WGU Ethics-In-Technology Exam (page: 2)
WGU Ethics In Technology QCO1
Updated on: 07-Feb-2026

To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?

  1. Unethical and legal
  2. Unethical and illegal
  3. Ethical and legal
  4. Ethical and Illegal

Answer(s): D

Explanation:

The intensive care specialist acts with good intent (saving the patient's life) but violates privacy laws in the process.

Why is this ethical?

The doctor prioritizes the patient's life and well-being, which aligns with the ethical principle of beneficence (doing good).

The action follows utilitarian ethics, where breaking a rule is justified if it results in a greater moral good (saving a life).

Why is this illegal?

Bypassing privacy protections (e.g., HIPAA, GDPR) violates legal and regulatory standards concerning patient data.

Medical institutions require proper authorization to access patient records, even in emergencies.

Why Not the Other Options?

A . Unethical and Legal: The action is not unethical because the intention is to save a life.

B . Unethical and Illegal: The action is illegal but not unethical, as it prioritizes the patient's survival.

C . Ethical and Legal: While ethical, privacy laws are still broken, making it illegal.

Thus, the correct answer is D. Ethical and Illegal, as the doctor acts ethically but violates privacy laws in the process.

Reference in Ethics in Technology:

Beauchamp, T., & Childress, J. (2019). Principles of Biomedical Ethics. Oxford University Press.

General Data Protection Regulation (GDPR) (2018).

Health Insurance Portability and Accountability Act (HIPAA) (1996).

Tavani, H. T. (2016). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing.



An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information.
Which ethical issue does this incident pose?

  1. Property
  2. Privacy
  3. Access
  4. Accuracy

Answer(s): B

Explanation:

The unauthorized change in the security key vault's database led to the disclosure of confidential information, which directly impacts privacy. Privacy concerns the protection of personal and sensitive information from unauthorized access, use, or exposure.

When confidential data is leaked, it violates fundamental principles of data privacy and security, raising ethical issues about how sensitive information is managed and protected.

Relevant Ethical Reference in Technology:

Privacy Ethics (Warren & Brandeis, 1890) ­ Defined privacy as "the right to be let alone."

Data Protection Regulations ­ GDPR (Europe), CCPA (California), and HIPAA (for health data) enforce ethical handling of personal information.

Confidentiality Principle in Cybersecurity ­ Ensuring only authorized access to sensitive information aligns with professional ethical standards (e.g., ACM Code of Ethics, IEEE Ethics Code).

Ethical Hacking & Incident Handling ­ Ethical frameworks emphasize preventing breaches that compromise privacy.

Thus, this incident primarily raises concerns about privacy, making option B the correct answer.



What is the first step in ethical decision-making for an IT professional?

  1. Choose an alternative
  2. Develop a problem statement
  3. Implement a solution
  4. Identify alternatives

Answer(s): B

Explanation:

The first step in ethical decision-making for IT professionals is to develop a problem statement, which involves clearly identifying and defining the ethical issue at hand. Before choosing solutions, an IT professional must fully understand the nature and scope of the problem.

Relevant Ethical Reference in Technology:

Ethical Decision-Making Models ­ Models like the Kidder Ethical Decision-Making Model and Rest's Four-Component Model emphasize problem identification as the first step.

ACM Code of Ethics ­ Encourages IT professionals to assess issues carefully before taking action.

Deontological Ethics (Kantian Ethics) ­ Ethical decisions require a clear understanding of duty and obligations, which begins with defining the problem.

Business & IT Governance (COBIT Framework) ­ Ethical IT management requires problem assessment before action.

Thus, the correct first step in ethical decision-making is B. Develop a problem statement



Which action can IT leaders take to encourage ethical behavior in their organizational culture?

  1. Include traditional criteria in employee appraisals
  2. Offer optional training for employees
  3. Establish a chief executive officer (CEO) position
  4. Conduct social audits and communicate goals

Answer(s): D

Explanation:

IT leaders can encourage ethical behavior by conducting social audits to evaluate the organization's ethical performance and then communicating clear goals for improvement.

A social audit is a structured evaluation of a company's ethical, social, and environmental impact, ensuring transparency and accountability. By sharing ethical goals, IT leaders create an organizational culture that values integrity and responsibility.

Relevant Ethical Reference in Technology:

Corporate Social Responsibility (CSR) ­ Ethical leadership requires accountability in areas like employee welfare, environmental impact, and digital ethics.

