowflake/free-cof-c02-braindumps.html?p=20#collapse_453 q 74: true or false: pipes can be suspended and resumed. true. desc.: pausing or resuming pipes in addition to the pipe owner, a role that has the following minimum permissions can pause or resume the pipe https://docs.snowflake.com/en/user-guide/data-load-snowpipe-intro
FINLAND


Franklin Allagoa 7/5/2023 5:16:00 AM

i want hcia exam dumps
Anonymous


SSA 12/24/2023 1:18:00 PM

good training
Anonymous


BK 8/11/2023 12:23:00 PM

very useful
INDIA


Deepika Narayanan 7/13/2023 11:05:00 PM

yes need this exam dumps
Anonymous


Blessious Phiri 8/15/2023 3:31:00 PM

these questions are a great eye opener
Anonymous


Jagdesh 9/8/2023 8:17:00 AM

thank you for providing these questions and answers. they helped me pass my exam. you guys are great.
CANADA


TS 7/18/2023 3:32:00 PM

good knowledge
Anonymous


Asad Khan 11/1/2023 2:44:00 AM

answer 10 should be a because only a new project will be created & the organization is the same.
Anonymous


Raj 9/12/2023 3:49:00 PM

can you please upload the dump again
UNITED STATES


Christian Klein 6/23/2023 1:32:00 PM

is it legit questions from sap certifications ?
UNITED STATES


anonymous 1/12/2024 3:34:00 PM

question 16 should be b (changing the connector settings on the monitor) pc and monitor were powered on. the lights on the pc are on indicating power. the monitor is showing an error text indicating that it is receiving power too. this is a clear sign of having the wrong input selected on the monitor. thus, the "connector setting" needs to be switched from hdmi to display port on the monitor so it receives the signal from the pc, or the other way around (display port to hdmi).
UNITED STATES


NSPK 1/18/2024 10:26:00 AM

q 10. ans is d (in the target org: open deployment settings, click edit next to the source org. select allow inbound changes and save
Anonymous


mohamed abdo 9/1/2023 4:59:00 AM

very useful
Anonymous


Tom 3/18/2022 8:00:00 PM

i purchased this exam dumps from another website with way more questions but they were all invalid and outdate. this exam dumps was right to the point and all from recent exam. it was a hard pass.
UNITED KINGDOM


Edrick GOP 10/24/2023 6:00:00 AM

it was a good experience and i got 90% in the 200-901 exam.
Anonymous


anonymous 8/10/2023 2:28:00 AM

hi please upload this
Anonymous


Bakir 7/6/2023 7:24:00 AM

please upload it
UNITED KINGDOM


Aman 6/18/2023 1:27:00 PM

really need this dump. can you please help.
UNITED KINGDOM


Neela Para 1/8/2024 6:39:00 PM

really good and covers many areas explaining the answer.
NEW ZEALAND


Karan Patel 8/15/2023 12:51:00 AM

yes, can you please upload the exam?
UNITED STATES


NISHAD 11/7/2023 11:28:00 AM

how many questions are there in these dumps?
UNITED STATES


Pankaj 7/3/2023 3:57:00 AM

hi team, please upload this , i need it.
UNITED STATES