ITE302c

Ace your homework & exams now with Quizwiz!

As a result of failing to communicate ethical risks, the organization's reputation suffers and customers are less confident in the organization. What direct impact can this have? a. The products or services the organization creates will have less of an impact in the marketplace. b. Morale amongst internal personnel will drop, as will productivity. c. Customers will find it more difficult to use your products and services. d. The organization will be more likely to draw the attention of legal and regulatory auditors.

a

Based upon studies from conducted by accredited certification bodies and the Lumina Foundation, which of the following is true regarding professionals who hold industry validated certifications? a. They have greater potential to earn higher salaries than peers without professional certifications. b. They are statistically shown to have greater intelligence than their peers without professional certifications. c. They demonstrate higher productivity than peers without professional certifications. d. They are more likely to be employed by enterprise level organizations.

a

How can persona modeling be used to identify potential biases in a machine learning model? a. The persona may represent groups of people that could be susceptible to bias. b. The persona may identify noise and other edge cases that lead to bias. c. The persona may reveal overfitting issues in a model that result from bias. d. The persona may show that specific users are a source of bias.

a

How can sentiment analysis be useful in social media communication? a. It can classify customers as loyal or disloyal, helping you target customers differently in your communications. b. It can determine which users have the largest influence on your reputation, and therefore which users you should communicate with. c. It can shape the content and delivery of the message based on users' perceptions of the organization or technology. d. It can determine how to construct a message that influences users to be more positive about the organization or technology.

a

How do AI and other data-driven technologies use probability? a. By providing a model of belief about the likelihood of some event happening b. By estimating the likelihood of some event happening without input data c. By guaranteeing that some event will occur with 100% likelihood d. By determining the objective likelihood of some event happening

a

How does a smart contract differ from a traditional contract? a. Smart contracts eliminate the need for a central authority. b. Smart contracts serve a different purpose than traditional contracts. c. Smart contracts guarantee that all parties are anonymous. d. Smart contracts are more effective than traditional contracts.

a

In which of the following could STRIDE or VAST classifications be applied? a. Threat modeling or analysis tools b. Network optimization tools c. Bias mitigation techniques d. Black box mitigation methods

a

The endorsement of which of the following types of stakeholder is most critical when developing mission and vision statements? 1 / 1 point a. Employees b. Department heads c. C-suite executives d. Customers

a

Upon successful completion of your exam, which of the following actions can you take to share your certification with employers and peers? a. Post your Accredible-issued badge on social platforms such as LinkedIn. b. Display your Coursera Professional Certificate on social platforms such as LinkedIn. c. Forward the email notification from Pearson VUE that you receive upon passing the exam to your employer. d. Share a screenshot from the end of the exam showing that you passed.

a

What does "ethics by design" mean? a. An approach in which ethics is considered from the initial design stage. b. A reference to the framework set forth by IEEE's Ethically Aligned Design. c. A reference to one of the tenets of engineering activism. d. A creative design approach as the focus for ethics.

a

What does the acronym RACI stand for? a. Responsible, Accountable, Consulted, Informed b. Responsible, Accessible, Consulted, Improvised c. Relatable, Agreeable, Commendable, Irascible d. Redesignable, Accessible, Collected, Informative

a

What is the difference between beneficence and non-maleficence? a. Beneficence refers to "do only good" and non-maleficence refers to "do no harm." b. Non-maleficence refers only to malevolent artificial general intelligence (AGI), while beneficence can refer to any "good" emerging technology. c. Beneficence is a less important goal for the field of AI than non-maleficence. d. Beneficence and non-maleficence are quite similar and often interchangeable.

a

Which of the following Python tools is designed to integrate with Google's Cloud AI platform? a. What-If b. LIME c. SHAP d. ELI5

a

Which of the following are included in an exam blueprint? a. The length of the exam b. Practice questions c. How to schedule your exam d. Time and date of your exam

a

Which of the following best describes a marketing persona? a. A description of a type of character based upon demographics, habits, and interests b. The emotional impression that a customer has about a product or category of goods c. A character that encapsulates a brand's personality d. An individual who assists with the activity of marketing

a

Which of the following best describes the use case for zero-knowledge protocols (ZKPs)? a. Proving that something exists, but not the specifics b. Handling divide-by-zero errors in computing software c. Choosing what to do when you have zero knowledge of a subject d. Being made aware of when the battery in a product is past its zero point

a

Which of the following defines the AI black box problem? a. The challenge of understanding the inner workings of opaque systems b. Machine intelligence making something illusory, like pulling a rabbit from a hat c. Not being able to know how something crashed or failed d. A dangerous machine intelligence put in a digital prison

a

Which of the following describes automation bias? a. Bias of people towards overly trusting in automation. b. Bias enabled or perpetuated by machine learning. c. Bias that is subconscious, committed during a state of automata. d. Bias against automation by people worried about their jobs.

a

Which of the following describes extrajudicial judgment? a. A ruling or scoring made outside of a court. b. Unusual interpretation of law outside of its typical meaning. c. Transferring defendants from one jurisdiction to another for trial. d. Applying law from one jurisdiction within another.

a

Which of the following describes the concept of liability? a. The legal responsibility for one's actions. b. Taking ownership of an assigned task. c. The moral duty one has to take action. d. Answering for one's actions to an authority figure.

a

Which of the following explains why efficiency can sometimes incur systemic fragility? a. Efficiency benefits may lead to complex second-order costs b. Increased efficiency tends to create cost savings c. High-efficiency machines often require more maintenance d. Increased efficiency tends to compound over time

a

Which of the following helps to ensure that internal and external ethics policies are adhered to in practice? a. Having unambiguous procedures tied to the clauses of the policy. b. Developing procedures first and then creating policies that reflect those procedures. c. Including detailed legalese in the policy that mirrors regulatory requirements. d. Ensuring the policies have ample room for flexibility in implementation.

a

Which of the following is a key element of communications with internal and external stakeholders regarding an organization's ethics policies? a. Simple to follow examples b. Flexible verbiage c. Dense procedural descriptions d. Daily communications

a

Which of the following is a noted difference between a certificate and a certification? a. Certifications are issued by industry certification bodies. b. Certifications are granted upon completion of a course. c. Certifications can be accredited. d. Certifications cannot be revoked.

a

Which of the following is a potential benefit of having an ethical organizational culture? a. Employees will feel a sense of responsibility and loyalty. b. Employees are more likely to listen to their superiors. c. More employees are likely to switch careers. d. The company will get an increase in stock value.

a

Which of the following is a useful strategy when communicating the truth about a crisis becomes difficult? a. Put all of the information out there at once b. Provide information gradually, over multiple communications c. Promise to provide information at a later date d. Tell some truths, but withhold others

a

Which of the following is an effort to turn black box AI models into models whose decisions are easier to understand? a. Explainable AI b. Self-learning models c. Neural networks d. Human-in-the-loop

a

Which of the following is an essential asset that helps to operationalize the internal and external ethics policies via procedures? a. Concrete examples that show how the policies work in practice. b. A detailed report that presents the various scenarios using technical jargon. c. A description of the procedures in the annual report of the organization. d. A designated ethics lead who is solely responsible for the implementation of said procedures.

a

Which of the following is an important concept to consider as part of building an organizational philosophy? a. Anticipating future implications of that philosophy b. Considering internal stakeholder needs above all else c. Adopting philosophies already created by other organizations d. Putting ethical principles into practice

a

Which of the following is the generally agreed upon current state of the art of AI? a. Narrow AI b. Superintelligence c. Perceptrons d. Strong AI

a

Which of the following is the most important argument in favor of content moderation in online platforms? a. It prevents the spread of disinformation that can cause harm to vulnerable populations. b. It helps uphold freedom of expression for everyone and doesn't give anyone special rights. c. It prevents the development of monopolies in terms of content creators. d. It creates adequate incentives for everyone to share their opinions.