Stakeholder Theory (Freeman, 1984) ­ Ethical leadership involves transparency and engagement with employees, customers, and society.

IEEE and ACM Ethical Guidelines ­ Highlight the importance of corporate ethics policies and performance reviews.

Ethical IT Governance (ITIL & ISO 26000) ­ Emphasize corporate responsibility, ethical leadership, and transparency in IT decision-making.

Thus, conducting social audits and communicating ethical goals is the most effective way to promote an ethical culture.



A software development company's executive management team recently met to review its progress on ethical and social responsibility goals. After the review, the team planned a new set of goals for the upcoming year. The team shared the results of this review and the new goats with the employees and the board of directors.

Which process did the team complete?

  1. Establish code of ethics
  2. Model high ethical standards
  3. Deliver ethics training
  4. Conduct social audit

Answer(s): D

Explanation:

A social audit is the process of evaluating a company's ethical, social, and corporate responsibility performance. The executive team reviewed past ethical and social responsibility efforts, set new goals, and shared the results with employees and the board, which aligns directly with a social audit.

Relevant Ethical Reference in Technology:

Business Ethics and Corporate Accountability ­ Companies must evaluate their social and ethical impact to maintain ethical leadership.

Ethical IT Management (ISO 26000 & CSR Frameworks) ­ Businesses should regularly assess their ethical and social impact.

Transparency and Ethical Leadership ­ Sharing findings with employees and stakeholders promotes a culture of accountability.

IT and Digital Ethics ­ Ethical technology use involves regular review and reassessment of ethical commitments.

Since the company reviewed its ethical and social responsibility goals and communicated them, it completed a social audit (D is the correct answer).



A bank customer recently received a mailer from a third party affiliated with the customer's bank. The customer is concerned because the mailer includes information about the customer's remaining mortgage amount.

What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the customer to control this type of information?

  1. Financial privacy
  2. Pretexting
  3. Consumer protection
  4. Safeguards

Answer(s): A

Explanation:

The Gramm-Leach-Bliley Act (GLBA) is a (U.S. )federal law that governs the privacy and security of consumer financial information. It contains three key rules:

Financial Privacy Rule ­ Regulates how financial institutions collect and disclose personal financial information.

Safeguards Rule ­ Requires financial institutions to implement security programs to protect consumer data.

Pretexting Protection Rule ­ Prohibits deceptive attempts to obtain personal financial information.

In this case, the Financial Privacy Rule is relevant because it provides consumers with a way to control how their financial data is shared. This rule:

Requires financial institutions to provide privacy notices detailing how they collect, use, and share customer information.

Gives customers the right to opt-out of sharing certain types of financial information with third parties.

Since the customer is concerned about their mortgage details being shared, they can use the Financial Privacy Rule to control such disclosures.

Why Not the Other Options?

B . Pretexting ­ Involves identity theft or fraudulent attempts to access financial data, which is not relevant here.

C . Consumer Protection ­ A broad concept that does not specifically address financial data privacy.

D . Safeguards ­ Focuses on securing customer data from breaches, not on controlling data sharing.

Thus, the correct answer is A. Financial privacy as it directly addresses the customer's concern.

Reference in Ethics in Technology:

Gramm-Leach-Bliley Act (1999), 15 U.S.C. §§ 6801-6809.

Federal Trade Commission (FTC) Guide to the GLBA Financial Privacy Rule.

Solove, D. J. (2020). The Privacy Law Fundamentals. IAPP.



Which piece of legislation outlines who may access a person's credit data?

  1. Fair and Accurate Credit Transactions Act
  2. General Data Protection Regulation
  3. European Union Data Protection Directive
  4. Fair Credit Reporting Act

Answer(s): D

Explanation:

The Fair Credit Reporting Act (FCRA) is a (U.S. )law that regulates who can access a person's credit data and how credit reporting agencies handle consumer information.

Key Provisions of FCRA:

Limits access to credit reports to entities with a "permissible purpose" (e.g., lenders, employers, landlords).

Gives consumers the right to dispute inaccurate credit report information.

Mandates credit reporting agencies to ensure the accuracy and privacy of credit data.

Why Not the Other Options?

A . Fair and Accurate Credit Transactions Act (FACTA) ­ Amends FCRA but focuses more on preventing identity theft, not on access to credit data.

B . General Data Protection Regulation (GDPR) ­ A European law protecting personal data, but does not specifically regulate credit reporting.

