Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > WGU > Courses and Certificates > Information-Technology-Management

Information-Technology-Management WGU Information Technology Management QGC2 Question and Answers

Question # 4

An organization wants to use an application software that increases the cooperation and joint productivity of small teams of employees.

Which application software will serve this need?

A.

Data management

B.

Program management

C.

Personnel systems

D.

Collaborative systems

Full Access
Question # 5

Which type of testing in the systems development life cycle (SDLC) focuses on how different components of the software work together?

A.

Integration testing

B.

Parallel testing

C.

Unit testing

D.

Acceptance testing

Full Access
Question # 6

How do small and medium enterprise (SME)-focused enterprise resource planning (ERP) systems help small businesses?

A.

They simplify budgets by reducing reporting.

B.

They automate growth strategy design.

C.

They provide core functions at low cost.

D.

They deliver advanced forecasting.

Full Access
Question # 7

Which system supports front-line retail teams in real-time decision-making by updating sales and inventory information as activity occurs?

A.

Online transaction processing system

B.

Decision support system

C.

Management information system

D.

Customer relationship management system

Full Access
Question # 8

Which type of computer is designed for high-volume data processing and enterprise-level tasks?

A.

Mainframe

B.

Desktop

C.

Laptop

D.

Workstation

Full Access
Question # 9

Which IT practice supports green computing?

A.

Extending device life with reuse and refurbishment

B.

Prioritizing high performance for faster task completion

C.

Choosing hardware that is economical

D.

Recycling old hardware before it reaches end of life

Full Access
Question # 10

A team tests a prototype prior to meeting with a company's client and discovers the "My Account" menu is not working. The team revises the code and presents a functioning prototype to the client.

Which advantage of prototyping does this describe?

A.

Static example of the finished product

B.

Blueprint of the entire project

C.

Early detection of coding errors

D.

Detailed instructions for development

Full Access
Question # 11

Which gate of the Rational Unified Process (RUP) should the organization execute before validating the system architecture?

A.

Elaboration

B.

Transition

C.

Construction

D.

Inception

Full Access
Question # 12

Which type of storage retains data even when the computer is powered off?

A.

Solid state drive (SSD)

B.

Optical drive

C.

Virtual memory

D.

Random access memory (RAM)

Full Access
Question # 13

Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.

A.

Automates the different activities of the supply chain

B.

Serves as a unique product identifier

C.

Tracks a product's journey from manufacturing facility to store

D.

Discards inconsistent, incorrect, or incomplete information

Full Access
Question # 14

Which system provides a foundation for collaboration between departments, enabling people in different business areas to communicate?

A.

Enterprise resource planning (ERP)

B.

Supply chain management (SCM)

C.

Customer relationship management (CRM)

D.

Electronic data interchange (EDI)

Full Access
Question # 15

How should leaders promote ethical IT behavior among employees?

A.

By assigning responsibility for ethics to individual departments

B.

By providing regular training on ethical expectations

C.

By covering ethics briefly during initial onboarding

D.

By relying on team leaders to address ethical concerns informally

Full Access
Question # 16

A business struggles to manage inquiries and follow-ups because data is spread across different systems.

Which software type could address this problem?

A.

Digital marketing management system

B.

Advanced business intelligence platform

C.

Customer relationship management system

D.

Enterprise resource planning solution

Full Access
Question # 17

Which term describes a type of computer built using environment-friendly materials and designed to save energy?

A.

Green

B.

Workstation

C.

Personal

D.

Server

Full Access
Question # 18

Which IT approach to development and infrastructure focuses on automating and pushing quality code faster?

A.

theory of reciprocity

B.

DevOps

C.

Business architecture

D.

Bimodal IT

Full Access
Question # 19

What is the importance of the partners and suppliers dimension of the ITIL model?

A.

Staffing an organization fosters the creation of value.

B.

The relationship with both suppliers and consumers must create value.

C.

Supplying data allows companies to make wise investments and assemble technology solutions.

D.

The creation of value is solely beneficial to the customer.

Full Access
Question # 20

What is a customer relationship management (CRM) system used for?

A.

To provide fundamental decision-making support.

B.

To support diverse business functions such as accounting, manufacturing, marketing, and human resources.

C.

To improve supplier and customer relations and increase revenues.

D.

To increase customer loyalty and retention and increase an organization's profitability.

Full Access
Question # 21

An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.

Which phase of CRM does this describe?

A.

Predicting

B.

Defining

C.

Reporting

D.

Analyzing

Full Access
Question # 22

A company wants to streamline operations and ensure that different departments can share information and coordinate decisions using a unified digital platform.

Which type of software supports this goal?

A.

Project management

B.

Enterprise system

C.

Transaction processing system

D.

Data analysis platform

Full Access
Question # 23

What should an IT leader consider when creating a presentation that will be delivered to the board of directors?

A.

Be through and provide all the technical details

B.

Focus on problems rather than solutions

C.

Brevity is key because of time constraints

D.