a

Which of the following principles are most commonly cited in AI-based ethical frameworks? a. Transparency and explainability b. Human control and autonomy c. Happiness and spiritual contentment d. Fairness and non-discrimination

a

Why are environmental concerns important to consider in the ethical development of data-driven technologies? 1 / 1 point a. Data-driven technologies can cause secondary, indirect, or cumulative effects on the environment that might impact people in the long term. b. Data-driven technologies directly impact living things via displacement. c. Data-driven technologies directly impact the environment through the invasive mining of resources to create the technologies. d. Data-driven technologies directly impact the environment through pollution.

a

Why do smart toys raise additional ethical concerns over those that are raised in the course of other products and services that use AI? a. Children are more susceptible to manipulation and therefore need extra protective measures. b. They are used in the privacy of homes rather than in public settings, like other products or services. c. The smart toys store personal data on the device, which can be stolen. d. It is difficult to obtain informed consent for the use of the smart toy.

a

Why is corporate governance important when thinking about ethical considerations for the development of data-driven technologies? a. It provides an accountability framework for stakeholders of the organization to prevent ethical violations. b. It binds the employees in a moral code that limits the kind of actions they can engage in. c. It helps the organization have a document to point towards in case an ethical violation occurs. d. It helps the organization showcase to its customers that it has ethical guidelines.

a

Why is it important to engage stakeholders at the beginning of the ethical risk management process? a. It demonstrates that the organization is committed to accountability and transparency in their data-driven systems. b. It proves that you are completely equipped to address any ethical risks in your data-driven systems. c. It helps the organization avoid legal trouble during the development and deployment of data-driven systems. d. It lets stakeholders know that the organization cannot address ethical risks in data-driven systems without input from stakeholders first

a

Why is it important to leverage legacy media like print, television, and radio, rather than just digital media? a. Not everyone has access to digital media platforms b. Digital media platforms are seen as less respectable or trustworthy c. It is easier to disseminate a message through legacy media channels d. Legacy media channels are more effective at broadcasting a message

a

Your business handles the personal data of California residents. Which of the following regulations would enable a resident to request that their data be deleted from your company's files? a. CCPA b. COPPA c. PCI DSS d. OECD Privacy Guidelines

a

Your organization has developed an AI system that recommends treatments for hospital patients. Some questions have been raised about the ethics of how these treatments are determined. What applied ethics domain do these concerns fall under? a. Bioethics b. Environmental ethics c. Business ethics d. Engineering ethics

a

Which of the following activities are important to conduct in a post-crisis phase? (Select two.) a. Communicating information about the crisis with stakeholders b. Discussing lessons learned during the crisis c. Restructuring the response team for future crises d. Performing a vulnerability audit of all affected systems

a, b

Which of the following are consequences of saying that someone or something has moral agency? (Select two.) a. The moral agent is capable of determining right and wrong. b. The moral agent can be held responsible for their actions. c. The moral agent follows a deontological code of ethics. d. The moral agent acts in a morally correct manner.

a, b

Which of the following are examples of how AI can limit human autonomy? (Select two.) a. Weapon systems can limit human autonomy as humans may not have decision-making capability or understand the decision making. b. AI systems might impact certain vulnerable groups such as the elderly and children differently than the rest of the population, which could limit those groups' autonomy. c. AI systems can assist individuals with automated, repetitive, or dangerous tasks. d. AI systems can perform tasks that humans cannot, such as processing millions of data records in a matter of seconds.

a, b

Which of the following are important factors to consider when developing a media campaign? (Select two.) a. The environment in which the campaign will be launched b. The time-sensitive nature of communication in the campaign c. The effect the campaign has on the organization's bottom line d. The risks that will be talked about in the campaign

a, b

Which of the following are likely benefits of having defined organizational policies? (Select two.) a. It supports accountability and makes it more explicit. b. It supports consistency of behavior and unification of culture. c. It supports improved sales and marketing results. d. It supports profitable research innovations and intellectual property.

a, b

Which of the following are tools of an effective media communication plan? (Select two.) a. Press release b. Video briefing c. Mission statement d. Public education campaign

a, b

Which of the following does the Brazilian General Data Protection Act (LGPD) mandate? (Select two.) a. Data protection officers b. Data protection impact assessments c. Data protection audits d. Data protection analysts

a, b

Which of the following elements are important aspects of ethical integrity with regards to data? (Select two.) a. If the holders of data are trustworthy entities. b. Whether the data was gathered in an ethical manner. c. What type of data (audio, visual, etc.) is being collected and/or utilized. d. If the data is commercially viable or monetarily valuable.

a, b

Which of the following practices can help an organization prepare to uphold business continuity in the event of a crisis? (Select two.) a. Performing a business impact assessment (BIA) b. Rehearsing business continuity tasks c. Informing external stakeholders of suspected incidents d. Evaluating the effects that the crisis has on the business

a, b

How can you identify potential areas of concern for ethical practices when developing a code of ethics? (Select three). a. Obtain feedback from stakeholder focus groups. b. Research similar organization's ethical mistakes and concerns. c. Identify prior issues with your product or service. d. Rely on your own personal experiences. e. Rely on the requirements of government regulations.

a, b, c

Which of the following tools can be used to prepare for a certification exam? a. Summative assessments in Coursera preparatory course. b. The domain domains and objectives in the exam blueprint. c. Instructor-led or self-paced courses in the exam domains.

a, b, c

How can confirmation bias impact us socially? (Select two.) a. It can lead to groupthink, which can in turn halt forward progress. b. It can lead to a diverse set of friends. c. It can impede socio-political cooperation. d. It can prevent us from being social with other people.

a, c

Which of the following are possible causes of the limited adoption of a code of ethics within an organization? (Select two). a. Lack of awareness of the code of ethics and where it is meant to be applied b. Comprehensive coverage of areas of concerns by the code of ethics c. Lack of clarity in the code of ethics d. Prescriptive language used in the code of ethics

a, c

Which of the following are prerequisites for high-level digital security and trust mechanisms? (Select two.) a. Authentication b. Kindness c. Authorization d. Reputation

a, c

Which of the following are requirements set forth by the Biometric Information Privacy Act (BIPA)? (Select two.) a. Organizations must destroy biometric data in a timely fashion. b. Organizations must not transmit biometric data across an unsecured network like the Internet. c. Organizations must obtain consent from individuals regarding the collection and use of biometric data. d. Organizations must store biometric data in local, on-premises databases.

a, c

Which of the following are ways that regulations differ from ethical frameworks? (Select two.) a. Regulations provide a clear basis for potential litigation. b. Regulations are often industry led. c. Regulations have legal enforcement behind them. d. Regulations are flexible in their implementation.

a, c

Which of the following are ways to participate in engineering activism? (Select two.) a. Follow a code of ethics. b. Perform all tasks required of you. c. Engage with the public. d. Follow ethics by design

a, c

Which of the following benefits can be gained from establishing baseline system behaviors? (Select two.) a. Tracking deviance from norms b. Optimizing costs of operation c. Restoring compromised functionality through a system rollback d. Holding employees more accountable

a, c

Which of the following elements might be considered moderately affected in an Impact Level 2 Algorithmic Impact Assessment? (Select two.) a. The health and well-being of individuals or communities. b. A brief delay in the conveyance of a commercial transaction. c. The rights of individuals or communities. d. A loss of life resulting from specific circumstances.

a, c

Which of the following statements are correct about a variable that is normally distributed? (Select two.) a. The mean, median, and mode of all measurements is the same, and all are located at the center of the distribution. b. Less than half of all measurements fall within one standard deviation of the mean. c. The variable's distribution, when graphed, exhibits a symmetrical bell shape. d. The tails of a normal distribution are denser than the center.

a, c

Which of the following are actions that can help combat implicit bias? (Select three.) a. Cultivating awareness of your own biases. b. Surrounding yourself with others who have similar experiences. c. Interacting with diverse groups of people. d. Obtaining your information from the same one or two media sources that your family and friends access. e. Exposing yourself to "counter-stereotypical" examples.

a, c, e

Management asks someone to do a data-related task. Which of the following would likely be ethically problematic? (Select two.) a. Delete any erroneous data. b. Change data to another format. c. Aggregate data together d. Manipulate data or alter its interpretation.

