View Mode
Q: 1
An organization decides to provide its employees with additional parental leave benefits that exceed legal requirements. Which concept is the organization acting on to support employees?
Options
Q: 2
A software company continues to refine and update the predictive algorithm that makes its product the market leader. Although the company announces some changes, most are unannounced so that people and businesses remain unaware. What is this company protecting?
Options
Q: 3
Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended. How should this behavior be classified?
Options
Q: 4
A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?
Options
Q: 5
To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?
Options
Q: 6
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer. Which method of attack was used to compromise the worker's machine?
Options
Q: 7
A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.
Options
Q: 8
A bank customer recently received a mailer from a third party affiliated with the customer's bank. The customer is concerned because the mailer includes information about the customer's remaining mortgage amount. What is a rule or provision of the Gramm-Leach-Bliley Act (GLBA) that provides a process for the customer to control this type of information?
Options
Q: 9
A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people with one of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder. What introduced bias into the system?
Options
Q: 10
A malicious hacker takes over several computers via the internet and causes them to flood a target site with high volumes of data queries and other small tasks. Which type of attack is the hacker performing against the target site?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE