Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

WGU Information-Technology-Management WGU Information Technology Management QGC1 Exam Practice Test

WGU Information Technology Management QGC1 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which tool can be used to list project tasks vertically against project time frame listed horizontally?

Options:

A.

PERT chart

B.

Project model

C.

Venn diagram

D.

Gantt chart

Question 2

Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.

Options:

A.

Business continuity plans

B.

Augmentation plans

C.

Authentication plans

D.

Disaster recovery plans

E.

Backup and recovery plans

Question 3

Which lifecycle stage of ITIL focuses on creating services and procedures?

Options:

A.

Service design (SD)

B.

Service transition (ST)

C.

Service strategy (SS)

D.

Service operation (SO)

Question 4

What is an example of a knowledge factor used for authentication?

Options:

A.

ID card

B.

Password

C.

Security token

D.

Fingerprint

Question 5

What is a method for confirming users' identities?

Options:

A.

Information secrecy

B.

Public key encryption

C.

Authentication

D.

Authorization

Question 6

Which business impact is attributed to the creation of a knowledge-dependent global society from growth in information industries?

Options:

A.

Autonomous agent

B.

Ambient digital experience

C.

Information of Everything

D.

Virtual assistant

Question 7

Which factor in the planning process is considered true, real, or certain without proof or demonstration?

Options:

A.

Project requirements

B.

Project theory

C.

Project Assumption

D.

Project objective

Question 8

Which system serves as an organization's backbone in providing fundamental decision-making support?

Options:

A.

Enterprise resource planning (ERP)

B.

Supply change management (SCM)

C.

Unified communications (UC)

D.

Customer relationship management (CRM)

Question 9

Which type of logical data structure uses graphics to illustrate relationships among data elements?

Options:

A.

Integration

B.

Structured query language

C.

Data model

D.

Relational database model

Question 10

A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?

Options:

A.

Virtual reality

B.

Neural network

C.

Intelligent agent

D.

Fuzzy logic

Question 11

Which software development approach builds a small-scale representation or working model of the system to ensure it meets the user and business requirements?

Options:

A.

Waterfall

B.

Rational unified process (RUP)

C.

Iterative

D.

Prototyping

Question 12

A hospital has implemented several new software systems and has chosen to implement ITIL to maintain and continually improve services. Which need influenced the hospital's decision to implement ITIL?

Options:

A.

Increased dependence on human interaction

B.

Increased access to global consumer

C.

Increased dependence on technology

D.

Increased access to global vendors

Question 13

An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.

Which phase of CRM does this describe?

Options:

A.

Predicting

B.

Defining

C.

Reporting

D.

Analyzing

Question 14

Which epolicy is the starting point and the umbrella for all other policies the organization might establish?

Options:

A.

Computer use

B.

Email privacy

C.

Acceptable use

D.

Information privacy

Question 15

What happens during the design phase of the systems development life cycle (SDLC)?

Options:

A.

Full descriptions of the desired features and operations of the system are established.

B.

A high-level strategy and goals for an intended project are established.

C.

Requirements from business stakeholders and subject-matter experts are identified.

D.

End-user business requirements are identified, and project goals are refined into defined functions and operations.

Question 16

An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?

Options:

A.

Packet tampering

B.

Spoofing

C.

Elevation of privilege

D.

Hoaxing

Question 17

Which two reasons show why organizations need to effectively grasp the deep currents of technological evolution? Choose 2 answers.

Options:

A.

To use this knowledge to protect themselves against sudden and fatal technological obsolescence

B.

To provide an organization with a valuable strategic advantage

C.

To keep its manufacturing production running at the current rate

D.

To discover ways to reduce its number of employees and, at the same time, reduce labor costs

Question 18

Which pair of terms describes an add-on that purports to serve a useful function while transmitting user data and displaying pop-up boxes without the user's knowledge or permission?

Options:

A.

Downtime and uptime

B.

Hackers and viruses

C.

Ethics and cost

D.

Adware and spyware

Question 19

Which information system facilitates the sharing of data between the human resources and purchasing department in the same corporation?

Options:

A.

Executive support (ES)

B.

Geographic information system (GIS)

C.

Enterprise resource planning (ERP)

D.

Customer relationship management (CRM)