a, d

Which of the following are important aspects of resolving complex and confounding business pressures? (Select two.) a. Engaging with multiple stakeholders to understand their particular needs b. Prioritizing ethical and safety concerns over business desires in all cases and situations c. Assuring everyone that their desires can be accommodated without compromise d. Managing expectations that not everyone can get what they want, when they want it

a, d

Which of the following are important ethical elements to safeguard within ethical AI systems? (Select two.) a. Transparency and explainability, balanced with privacy. b. Performance and optimization. c. The number of layers, tensors, or parameters used in a model. d. Accountability and management of bias.

a, d

Which of the following are important qualities of a press release? (Select two.) a. It's in a digital format b. It's non-interactive c. It's delivered on a single platform d. It's concise

a, d

Which of the following are likely examples of a leverageable third party data-driven or data-related product? (Select two.) a. Data annotation and augmentation tools b. Management oversight c. Product design lifecycle d. Compiled models

a, d

Which of the following are possible benefits of a human-in-the-loop (HITL) architecture? (Select two.) a. Balancing the negative effects of an AI system on people with the effects on environments and objects b. Eliminating the potential for human error in decision making c. Improving the speed of autonomous decision making d. Mitigating excessive scope or potential collateral damage

a, d

Which of the following are reasons to design, develop, and deploy a code of ethics within an organization? (Select two). a. It compels employees to operate in an ethical and integral manner. b. It prevents regulatory scrutiny of the organization's practices. c. It lets external stakeholders know that you are an ethical company. d. It creates consistency in the ethical practices across the organization, rather than patchy implementation of the practices.

a, d

Which of the following are useful strategies for communicating ethical risks to society? (Select two.) a. Ensure communication policies are diverse, inclusive, and equitable b. Provide access to information on a need-to-know basis c. Limit the flow of information to one direction: organization to public d. Be culturally sensitive and culturally aware during communication

a, d

Which of the following are valid concerns regarding electronic personalities? (Select two.) a. That they would create unfair advantages, as not everyone has access to the same rights. b. That individuals would start applying for electronic personalities. c. That they will make it more difficult to access information. d. That they would absolve manufacturers of liability.

a, d

Which of the following describe a process of cross-correlation of data? (Select two.) a. Discovering new information via inference b. Comparing people of different demographic groups c. Analysing an individual's emotional stimulus and response patterns d. Comparing multiple data points or sets

a, d

Which of the following describe aspects of secondary data usage that might increase ethical risks? (Select two.) a. Additional organizations and processors may now have access to the data b. Secondary data may be more expensive c. Encryption of data makes it harder to process d. Data applied to secondary purposes may expose private aspects or diminish personal dignity

a, d

Which of the following describe corporate hegemony? (Select two.) a. Consolidating interests through mergers and acquisitions b. Making multiple investments in a similar space to improve the outcomes of success c. Spending large sums on corporate branding and marketing d. Locking out smaller players, leading to monopolies or cartels

a, d

Which of the following provide a user with more meaningful choices regarding how their data is being used? (Select two.) a. Opt-out/opt-in mechanisms b. Whether the data is used by a person of a certain gender c. The format that the data is stored in d. Granular or modular control over data usage

a, d

Which of the following refer to legal regulations or industry frameworks for protecting data? (Select two.) a. HIPAA b. ISO 9000 c. CE mark d. NIST Privacy Framework

a, d

You plan on streamlining your company's product experience, but you also want to uphold the agency and autonomy of your users. Which of the following actions would uphold these principles? (Select two.) a. Respecting the right of the user to choose and customize their experiences b. Enabling government agencies to have a personalized interface with software c. Applying machine intelligence to simulate customer behavior d. Refraining from guiding users into something they didn't wish for or intend

a, d

Which of the following are tasks in the overall risk management process? (Select three.) a. Analysis b. Elimination c. Deployment d. Mitigation e. Identification

a, d, e

A disruptive user on a social media site is subjected to a shadow ban. Which of the following might be an indication of that shadow ban? a. A user logs in one day to find that they have been asked to discontinue their disruptive behavior, or they will be banned. b. A user logs in one day to find that they are able to post, but receive no direct responses. c. A user logs in one day to find that their posting privileges have been revoked. d. A user logs in one day to find a message from a site administrator saying that the user has been banned.

b

How can you leverage emerging technologies like AI in disaster recovery plans (DRP)? a. By using deep learning techniques to bolster the organization's defense against disasters. b. By using data-driven techniques to inform the strategies behind the DRP. c. By using AI decision-making systems to decide whether or not a DRP is necessary for your organization. d. By using natural language processing (NLP) techniques to ensure the DRP document is understandable and free of typographic errors.

b

How does the low likelihood of a crisis relate to its potential impact? a. A crisis with low likelihood tends to have low impact. b. A crisis with low likelihood tends to have high impact. c. A crisis with low likelihood tends to have moderate impact. d. A crisis with low likelihood tends to have little to no effect on its impact.

b

In AI, the principle of privacy is most commonly referred to in the context of which of the following concepts? a. Transparency b. Data protection c. Human control d. Personal protection

b

Reviewing the exam blueprint prior to scheduling your exam will allow candidates to do which of the following? a. Practice the skills required to complete the tasks outlined in the objectives. b. Consider whether you possess the knowledge, skills, and abilities required to successfully pass the exam. c. Practice exam items that reflect the questions on the certification exam. d. Consider whether you have the required degree or licensure to successfully pass the exam.

b

What does the initialism CIA stand for in a data security context? a. Communicability, interpretation, accessibility b. Confidentiality, integrity, availability c. Compliance, integrity, accountability d. Conformity, influence, adaptation

b

What is the primary advantage of radioactive data tracing over past techniques that modify input in order to determine whether or not that input was used in training? a. Radioactive data tracing targets language-based input. b. Radioactive data tracing doesn't impact a model's performance. c. Radioactive data tracing makes the modification perceptible to human beings. d. Radioactive data tracing can be used to modify the label.

b

What is the purpose of a holding statement in crisis and media communications? a. To retain the services of specific media outlets b. To pre-write communications before they are needed c. To prevent personnel from communicating prematurely d. To order the business to temporarily halt certain operations

b

What is the purpose of differential privacy? a. To ensure the data is completely confidential and cannot be read by unauthorized parties. b. To enable parties to share private data without revealing individuals represented in the data. c. To remove the direct identifiers that can be used to identify individuals. d. To only allow certain parties to access certain portions of the data.

b

When you deliver periodic statements about a crisis to the media, what should the first statement do? 1 / 1 point a. Provide in-depth details about the situation b. Set the tone of what is to follow c. Survey public opinion of the organization d. Accept responsibility for perceived problems

b

Which of the following best describes capability caution as referenced in the Asilomar AI Principles? a. We should keep limits on on what artificial general intelligence (AGI) is capable of. b. Given a lack of consensus, we should avoid strong assumptions regarding upper limits on future AI capabilities. c. Should there be a greater reliance on AI, measures should be taken to ensure that humans are still capable of finding work. d. If there is no understanding of the internal mechanisms of AI, then AI development should be halted.

b

Which of the following best explains why there is an emphasis on including human rights in the major ethical frameworks? a. They help to provide an anthropocentric frame for the ethical considerations. b. They are universal and provide scaffolding for all other ethical considerations. c. They allow an organization to deliver its products and services in a larger number of markets. d. They help to satisfy legal and regulatory requirements and make the product compliant in the local jurisdiction.

b

Which of the following constitute external stakeholders in the context of a code of ethics? a. Developers b. Regulators c. Designers d. Business managers

b

Which of the following constitute internal stakeholders in the context of a code of ethics? a. Regulators b. Designers c. Policymakers d. Data subjects

b

Which of the following could Nmap, Wireshark, or Metasploit be applied to for ethical purposes? a. Business continuity planning b. Attack simulations c. Persona modeling d. Criminal exploitation

b

Which of the following describes the AI Fairness 360 project? a. An AI product that represents a completely fair model for AI practitioners to use as a benchmark. b. An open source library that evaluates models for bias and provides mitigation tactics to reduce that bias. c. A checklist for machine learning practitioners to follow when training fair AI models. d. A global initiative that promotes fairness in AI through seminars, conferences, and other community-driven activities.

