Q: 1
An organization decides to provide its employees with additional parental leave benefits that exceed
legal requirements. Which concept is the organization acting on to support employees?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
A software company continues to refine and update the predictive algorithm that makes its product
the market leader. Although the company announces some changes, most are unannounced so that
people and businesses remain unaware.
What is this company protecting?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Employee A works as a developer for a software company. Their sibling is also a developer at a
competitor company. Both companies are working on a similar application. The sibling's company
struggles to get a feature to work, so the sibling copies the source code for the relevant sections of
the application from Employee A's laptop after it was left unattended.
How should this behavior be classified?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
A hacker attacked an organization's server to obtain the health records of a specific employee. The
hacker posts the information online as an act of revenge. Which attack did the hacker perform?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
To gain access to the electronic health record of a critically injured patient, an intensive care
specialist decided to circumvent privacy policies to save the patient Which decision-ma king process
guided the action of the specialist?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is
up-to-date on all relevant patches and updates. The installed antivirus software has not identified
any malicious code. During the investigation, the worker discovers that an attacker compromised the
system, even though the worker did not engage in any behavior that could have introduced a virus or
other external malicious software into the computer.
Which method of attack was used to compromise the worker's machine?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
A data scientist selects publicly available demographic data from a limited group of familiar zip codes
when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
A bank customer recently received a mailer from a third party affiliated with the customer's bank.
The customer is concerned because the mailer includes information about the customer's remaining
mortgage amount.
What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the
customer to control this type of information?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use
disorders by developing an individualized plan to support people with one of these disorders. The
system developers load nationwide information from the last 20 years to provide a baseline for the
Al to analyze. Upon activating the system, the company receives complaints about bias against
minorities with a drug or alcohol use disorder.
What introduced bias into the system?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
A malicious hacker takes over several computers via the internet and causes them to flood a target
site with high volumes of data queries and other small tasks. Which type of attack is the hacker
performing against the target site?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2