C . European Union Data Protection Directive ­ The predecessor of GDPR, also unrelated to U.S.
credit laws.

Thus, the correct answer is D. Fair Credit Reporting Act (FCRA) as it governs access to credit data.

Reference in Ethics in Technology:

Fair Credit Reporting Act (1970), 15 U.S.C. § 1681.

Federal Trade Commission (FTC) Guide on FCRA.

Solove, D. J. (2019). Nothing to Hide: The False Tradeoff Between Privacy and Security.



What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?

  1. Opt-in
  2. Safeguard
  3. Opt-out
  4. Pretexting

Answer(s): C

Explanation:

The Financial Privacy Rule of the Gramm-Leach-Bliley Act (GLBA) allows consumers to control how their personal financial information is shared through an opt-out mechanism.

Why is "Opt-Out" a Threat to Data Privacy?

The opt-out model assumes that consumers consent to having their data shared unless they take action to refuse.

Many consumers may not be aware of their right to opt-out, leading to widespread data sharing without explicit consent.

This is less privacy-protective than an opt-in model, where consumers must actively give permission before their data is shared.

Why Not the Other Options?

A . Opt-in ­ This would enhance privacy, not threaten it.

B . Safeguard ­ Refers to data security, not data-sharing policies.

D . Pretexting ­ Involves fraudulent access to financial data, which is a different issue.

Thus, the correct answer is C. Opt-out, as it weakens consumer privacy protections by allowing data sharing unless the consumer takes action.

Reference in Ethics in Technology:

Gramm-Leach-Bliley Act (1999), 15 U.S.C. §§ 6801-6809.

Federal Trade Commission (FTC) Guide to GLBA Opt-Out Provisions.

Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life.



Viewing Page 2 of 10



Share your comments for WGU Ethics-In-Technology exam with other users:

DN 9/4/2023 11:19:00 PM

question 14 - run terraform import: this is the recommended best practice for bringing manually created or destroyed resources under terraform management. you use terraform import to associate an existing resource with a terraform resource configuration. this ensures that terraform is aware of the resource, and you can subsequently manage it with terraform.
Anonymous


Zhiguang 8/19/2023 11:37:00 PM

please upload dump. thanks in advance.
Anonymous


deedee 12/23/2023 5:51:00 PM

great great
UNITED STATES


Asad Khan 11/1/2023 3:10:00 AM

answer 16 should be b your organizational policies require you to use virtual machines directly
Anonymous


Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous


Luis 11/16/2023 1:39:00 PM

can anyone tell me if this is for rhel8 or rhel9?
UNITED STATES


hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous


Zuned 10/22/2023 4:39:00 AM

till 104 questions are free, lets see how it helps me in my exam today.
UNITED STATES


Muhammad Rawish Siddiqui 12/3/2023 12:11:00 PM

question # 56, answer is true not false.
SAUDI ARABIA


Amaresh Vashishtha 8/27/2023 1:33:00 AM

i would be requiring dumps to prepare for certification exam
Anonymous


Asad 9/8/2023 1:01:00 AM

very helpful
PAKISTAN


Blessious Phiri 8/13/2023 3:10:00 PM

control file is the heart of rman backup
Anonymous


Senthil 9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps
Anonymous


Harry 6/27/2023 7:20:00 AM

appriciate if you could upload this again
AUSTRALIA


Anonymous 7/10/2023 4:10:00 AM

please upload the dump
SWEDEN


Raja 6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update
UNITED STATES


Doora 11/30/2023 4:20:00 AM

nothing to mention
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES


Sonia 7/23/2023 4:03:00 PM

very helpfull
UNITED STATES


binEY 10/6/2023 5:15:00 AM

good questions
Anonymous


Neha 9/28/2023 1:58:00 PM

its helpful
Anonymous


Desmond 1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.
SINGAPORE


Davidson OZ 9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot
Anonymous


381 9/2/2023 4:31:00 PM

is question 1 correct?
Anonymous


Laurent 10/6/2023 5:09:00 PM

good content
Anonymous


Sniper69 5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.
UNITED STATES


Deepak 12/27/2023 2:37:00 AM

good questions
SINGAPORE


dba 9/23/2023 3:10:00 AM

can we please have the latest exam questions?
Anonymous


Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous


Berihun Desalegn Wonde 7/13/2023 11:00:00 AM

all questions are more important
Anonymous


gr 7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure
Anonymous