b

Which of the following describes the technique of homomorphic encryption? a. A method of cryptography that hides data inside other data. b. A method of performing operations on encrypted data. c. A method of mitigating biased algorithms through enhanced secrecy. d. A method of swapping public and private keys between hosts.

b

Which of the following is a benefit of providing disclosure statements? 1 / 1 point a. It creates an ethical framework from which the organization can operate. b. It demonstrates that the organization has a commitment to openness. c. It demonstrates that the organization lacks ethical conflicts. d. It enables the organization to mitigate ethical risks.

b

Which of the following is a case study that best represents the principle of professional responsibility? a. The Beijing AI Principles' tenets about the use of AI b. The American Medical Association's definition of AI as augmented intelligence c. The Asilomar AI Principles' definition of capability caution d. The IEEE Ethically Aligned Design's discussion on classical ethics

b

Which of the following is a formative ethics theory that states that maximizing happiness is the primary standard for determining what is right or wrong? a. Deontology b. Utilitarianism c. Virtue ethics d. Categorical imperative

b

Which of the following is a function of exploratory data analysis (EDA)? a. To evaluate the organization's project management structure for the AI project. b. To evaluate the quality of data before it is used to train a model. c. To evaluate the decisions made by the model after training on the data. d. To evaluate the methods used to collect the data.

b

Which of the following is a reason to engage in a comprehensive information gathering phase before drafting your internal and external ethics policies? a. It provides examples of possible ethical pitfalls that the organization should avoid. b. It helps to unearth best practices from peers in the industry. c. It saves you effort if you just copy the existing ethics policies from other organizations. d. It helps to collect reaffirming evidence for your own ethical beliefs.

b

Which of the following is a technique used by the Python tool Alibi to produce a subset of features that will usually result in the same model prediction? a. Perturbation b.Anchor Explanations c. Shapley value d. Local Interpretable Model-Agnostic Explanations

b

Which of the following is a type of technology contract that establishes the goals of both parties and describes how those goals will be achieved? a. Terms of Service (ToS) b. Service-level agreement (SLA) c. Software as a Service (SaaS) d. End-user license agreement (EULA)

b

Which of the following is a valid reason for tracking the number and severity of an organization's ethical violations? a. It can replace the need for refreshing the internal and external ethics policies. b. It can help provide transparency around the efforts to improve the policies. c. It can dissuade end users from scrutinizing the internal and external ethics policies. d. It can help provide qualitative information that can be used to improve the policies.

b

Which of the following is an ethical benefit of incorporating fair competition considerations in a data-driven technology ecosystem? a. Consolidating products and services under a single organization b. Encouraging product or service differentiation c. Lowering product and service costs for the users d. Accelerating investments in research and development

b

Which of the following is an important action needed for the finalization of internal and external ethics policies before approval? a. Discarding open issues to provide a clean slate for the next iteration of the policies b. Documenting the assumptions and choices made in the drafting of the policies c. Testing the policy in an already deployed project setting d. Ensuring the policies are the same as those from other peer organizations

b

Which of the following is one explanation for why cognitive biases exist? a. They are taught to us in school. b. We receive too much information and are overloaded. c. We use them to help remember things. d. They help us think logically instead of emotionally.

b

Which of the following is the most important ethical consideration regarding technical developments like deepfakes? a. They take away monetization opportunities, leaving individuals unfairly compensated for their data. b. They usurp a person's likeness and can then be weaponized against them. c. They violate data sharing agreements in many jurisdictions. d. They are built on technological progress made by a third-party organization.

b

Which of the following is the most important factor to consider when developing corporate reports? a. Who the intended audience of the report is b. Where the data used in the report comes from and how accurate it is c. Whether or not it's necessary to include financial information in the report d. Who is the most qualified person to deliver the report

b

Which of the following is the most important idea that a crisis communication program should manage? 1 / 1 point a. The real-world effects of a crisis b. The public's perception of a crisis c. Internal stakeholder consensus about how to approach a crisis d. The individual details of a crisis

b

Which of the following metrics is used to evaluate a linear regression machine learning model? a. Accuracy b. Cost function c. Goodhart's Law d. Receiver operating characteristic (ROC)

b

Which of the following negative consequences is the direct result of failing to be truthful in communicating about a crisis? 1 / 1 point a. Security risk b. Reputational damage c. Discrimination d. Financial loss

b

Which of the following presents the most important argument for why we need to consider the impact of AI on labor in the design, development, and deployment of data-driven technology? a. The organization would like to avoid having to deal with union concerns. b. There might be potential labor rights and human rights violations. c. There may be an impact on worker productivity if they are not included in all phases. d. There is still a need for human workers in human-in-the-loop mechanisms.

b

Which of the following resources does the National Institute of Standards and Technology (NIST) provide to organizations? a. Security tools b. Reference materials c. Industrial configurations d. Measurement technologies

b

Which of the following will ensure that a code of ethics is widely adopted within the organization? a. Making a public announcement with the creators of the code of ethics. b. Integrating the code of ethics deeply into the existing workflows within the organization. c. Including the code of ethics in the legal documents signed by the employees. d. Writing the code in legal language to ensure that it is compliant with the laws of the land.

b

Which of the following would be the most beneficial stage to hold ethical risk reviews for a new project that your team is undertaking? a. Deployment b. Conception c. Design d. Development

b

Which type of bias causes people to trust an automated decision-making system (ADS) over a human's decision? a. Confirmation bias b. Automation bias c. Implicit bias d. Complacency bias

b

Why is a model that has been overfitted to its training data a source of fairness risk? a. Because the model includes too much noise. b. Because the model won't generalize to the entire population. c. Because the model has a temporal bias. d. Because the model is too complex.

b

Why is deciding how to act using moral reasoning not always a feasible goal for human beings? a. Moral reasoning is too complicated to apply to a real-world situation. b. Human decision making is often influenced by emotion and not logic. c. Moral reasoning has few tangible benefits for most people. d. Most people are not educated on normative ethical theories and therefore cannot perform true moral reasoning.

b

You have scheduled your exam at a Pearson VUE test center. Which of the following should you do before you leave for your appointment at the test center? a. Make sure you have your mobile phone to take photos of the exam room to provide to the proctor. b. Check that you have the government-issued ID that you used during registration. c. Verify that you have run the speed test on the computer that you plan to take the exam on. d. Pack snacks and drinks to have during the exam.

b

You're the recipient of some data collected by a third party that you'll use in training an AI model. As per your business agreement, the third-party discloser of the data requests that you explain how you plan to use the data. At what point in the process should you provide this explanation? a. At the point of planning the AI system. b. At the point of collecting the data. c. At the point of training the model. d. At the point of evaluating the model.

b

You're training a model to classify whether or not a bridge is likely to collapse given several factors. You have a dataset of thousands of existing bridges and their attributes, where each bridge is labeled as having collapsed or not collapsed. Only a handful of bridges in the dataset are labeled as having collapsed—the rest are labeled as not collapsed. Given your goal of minimizing bridge collapse and the severe harm it can cause, which of the following metrics would be most useful for evaluating the model? a. Confusion matrix b. Recall c. Accuracy d. Precision

b

Which of the following are best practices for incorporating inclusive design in AI projects? (Select two.) a. Solve for many, extend to one. b. Consider bias a spectrum. c. Leverage customer input to reduce bias. d. Keep machines and humans separate.

b, c

Which of the following are common key performance indicators (KPIs) within dashboards of data-driven systems? (Select two.) a. Operating cashflow forecast b. Model training time c. Performance metrics, such as accuracy and cost functions d. Earnings before interest, taxes, depreciation, and amortization (EBITDA)

b, c

Which of the following are distinguishing characteristics of a "living" public education campaign? (Select two.) a. The campaign must be self-sustaining. b. The campaign is continuously improved upon. c. The campaign fosters a relationship between the organization and its stakeholders.. d. The campaign cannot be modified without the consent of the organization.

