Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A hospital is struggling with adverse patient outcomes caused by avoidable medication errors. Many of these errors are due to illegible writing by the prescribing physician or incomplete data (or the prescribed medication and dose.

Which technology system reduces these errors?

A.

Computerized provider order entry

B.

Health information exchange

C.

Electronic medical record

D.

Clinical decision support

Full Access
Question # 5

A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.

Which name describes this specialist?

A.

Black hat hacker

B.

While hat hacker

C.

Hacktivist

D.

Industrial spy

Full Access
Question # 6

Which organization licenses software developers who implement safety and health software in the United States?

A.

National Society of Professional Engineers

B.

Accreditation Board for Engineering and Technology

C.

American Society for Engineering Education

D.

National Council of Examiners for Engineering and Surveying

Full Access
Question # 7

A company struggles to maintain project schedules with its current resource capacity. With a new set of corporate goals and restrictions on full-time hires, the company is considering adding contingent workers to help fill the gap.

What is a disadvantage of using contingent workers to support the company's goals?

A.

Any skills gained during employment will be lost to the company at the project's completion.

B.

Internal business process understanding will be minimal given the temporary nature of the workers.

C.

The company may require the same worker tor other projects.

D.

The company does not have to provide benefits throughout the project's lifecycle.

Full Access
Question # 8

A company builds a new artificial intelligence (Al) system that helps address drug and alcohol use disorders by developing an individualized plan to support people withone of these disorders. The system developers load nationwide information from the last 20 years to provide a baseline for the Al to analyze. Upon activating the system, the company receives complaints about bias against minorities with a drug or alcohol use disorder.

What introduced bias into the system?

A.

Size disparity

B.

Skewed sample

C.

Proxy data

D.

Limited features

Full Access
Question # 9

An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.

What should this engineer do?

A.

Report the activities to the government

B.

Ask to be moved to a different activity

C.

Resign from their job

D.

Contact the local media

Full Access
Question # 10

An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?

A.

Property

B.

Privacy

C.

Access

D.

Accuracy

Full Access
Question # 11

A group of hackers manipulated data to disable the national energy infrastructure for its political goals. Which type of attack did the group employ?

A.

Advanced persistent threat

B.

Cyberterrorism

C.

Cyberespionage

D.

Trojan horse

Full Access
Question # 12

A company has used Its credit approval system for a long time. A risk evaluation director initiates an update of the data model to make sure it meets the highest ethical standards. Which Software Engineering Code of Ethics and Professional Practice principle does the director's action represent?

A.

Management

B.

Colleagues

C.

Self

D.

Judgment

Full Access
Question # 13

A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?

A.

Anonymous expression

B.

Doxing

C.

Hate speech

D.

Libel

Full Access
Question # 14

An organization is implementing a new computerized manufacturing system. The organization is concerned about proving the level of quality based on standards related to the system and associated processes.

Which International Organization for Standardization (ISO) standard certification should the organization seek to achieve this specific goal?

A.

9001

B.

14000

C.

8601

D.

27001

Full Access
Question # 15

A company needs to fill a specialized, long-term engineering role. The worker in this role needs to work on-site and use a company-provided laptop for security. The company's corporate code of ethics dictates that it should prioritize economic empowerment in its local community. The company has not been successful in sourcing local candidates.

Which type of worker should the company consider expanding its candtdate pool to include?

A.

H-1B

B.

Offshore

C.

Gig

D.

Freelance

Full Access
Question # 16

A company wants to improve its chances of winning business with a prospective client. The company sends an expensive watch to the home address of each of the client's directors. Which ethical issue is the company engaging in?

A.

Fraud

B.

Conflict of interest

C.

Bribery

D.

Misrepresentation

Full Access
Question # 17

A large telecommunications company pledged to adopt green computing in everything it does. The telecommunications company hired a consulting firm to help it evaluate, compare, and select supplies based on standard eco-friendly criteria.

What should the consulting firm use to help achieve this goal?

A.

Electronic Product Environmental Assessment Tool (EPEAT).

B.

Environmental impact assessment (EIA).

C.

Professional employer organization (PEO)

D.

Restriction of Hazardous Substances Directive (RoHS)

Full Access
Question # 18

An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.

Which doctrine covers the company's employment and reproduction of these materials?

A.

Safe harbor

B.

First sale

C.

Derivative work

D.

Fair use

Full Access
Question # 19

What is a Gramm-Leach-BIiley Act (GLBA) financial privacy rule that presents a threat to data privacy?

A.

Opt-in

B.

Safeguard

C.

Opt-out

D.

Pretexting

Full Access