Know the audience and speak to their level of knowledge

Full Access
Question # 24

Which two reasons show why organizations need to effectively grasp the deep currents of technological evolution? Choose 2 answers.

A.

To use this knowledge to protect themselves against sudden and fatal technological obsolescence

B.

To provide an organization with a valuable strategic advantage

C.

To keep its manufacturing production running at the current rate

D.

To discover ways to reduce its number of employees and, at the same time, reduce labor costs

Full Access
Question # 25

A director of software development observes friction between various team members. How should the director alleviate team friction?

A.

Ask each team member to provide weekly feedback via email

B.

Create a culture of showing appreciation

C.

Nurture competition among team members

D.

Provide a public forum for anonymous feedback

Full Access
Question # 26

A company's IT team often struggles to track the location of laptops and mobile devices across departments.

Which type of software would support this function?

A.

Backup and recovery software

B.

Patch management software

C.

Asset management software

D.

Service request tracking software

Full Access
Question # 27

What is the purpose of an IT ethics policy?

A.

To require approval before implementing new technologies

B.

To define values as adherence to internal technical policies

C.

To guide decisions based on values and standards

D.

To encourage proper conduct in IT project budgeting

Full Access
Question # 28

Which risk do strategic chief information officers face?

A.

Falling behind on market trends

B.

Organizational resistance to change

C.

Focusing too much on technical solutions

D.

Losing credibility with non-technical employees

Full Access
Question # 29

Which factor in the planning process is considered true, real, or certain without proof or demonstration?

A.

Project requirements

B.

Project theory

C.

Project Assumption

D.

Project objective

Full Access
Question # 30

What distinguishes a wireframe from a prototype?

A.

It focuses on backend logic and data flow.

B.

It is created without input from users.

C.

It shows layout and structure without interaction.

D.

It provides a functional version of the solution.

Full Access
Question # 31

What is the function of the Internet Protocol (IP) in the Transmission Control Protocol (TCP)/Internet Protocol (IP) stack?

A.

To provide a user interface for network applications

B.

To encrypt data for secure transmission

C.

To direct data packets between devices

D.

To ensure data packets are delivered in order

Full Access
Question # 32

Which epolicy is the starting point and the umbrella for all other policies the organization might establish?

A.

Computer use

B.

Email privacy

C.

Acceptable use

D.

Information privacy

Full Access
Question # 33

Which method of encryption enables secure communication using a shared secret key?

A.

Asymmetrical encryption

B.

Secure hashing

C.

Data masking

D.

Symmetrical encryption

Full Access
Question # 34

How can a chief information officer become a transformational leader?

A.

By overseeing non-technical business functions

B.

By prioritizing operational stability and change

C.

By focusing on maintaining existing systems

D.

By driving innovation and business growth

Full Access
Question # 35

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

A.

Monitors enclosures

B.

Protects against encrypted attacks

C.

Provides authentication and authorization

D.

Features full-time monitoring

Full Access
Question # 36

What is a global workforce trend that will impact IT leaders?

A.

Growing demand for service-oriented employment opportunities

B.

Increasing demand for highly skilled professionals in specialized fields

C.

Decreasing reliance on technical roles due to automation

D.

Decreasing emphasis on specialized education and training

Full Access
Question # 37

An organization struggles with slow, multi-step payroll operations across disconnected systems.

Which type of software could streamline this process?

A.

Talent development tracking platform

B.

Training compliance monitoring tool

C.

Internal communication portal

D.

Enterprise resource planning

Full Access
Question # 38

What is a feature of a supply chain enterprise resource planning (ERP) system?

A.

Reduced lead times

B.

Brand awareness via marketing

C.

Inventory and material tracking

D.

Automated customer service

Full Access
Question # 39

What is the role of executive sponsors in a project?

A.

Tracking to ensure all key project milestones are completed on time

B.

Defining and developing the project plan

C.

Providing financial resources for a project

D.

Collaborating with project staff to ensure their own interests are represented

Full Access
Question # 40

Which hardware component controls and carries out operations within a computer system?

A.

Hard drive

B.

Random access memory

C.

Graphics card

D.

Processor

Full Access
Question # 41

Which hacking method involves forging the from address so that replies go to an unintended audience?

A.

Packet tampering

B.

Spoofing

C.

Spyware

D.

Hoaxes

Full Access
Question # 42

What happens during the design phase of the systems development life cycle (SDLC)?

A.

Full descriptions of the desired features and operations of the system are established.

B.

A high-level strategy and goals for an intended project are established.

C.

Requirements from business stakeholders and subject-matter experts are identified.

D.

End-user business requirements are identified, and project goals are refined into defined functions and operations.

Full Access
Question # 43

Which type of cybersecurity threat collects information from a system without authorization?

A.

Ransomware

B.

Brute force attack

C.

Spyware

D.

Man-in-the-middle

Full Access
Question # 44

Which feature makes mobile operating systems different from desktop operating systems in business use?

A.

Mobile operating systems support complex, multi-user access across enterprise domains.

B.