b, c

Which of the following are important elements of the data minimization principle? (Select two.) a. Only delete data that can be easily replaced b. Only collect data that is strictly necessary c. Only keep data for as long as it is needed d. Only compress data that needs to be kept as small as possible

b, c

Which of the following are key principles of privacy by design? (Select two.) a. Organizations must keep the focus of privacy protections on the business rather than the user. b. Organizations must be proactive in protecting against privacy risks, not reactive. c. Organizations must incorporate privacy protections throughout the project lifecycle. d. Organizations must not expose the operational practices and technologies used to protect user privacy.

b, c

Which of the following are logical arguments in favor of an organization maintaining compliance? (Select two.) a. Reduced costs of development b. Avoidance of reputational damage c. Long-term cost savings due to avoiding fines d. Reduced time to deployment

b, c

Which of the following describe important aspects of why emerging technologies are so capable and powerful? (Select two.) a. They are exciting and captivating to many people. b. They may be able to self-improve by learning from data c. They can automate very complex operations. d. They can displace workers by performing their jobs more efficiently.

b, c

Which of the following elements constitute PII? (Select two.) a. Device IDs b. Telephone numbers c. Passport numbers d. Cookies and tokens

b, c

Which of the following ethical domains does the IEEE 7000 series explore? (Select two.) a. Personnel safety b. Machine-readable privacy terms c. Emulated empathy d. Fair competition

b, c

Which of the following is an ethical risk if there is non-compliance with legal and regulatory requirements within a jurisdiction ? (Select two). a. Reputational harm b. User discrimination c. Lack of transparency d. Loss of profits

b, c

Which of the following situations would most likely require communication to external stakeholders? (Select two.) a. The organization's change management strategy has been modified. b. The organization's AI product has a defect and needs to be recalled. c. The organization's data-driven service will receive an update that enhances its accuracy. d. The organization plans to adopt a new ethical framework to support the implementation of an AI system.

b, c

Which of the following statements are true regarding the purpose of moral psychology? (Select two.) a. Moral psychology seeks to understand the nature of what it means to be moral. b. Moral psychology seeks to understand how the human mind develops morality. c. Moral psychology seeks to understand why people act morally or immorally. d. Moral psychology seeks to understand what the best way to act morally is.

b, c

Which style or tone is recommended for a code of ethics? (Select two.) a. Subjective language b. Prescriptive language c. Plain language d. Legal language

b, c

Which of the following statements are promoted by the categorical imperative? (Select three.) a. You have a moral duty to choose your actions based on their potential outcomes. b. Act in such a way that your actions may become a universal law. c. Don't treat people as a means to an end; treat them always as an end. d. Each person must use reason to will moral laws.

b, c, d

Which of the following describe how adopting ethical practices can be a strategic differentiator? (Select three.) a. It will ensure you comply with regulations. b. It will encourage applicants to apply for your company. c. It will support the development of strategic partnerships. d. It will reduce your business obligations toward customers and business partners. e. It will build customer trust.

b, c, e

What does it mean to say that human rights are inalienable? (Select two.) a. Inalienable rights are conditional. b. Inalienable rights are inherent in all human beings. c. Inalienable rights are derived from tradition. d. Inalienable rights cannot be taken away except in extreme circumstances.

b, d

Which of the following are important steps to document during an auditing process? (Select two.) a. Provide significant advance notice before an audit. b. Document the audit procedures to be followed. c. Specify a purpose for the audit or an agenda to be covered. d. Specify and document what precisely is being audited.

b, d

Which of the following are important to provide to a crisis communication team? (Select two.) 1 / 1 point a. The ability to work independently of the crisis management team b. Clear direction on the roles and responsibilities of team members c. Permission to tell the public what they want to hear d. Access to adequate resources

b, d

Which of the following are likely to be found within a penetration test rules of engagement (ROE)? (Select two.) a. The appropriate length and complexity of employee passwords b. What systems may be targeted c. How long CCTV camera recordings should be maintained d. What methods of attack are legitimate

b, d

Which of the following are potential training data inadequacies that you should communicate to your users in support of transparency? (Select two.) a. The amount of time it took to collect the data. b. Any missing values in the dataset and how they were handled. c. The relatively large size of a dataset used in training. d. Any known bias in the sample data

b, d

Which of the following are useful strategies for communicating ethical risks to the individual? (Select two.) a. Inform individuals of how they are obligated to mitigate risks to themselves b. Ensure individuals feel that they have input into the process c. Ensure individuals understand the specific details of each risk they are affected by d. Communicate to individuals proactively rather than reactively

b, d

Which of the following communication tactics help uphold transparency and explainability from the customer perspective? (Select two.) a. Providing guidelines for how customers can keep their private data secure when using data-driven systems. b. Providing prompt responses to customer questions about the decisions made by data-driven systems. c. Providing in-depth white papers on the algorithms that underlie data-driven systems. d. Providing information about data-driven systems in simple, easy-to-understand terms.

b, d

Which of the following describe important aspects in the role of an ethical AI engineer? (Select two.) a. Building and maintaining computational hardware. b. Cleaning and sorting data, and auditing for bias. c. Writing new equations to express intelligence. d. Keeping up with the latest developments and vulnerabilities.

b, d

Which of the following elements should be communicated with end users when negotiating ethical access to a user's data? (Select two.) a. The monetary value of that data b. A request for consent to perform an action c. An offer of money or other incentives to relinquish user's rights d. The intention behind a certain activity or request

b, d

Which of the following risk analysis methods use words like "likely," "unlikely," and "rare" to describe the likelihood of risk, and words like "low," "medium," and "high" to describe the impact of risk? (Select two.) a. Quantitative analysis b. Semi-quantitative analysis c. Semi-qualitative analysis d. Qualitative analysis

b, d

At what point should ethical consideration ideally be applied to emerging technologies? a. During periodic reviews, with ongoing customer feedback solicited. b. Upon delivery, with appropriate warranties where necessary. c. From its inception, through maintenance, to applying foresight regarding its decommissioning. d. Once an ethical issue has received negative feedback in public media.

c

How can AI uphold justice? a. The more AI-based products being used in the justice system, the more justice can be upheld. b. AI systems can be designed from the start to help promote fairness and minimize bias. c. AI systems can replace human judges, who are often biased. d. AI can automate many of the clerical tasks involved in the justice system

c

How does increasing AI performance often conflict with the desire for explainability? a. Increasing AI performance sometimes removes human-in-the-loop (HITL) methods, making it more difficult to explain decision-making processes. b. Increasing AI performance sometimes leads to certain evaluation metrics no longer being useful, making it more difficult to explain decision-making processes. c. Increasing AI performance sometimes leads to greater model complexity, making it more difficult to explain decision-making processes. d. Increasing AI performance sometimes reduces the transparency of input data used in training, making it more difficult to explain decision-making processes.

c

How does the "virtuous cycle" that benefits Big Tech operate? a. By acting virtuous, the public respects Big Tech more and more. b. Better classes of customers lead to richer and more refined data for algorithmic systems. c. Data-driven algorithms improve solutions, leading to new customers, and better data. d. Organizations write algorithms with fewer biases, which leads to fairer outcomes.

c

If you are attempting to build a new framework for the research and development (R&D) of AI, which of the following frameworks might you look at first for its emphasis in this area? a. The American Medical Association's definition of artificial intelligence b. The Montreal Declaration for a Responsible Development of Artificial Intelligence c. The Beijing AI Principles d. The G20 AI Principles

c

In the following scatter plot, the GrossIncome variable is plotted against the Revenue variable. What type of correlation does this plot suggest? a. There is a strong negative correlation between both variables. b. There is a weak negative correlation between both variables. c. There is a strong positive correlation between both variables. d. There is a weak positive correlation between both variables.

c

In using AI-enabled solutions within the context of medical imaging analysis, which of the following is the most important ethical consideration? a. Security b. Bias c. Explainability d. Privacy

c

The Children's Online Privacy Protection Act (COPPA) safeguards the privacy of which age group's personal information? a. Anyone between 13 and 18 years old b. Anyone between 5 and 13 years old c. Anyone under 13 years old d. Anyone under 18 years old

c

The organization needs to ask itself about any quality control issues it may be having. Which of the following processes is most suitable for asking and answering that question? a. Business continuity plan b. Lessons learned report c. Vulnerability audit d. Business impact assessment

c

To which of the following groups would a code of ethics not be applicable? a. Developers of the data-driven technology system b. Designers of the data-driven technology system c. Data subjects of the data-driven technology system d. Business managers of the data-driven technology system

c

What does it mean to call a click-through agreement a "contract of adhesion"? a. Both parties are legally bound by the agreement. b. Both parties are equally responsible for ensuring the agreement is adhered to. c. One party is forced into a "take-it-or-leave-it" situation. d. One party is forced into using the service after agreeing.

c

What does the acronym SIEM stand for in a cybersecurity context? a. Serial input to externalized modulation b. Social, interpersonal, empathic, mental c. Security information and event management d. Selective information extrapolation methods

c

What is the fundamental attribution error? a. When you incorrectly assume a cause and effect relationship for two correlated variables. b. When you believe your ideas are normal and that the majority of people agree with you. c. When you say your bad behavior is caused by the situation, but when other people display the same bad behavior, it is caused by a personality trait. d. When you believe your chances of experiencing something negative are lower and your chances of experiencing something positive are higher than others.

c

What is the primary purpose of obtaining feedback about an ethical crisis? a. To appeases concerned stakeholders b. To demonstrate compliance c. To make operational improvements d. To motivate internal personnel

c

When scheduling your exam on Pearson VUE, you will be asked to provide information about yourself. Which of the following do you need to be sure to do when entering this information? a. Have your video camera on and set to the correct aspect ratio. b. Run the speed the test prior to entering your information. c. Match the government-issued ID that you will use to verify your identity on the day of the exam. d. Set up a unique email to receive exam information from Pearson VUE.

c

Which of the following are included in the CertNexus Candidate Agreement? a. Instructions on how to schedule your exam b. Domains and objectives covered in the exam c. Expectations of personal conduct such as cheating d. List of subject matter experts that contributed to the job task analysis

c

Which of the following describes change management? a. A collective term for all approaches to prepare, support, and help individuals, teams, and organizations in fostering an ethical organizational culture. b. A collective term used to explain how organizations facilitate change in a product after receiving negative feedback. c. A collective term for all approaches to prepare, support, and help individuals, teams, and organizations in making organizational change. d. A collective term used to describe how employees are able to voice their concerns to facilitate change in their organization.

c

Which of the following describes employee voice? a. The amount of voluntary effort that employees are willing to spend to file complaints about conditions of the company or organization. b. The amount of feedback that employees are willing to share with their fellow coworkers to boost company morale and efficiency. c. The amount of voluntary effort employees are willing to put into communicating suggestions, opinions, concerns, and ideas that can be used to make improvements. d. The likelihood of employees voicing their concerns about the company because they want to improve company performance.

c

Which of the following describes personhood? a. Personhood is the legal protection provided to AI systems. b. Personhood is a concept that applies to narrow AI. c. Personhood is often used to dictate how something is treated. d. Personhood is an individual's right to freedom.

c

Which of the following describes the principle of transparency in the context of AI systems? a. Transparency enables human observers to tweak the decision-making process of an AI system. b. Transparency enables human observers to reproduce the decision-making process of an AI system. c. Transparency enables human observers to see inside the decision-making process of an AI system. d. Transparency enables human observers to understand the decision-making process of an AI system.

c

Which of the following is NOT a common consideration when looking at the major ethical frameworks? a. Security b. Privacy c. Humanity d. Transparency

c

Which of the following is a benefit of using focus groups over surveys? a. They are a more scalable option for the collection of information. b. They are an easier way to collect information from a target audience. c. They allow for deeper engagement with the target demographic community. d. They can provide more data through structured information gathering.

c

Which of the following is a best practice for incorporating diversity, equity, and inclusiveness in communication? a. Focus on the organization's intended message rather than incorporating feedback from external stakeholders b. Ensure multiple groups of people based on race, gender, etc., are communicating in different ways c. Promote an organizational culture that embraces these values d. Reassure customers that the organization is diverse, equitable, and inclusive

c

Which of the following is a notable aspect of the Personal Information Protection and Electronic Documents Act (PIPEDA) when compared to similar laws and regulations? a. The early date of its inauguration b. Its exclusive focus on a single domain rather than a breadth of domains c. A stipulation to continue providing service even if data usage is denied d. Its nationwide scope and specific national focus

c

Which of the following is an example of a cognitive bias? a. Correlation bias b. Misclassification bias c. Anchoring bias d. Modeling bias

c

Which of the following is an example of applied ethics? a. Virtue ethics b. Pluralism c. Professional ethics d. Moral relativism

c

Which of the following is an important reason for continually refreshing an organization's internal and external ethics policies? a. It helps internal stakeholders justify the release of new product features or service upgrades. b. It helps demonstrate to senior management that work is being done on the internal and external ethics policies. c. It helps maintain alignment with the emergent risks and changing ethical posture of the products and services of the organization. d. It helps maintain alignment of the policies with the cultural and contextual values of the organization's employees.

c

Which of the following is often in opposition to moral relativism? a. Customs and conventions b. Cultural mores c. Evidence-based policy d. Subjective perspectives

c

Which of the following is the first step in developing an incident response plan (IRP)? a. Consulting internal stakeholders b. Taking feedback from customers c. Identifying risks d. Forming a team

c

Which of the following types of bias emerges when the same data is sampled over and over again, limiting a model's perspective? a. Implicit bias b. Confirmation bias c. Reinforcement bias d. Temporal bias

c

Which team typically oversees penetration test operations and adherence to the rules of engagement (ROE)? a. Blue team b. Red team c. White team d. Purple team

c

Which type of entity are the OECD Principles on Artificial Intelligence mostly geared towards? a. Private corporations b. Municipal governments c. National governments d. Individuals

c

Why are groups like race and religion considered protected classes? a. These groups can be used to personally identify someone. b. Organizations are legally not allowed to collect information about these groups. c. These groups have been used as the basis for wholesale discrimination. d. People use these groups as the basis for their identities.

c

Why does the trolley problem pose an ethical predicament? a. You as the actor don't have sufficient control over the circumstance. b. There are so many potential outcomes that it becomes difficult to choose one that is most ethical. c. You have to make a choice between two scenarios where choosing one leads to loss of life in the other. d. The moral responsibility is split between you and the person controlling the trolley.

c

Why is the question of robot rights and emancipation one that isn't as important as addressing issues of bias, privacy, transparency, and other principles discussed in the various ethical frameworks? a. There is no legal precedent for granting rights to entities that are not humans. b. Robots are mechanical instruments and therefore don't deserve to have rights. c. These rights necessitate that robots become sentient entities, which is currently not feasible. d. Humans are anthropocentric and don't want to extend rights to other sentient entities.

c

You have a dataset of customers that includes each customer's gender, location, and other personal attributes. The label you are trying to predict is how much sales revenue each customer is likely to generate for the business based on these attributes. What type of machine learning outcome is this problem suited for? a. Classification b. Clustering c. Regression d. Dimensionality reduction

c

You want to solicit feedback from users who are seeking explanations about your AI products and services. So, you decide to place a form on your marketing website that users can fill out. Which of the following is the best way to structure that form for the purpose of collecting useful feedback? a. Provide a series of open questions with a single-line entry field where users can provide short answers. b. Provide a drop-down menu of feedback categories that users can select from, with a promise that you'll follow up via email. c. Provide a large, unrestricted text box where users can enter their thoughts at length. d. Provide a series of yes or no questions with radio buttons where users select their respective answers.