Mobile operating systems include advanced tools for high-end peripheral hardware.

C.

Mobile operating systems enable virtualization of enterprise server environments.

D.

Mobile operating systems function efficiently on battery-powered, touchscreen devices.

Full Access
Question # 45

Which outsourcing model has the least security compliance risk?

A.

Cloud-based outsourcing

B.

Nearshore outsourcing

C.

Offshore outsourcing

D.

Onshore outsourcing

Full Access
Question # 46

A logistics company wants to reduce fuel costs and improve route efficiency.

Which type of software would support this goal?

A.

Warehouse management software

B.

Procurement management software

C.

Demand forecasting software

D.

Supply chain management software

Full Access
Question # 47

Which process is improved by manufacturing enterprise resource planning (ERP) systems?

A.

Coordinating materials and production

B.

Developing packaging designs

C.

Managing employee time-off

D.

Designing prototypes

Full Access
Question # 48

Which type of operating system is commonly used in specialized business devices like point-of-sale systems, industrial controllers, or smart appliances?

A.

A desktop system used to run office productivity software

B.

A Chrome OS cloud-based system used to access web applications from a laptop

C.

A Linux-based system designed to operate on embedded hardware

D.

A mobile system designed for personal communication and entertainment

Full Access
Question # 49

In which way is decision-making different from vision in leadership?

A.

Decision-making addresses current priorities and actions.

B.

Decision-making facilitates collaboration across departments.

C.

Decision-making explores broad goals for long-term impact.

D.

Decision-making outlines a strategic framework for innovation.

Full Access
Question # 50

How might a leader manage conflict constructively?

A.

By limiting conversations to scheduled team updates

B.

By favoring top-down decisions to reduce conflict arising from team input

C.

By fostering respectful dialogue between employees

D.

By prioritizing task completion over team dynamics

Full Access
Question # 51

What are the other elements in the triple constraint along with cost?

A.

Procurement and compliance

B.

Risk and integration

C.

Quality and resources

D.

Scope and time

Full Access
Question # 52

What does the Information Technology Infrastructure Library (ITIL) provide to organizations in managing IT services?

A.

Enforcement of detailed operational controls across departments

B.

Provision of structured guidance for operational considerations

C.

Alignment of processes with external compliance standards

D.

Promotion of transparency through ethical oversight of services

Full Access
Question # 53

What is an example of a knowledge factor used for authentication?

A.

ID card

B.

Password

C.

Security token

D.

Fingerprint

Full Access
Question # 54

Which business layer determines which products or services are being sold and to whom?

A.

Systems

B.

Operating

C.

Corporate

D.

Strategy

Full Access
Question # 55

Which advantage does a storyboard provide in a rapid design challenge?

A.

It can quickly communicate a solution.

B.

It requires extensive resources and time to create.

C.

It allows for detailed coding and programming.

D.

It can be used to finalize the product design.

Full Access
Question # 56

Which role does IT compliance play in protecting an organization?

A.

It sets flexible privacy rules and allows independent oversight.

B.

It supports regular audits and secure system updates.

C.

It shifts responsibility for data issues to IT contractors.

D.

It helps prevent legal penalties and reputational harm.

Full Access
Question # 57

What is the purpose of the Information Technology Infrastructure Library (ITIL)?

A.

To guide software development methodologies for managing development lifecycles

B.

To align IT services with business needs through detailed practices

C.

To develop a universal coding language for IT professionals

D.

To set standards for hardware manufacturing processes

Full Access
Question # 58

What is communications media in a unified communications system?

A.

Software-based phone that uses VoIP

B.

Mobile conferencing phone-like tool

C.

Signal converter for analog phones

D.

Traditional phone with networking support

Full Access
Question # 59

What is the definition of the accountability vs. ownership paradox?

A.

An evaluation of where a business is headed, what it wants to achieve, and how it will support its objectives

B.

The ability to use a uniquely enterprise view to create business process change

C.

A situation in which a company's CIO is responsible for the outcomes of technology implementations but does not have the power to change ' business processes

D.

A situation in which the CEO is concerned they might be overlooking a digital disrupter that competitors have surely discovered

Full Access
Question # 60

Which term refers to the ability to adapt a facility layout to accommodate new product lines or technology upgrades?

A.

Scalability

B.

Material requirements planning

C.

Operational redundancy

D.

Sustainability

Full Access
Question # 61

Which type of malware disguises itself as legitimate software to gain access to systems?

A.

Keylogger

B.

Trojan horse

C.

Spyware

D.

Rootkit

Full Access
Question # 62

Which process includes assessing and prioritizing threats to reduce the potential impact on an organization?

A.

Threat modeling

B.

Penetration testing

C.

Cyber hygiene

D.

Risk management

Full Access
Question # 63

What are the responsibilities of the product owner in a Scrum project?

A.

Monitor velocity metrics and ensure team compliance

B.

Track task completion and update sprint burndown charts

C.

Prioritize requirements and manage the backlog

D.

Assist developers with blockers and code refactoring

Full Access