c

Which of the following are advantages to adopting standards frameworks like ISO 27000? (Select two.) a. Regulatory weight and legal enforcement b. Technology-specific focus and precise implementation instructions c .Formal certification processes that provide competitive advantage d. International support, recognition, and involvement

c, d

Which of the following are desired qualities when choosing a spokesperson for your organization? (Select two.) a. Lighthearted when dealing with serious topics b. Defensive when challenged with difficult situations c. Patient when addressing tough questions or concerns d. Articulate when communicating important details

c, d

Which of the following are effective strategies when making statements on social media? (Select two.) a. Focusing on positive feedback b. Communicating only as needed c. Being honest and up front d. Presenting a face of the organization

c, d

Which of the following are potential ethical benefits of conducting pilot testing prior to the release of emerging technologies? (Select two.) a. It demonstrates that the system is functional as early as possible in order to satisfy senior management and investor stakeholders. b. It certifies that a product's developers are legally accountable. c. It minimizes the impact of any ethical issues which may emerge. d. It reveals any gaps in accountability or auditability.

c, d

Which of the following are typically true when comparing the LIME tool with the SHAP tool? (Select two.) a. LIME supports more programming languages than SHAP. b. LIME supports fewer types of models than SHAP. c. LIME outputs results faster than SHAP. d. LIME is less accurate than SHAP.

c, d

Which of the following are useful strategies for communicating ethical risks to the organization? (Select two.) a. Communicate information through a single voice b. Provide information only when solicited c. Disseminate information in multiple formats. d. Communicate information in real time

c, d

Which of the following best describes why data is sometimes compared to oil? (Select two.) a. Data can be easily monopolized. b. Data can damage the environment. c. Data can fuel algorithmic technologies d. Data can be monetarily valuable.

c, d

Which of the following ethical considerations should have priority in an emergency situation like the use of contact-tracing solutions during a pandemic? (Select two.) a. Explainability b. Bias c. Accountability d. Privacy

c, d

Which of the following sources does a SIEM system typically pull data from? (Select two.) a. Personnel emails b. Encrypted personal data c. System event logs d. Network intrusion detection alerts

c, d

Why is it important not to review a crisis too soon after it has concluded? (Select two.) a. By reviewing a crisis too soon, you can unknowingly extend the effects of that crisis. b. By reviewing a crisis too soon, you run the risk of violating compliance requirements. c. By reviewing a crisis too soon, you may not have collected all of the useful details. d. By reviewing a crisis too soon, you can exasperate the people involved.

c, d

Why is it important to categorize ethical risks into different types? (Select two.) a. It helps us consider risk mitigation in terms of universal tactics that apply to all potential kinds of ethical risk. b. It ensures that customers and other external stakeholders know that we take ethical risks seriously. c. It helps us understand the many complexities involved in different types of ethical risks. d. It makes it easier for us to identify and manage different types of risks.

c, d

Are criminal justice risk assessments race-neutral? a. Yes, technology in itself is not racist. b. No, it is designed with intention to be unfair. c. Yes, algorithms replace human judgement and they are unbiased. d. No, the data is biased as it reflects historical bias.

d

How can a visual contract be easier to understand than a written contract? a. The use of pictures is more accessible to all people, whereas a written contract may be difficult for someone with a reading disability to understand. b. The use of pictures without any text makes it easier for most people to comprehend the details of a contract. c. The use of pictures explains the contract in greater detail than a written contract, making it easier for anyone to understand the particulars. d. The use of pictures with simple text makes it easier for the layperson to understand the details of a contract.

d

How do norms differ from morals? a. Morals are collective; norms are more personal. b. Norms are universal to all cultures; morals are not. c. Norms form the basis for morals. d. Morals involve value judgments; norms do not.

d

How might a non-stochastic decision tree be considered a black box algorithm? a. If the algorithm serves as part of a data recorder. b. If the algorithm is contained within an embedded system. c. If the model is expressed in an annotated visual form. d. If the model is far too complex to be readily understood by human beings.

d

If an AI-enabled system enables addictive behavior, which of the following makes for the most compelling argument to stop development work on that system? a. The user will share more data with the system because of increased use. b. There is a lack of accountability on the part of the user since they overuse the service. c. The process for obtaining consent has not been made transparent to the user. d. The system, as designed, acts counter to the well-being of the users.

d

In a classification model that determines whether or not a customer qualifies for a coupon, a significantly lower percentage of males qualified than females. Which of the following types of discrimination does this outcome potentially represent? a. Disparate non-impact b. Disparate mistreatment c. Disparate treatment d. Disparate impact

d

Is an open door policy equivalent to ensuring employee voice? a. Yes, because both allow employees to speak up. b. Yes, because an open door policy is essential for employee voice. c. No, because an open door policy is the opposite of employee voice. d. No, because an open door policy does not ensure employees feel heard.

d

SSL, TLS, and SSH are all forms of... a. Media codecs b. Computer forensics tools c. Version control systems d. Encryption protocols

d

What causes bias? a. Bias is biological, we are born with it. b. Biases are caused by the opinions of our families. c. Bias is caused by the media. d. Biases are learned from our families, our social groups, and the media.

d

What does the acronym CSIRT stand for in a security context? a. Computer security immediate readiness tools b. Conformance strategy, immutability, reliability, trustworthiness c. Computer science, Internet, real-time interaction, technology d. Cybersecurity incident response team

d

What is the benefit of hosting a virtual reality press conference over a traditional in-person press conference? a. It will be easier to communicate your overall message to your audience. b. The participants will be impressed by your leveraging of new and exciting technologies. c. The conference will be easily accessible to all willing participants. d. The conference can be interactive without the participants needing to be co-located.

d

What is the purpose of ethics training in regard to fostering an ethical organizational culture? a. To help employees develop their ability to follow instructions and identify potential avenues to improve efficiency and output. b. To help employees develop their ability to communicate in the workplace and identify actions and behaviors that can help boost company morale. c. To help employees develop their ability to identify potential misconduct in the workplace and report those incidents to the proper departments. d. To help employees develop their ability to recognize and promote ethical decisions in the workplace and identify ethical and unethical actions and behaviors.

d

When conducting a business impact assessment (BIA), why is it important to interview or survey personnel at the ground level, not just managers and other higher-ups? a. They are more likely to find the time to complete an interview or survey. b. They have a greater obligation to answer questions. c. They are more likely to be candid and give forthright responses. d. They may have more institutional knowledge about a subject than managers.

d

When conducting an opinion poll, which of the following biases do you need to guard against the most when collecting your data? a. Misclassification bias b. Modeling bias c. Correlation bias d. Sampling bias

d

Which expression best characterizes what a company or organizational culture is? 1 / 1 point a. "This is how we want this done." b. "This is what we're told to do." c. "It is what it is." d. "This is how things are done around here."

d

Which of the following best describes beneficence? a. Beneficence is a term coined by IBM that relates to their Green Horizons initiative in 2014. b. Beneficence is the promotion of well-being for moral agents like humans. c. Beneficence is the promotion of efficient systems that perform rapidly and benefit companies. d. Beneficence is the promotion of well-being, not just for moral agents like humans, but of animals, the environment, and societies.

d

Which of the following describes an ethical framework? a. Ethical frameworks raise timeless ethical questions that are not easily put into action. b. Ethical frameworks apply meta-ethical theories to everyday business operations. c. Ethical frameworks consolidate regulatory requirements for an industry. d. Ethical frameworks seek to mitigate ethical concerns by creating actionable steps.

d

Which of the following describes an illusory-correlation bias? a. When you incorrectly assume a correlation because there is an illusory confounding variable. b. When you correlate variables that do not exist in your data set. c. When you correlate a variable with a confounding variable. d. When you incorrectly assume a cause and effect relationship because two variables are correlated.

d

Which of the following describes an opt-out policy in regards to the collection of private data? a. Data about that user isn't collected until that user explicitly states you are allowed to. b. Data about the user is always collected, regardless of the user's consent. c. Data about the user is automatically collected unless that user explicitly states that you should not do so. d. Data about the user is never collected, regardless of the user's consent.

d

Which of the following describes dual-use or multipurpose data? a. Data that can be used in multiple devices or formats, such as a video on a Smart TV, tablet, and computer. b. Data that can be easily shared with a partner or family member for mutual enjoyment. c. Data that can be transformed into multiple forms, e.g. extracting audio from a video file. d. Data collected for one application that could also be applied to another application in a different domain.

d

Which of the following describes ethics washing? a. Genuine ethical action is used to wash over previous mistakes. b. Superficial promises are replaced by genuine ethical action. c. No attempt is made towards genuine ethical action. d. Genuine ethical action gets replaced by superficial promises.

d

Which of the following describes the purpose of a STEEPV analysis? a. To perform a strategic analysis of user needs and behaviors. b. To perform a strategic analysis of how internal office politics impact business operations. c. To perform a strategic analysis of how bias can manifest in AI products. d. To perform a strategic analysis of how external environments impact business operations.

d

Which of the following describes the purpose of having an Ethics Board for a data-driven organization? a. An Ethics Board can increase transparency into how the organization uses AI or autonomous technologies. b. An Ethics Board can help maintain an organization's values-based intentions and decrease the inherent dangers of autonomous technologies. c. An Ethics Board can help maintain an organization's profit margins and increase transparency into how they increase their profits. d. An Ethics Board can help maintain an organization's values-based intentions and increase transparency into how they use data-driven technologies.

d

Which of the following describes why explainability is important? a. It is necessary so that internal stakeholders can understand how a system works. b. It enables you to explain a system for shareholder purposes. c. It provides interpretations of a system's actions. d. It provides accountability and trust.

d

Which of the following frameworks primarily promotes human rights? a. The Montreal Declaration b. The Beijing AI Principles c. The Asilomar AI Principles d. The Toronto Declaration

d

Which of the following is a best practice when participating in media inquiries? a. Get your message out as quickly as possible b. Divulge only the information that you are required to by law c. Only agree to speak to media outlets that are favorable to your organization d. Ensure your message is consistent

d

Which of the following is a misuse of intellectual property (IP) when it comes to ethical accountability for an organization? a. Collecting returns on investments made in research and development. b. Enhancing the security posture of a product or service. c. Filing a patent for the IP that makes non-obvious information known to the public. d. Using IP as a defensive mechanism to eschew transparency requirements.

d

Which of the following is a problematic reason to pilot a code of ethics prior to widespread deployment? a. The pilot phase helps to stress test a code of ethics in a real-world situation. b. The pilot phase helps to identify gaps in the current code of ethics. c. The pilot phase helps to develop awareness and buy-in from the relevant stakeholders in the organization. d. The pilot phase demonstrates the seriousness of the organization with respect to its ethical responsibilities.

d

Which of the following is a reason to engage external stakeholders during the development of internal and external ethics policies ? a. It helps to reinforce the cultural and contextual values of the employees by getting external validation. b. It acts as a shielding mechanism for accountability in case an ethical violation occurs in the future. c. It can be used as an opportunity to demonstrate your ethical standpoints with both internal and external stakeholders. d. It can unearth new insights for how the products and services might be used in the target demographic community

d

Which of the following is a reason to periodically update a code of ethics document? a. It signals that you care about ethics to internal and external stakeholders. b. It is a fiduciary and regulatory responsibility for the organization to do so. c. It reinforces the presence of the code of ethics in the minds of the employees. d. It allows you to capture the evolving nature of the ethical risks of the product or service that you are developing.

d

Which of the following is a standard or regulation that focuses on ensuring the implementation of strong cybersecurity techniques like network security and cryptography to protect data? a. POPI b. PIPEDA c. FERPA d. PCI DSS

d

Which of the following is a transparency risk of closed source software? a. Closed source software includes obfuscated code that cannot be read by a human. b. Closed source software cannot be shared with business partners. c. Closed source software cannot be reviewed by the organization that developed it. d. Closed source software may not be accessible to independent auditors.

d

Which of the following is an easy and accessible way to demonstrate your skills alongside your certification? a. Post the link to your Accredible badge on global vendor-neutral blogs b. Post a video on social media discussing the value of certifications c. Post on social platforms about how proficient you are in the subject area d. Post evidence of your accomplishments on your Accredible profile

d

Which of the following is an explainability risk of self-learning models? a. Self-learning models can corrupt data or otherwise make it unreadable. b. Self-learning models are black boxes whose decisions cannot be understood. c. Self-learning models are unable to generate decisions as output. d. Self-learning models may introduce new data you're unaware of.

d

Which of the following is an important reason to have a policy owner for internal and external ethics policies ? a. The policy owner will write the policy, relying solely on their personal institutional knowledge. b. They can help to prevent changes from taking place in the policies over time by justifying their choices. c. It helps to have a single person that can be held accountable in case something goes wrong. d. They can help to bring the right internal and external stakeholders together to help draft these ethics policies.

d

Which of the following is not a valid risk response technique? a. Accept b. Transfer c. Avoid d. Ignore

d

Which of the following might be a risk of not having an ethical organizational culture? a. Employees will experience a faster approval process to get a product launched. b. Employees might be less interested in their careers. c. Employees are more likely to express their opinions about the company. d. Employees might face cognitive dissonance.

d

Which of the following principle sets are important for the creation of open data that is widely utilized? a. FATE b. ISO 27001 c. ISO 27017 d. FAIR

d

Which of the following should be conducted as part of a risk communication strategy in order to ensure the organization is upholding its regulatory obligations? a. Public relations campaign b. Business impact assessment (BIA) c. Ethical risk review d. Compliance audit

d

Which of the following software development principles is essential in the real-world deployment of AI-enabled software applications in critical scenarios like self-driving cars? a. Architectural design analysis b. Continuous integration and deployment of patch updates c. Version control of the AI models deployed d. Robustness to adversarial examples

d

Which of the following statements accurately describes the philosophical concept of predeterminism? a. All future events are determined by preceding events, as in a chain, but human beings may still be able to interfere with this chain of events. b. All events are predestined to happen by a supernatural force. c. Human beings are able to make choices whose outcomes are not already determined. d. All events, past, present, and future, are determined in advance.

d

Which of the following statements accurately describes variance? a. Variance measures the error between predicted values and actual values. b. Variance measures how much a variable's distribution differs from a normal distribution. c. Variance measures the shape of the tails in a distribution relative to the center. d. Variance measures how far a data example is from the mean.

d

Which of the following, by itself, qualifies as personally identifiable information (PII)? a. Temperature readings for an office building b. A user's customer ID in an online ordering system c. System events added to a log d. A user's home address

d

Which organizational resource is most commonly used in terms of fostering an ethical organizational culture? a. Financial resources b. Physical resources c. Informational resources d. Human resources

d

Which school of philosophical thought primarily advocates for the greatest good for the greatest amount of people? a. Virtue ethics b. Kantian ethics c. Deontology d. Utilitarianism

d

Which type of edge case is caused by data outside the normal distribution? a. Noise b. Errors c. Overfitting d. Outliers

d

Why are anonymization and pseudonymization insufficient protection measures against breaches of data privacy and security? a. They destroy the usefulness of the data. b. They don't integrate well into data science and machine learning workflows. c. They only work in scenarios with particular kinds of personal information. d. They can be broken by combining this data with other publicly available data.

d

Why is it important to build a "reservoir" of goodwill with the media? a. The media will be more likely to give the organization the benefit of the doubt in the event of a crisis. b. The media will be less likely to publish a story about a crisis right away, opting to wait for your approval instead. c. The media will be more likely to advocate for your organization in the event of a crisis. d. The media will be less likely to accuse the organization of being malicious or negligent in the event of a crisis.

d


Related study sets

Chapter 37: Caring for Clients with Central and Peripheral Nervous System Disorders

View Set

Fundamentals of Management Exam 2 (Ch. 5-8)

View Set

The Etruscans (and their influence on early Rome)

View Set

Physio Lab 11 - Respiratory Physiology and PhEx 7 - Respiratory System Mechanics

View Set

prop and casuality practice test

View Set

Chapter 4 - The Secondary Mortgage Market

View Set

Period 5 (Part 1) - Manifest Destiny and Sectional Conflict?

View Set

Ch 1. Microbiology Assignment Questions

View Set

Difference between Class I and Class II MHC proteins

View Set

Section 7: Duties and Disclosures to Third Parties in Texas

View Set

Module 7 The Newsvendor Inventory Model Quiz

View Set