Weekend Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

WGU Information-Technology-Management Dumps

WGU Information Technology Management QGC1 Questions and Answers

Question 1

A hospital has implemented several new software systems and has chosen to implement ITIL to maintain and continually improve services. Which need influenced the hospital's decision to implement ITIL?

Options:

A.

Increased dependence on human interaction

B.

Increased access to global consumer

C.

Increased dependence on technology

D.

Increased access to global vendors

Question 2

Which statement describes the planning phase of the systems development life cycle (SDLC)?

Options:

A.

Performing corrections, additions, and upgrades to ensure the system continually meet business goals

B.

Establishing full descriptions of the desired features and operations of the system

C.

Establishing a high-level strategy and goals for an intended project

D.

Bringing project pieces together, checking interoperability, and verifying functionality

Question 3

Why is employee training important in an ethical IT use policy?

Options:

A.

To create automatic updates of software patches

B.

To reduce sensitivity to the accuracy of company communications

C.

To make employees understand the company's culture and ethical boundaries

D.

To eliminate information management risks

Question 4

Employees in different business levels need knowledge to effectively drive their work and decision-making.

Which term describes the trait of an IT leader to effectively translate perspectives at both a broad and corporate strategic level?

Options:

A.

Systems thinking

B.

Coordinate

C.

Courage

D.

Breadth

Question 5

Which pair of terms describes an add-on that purports to serve a useful function while transmitting user data and displaying pop-up boxes without the user's knowledge or permission?

Options:

A.

Downtime and uptime

B.

Hackers and viruses

C.

Ethics and cost

D.

Adware and spyware

Question 6

What is a common risk associated with outsourcing software development?

Options:

A.

Risk of breach of confidential information

B.

High cost of developers' salaries

C.

Lack of flexibility to respond to rapid market changes

D.

Short-term contracts that are difficult to renew

Question 7

A team tests a prototype prior to meeting with a company's client and discovers the "My Account" menu is not working. The team revises the code and presents a functioning prototype to the client.

Which advantage of prototyping does this describe?

Options:

A.

Static example of the finished product

B.

Blueprint of the entire project

C.

Early detection of coding errors

D.

Detailed instructions for development

Question 8

A manager asks a team member to identify the top five customers by total dollars spent on the company's services in the past calendar year. Which phase of the customer relationship management (CRM) system does this represent?

Options:

A.

Distributing

B.

Analyzing

C.

Predicting

D.

Reporting

Question 9

What should an IT leader consider when creating a presentation that will be delivered to the board of directors?

Options:

A.

Be through and provide all the technical details

B.

Focus on problems rather than solutions

C.

Brevity is key because of time constraints

D.

Know the audience and speak to their level of knowledge

Question 10

What are ecological results of the expanded use of technology? Choose 2 answers.

Options:

A.

Lengthened life span of computer equipment

B.

Increased carbon emissions

C.

More people purchasing computer equipment

D.

Decreased electronic waste

E.

Increased energy consumption

Question 11

Which factor in the planning process is considered true, real, or certain without proof or demonstration?

Options:

A.

Project requirements

B.

Project theory

C.

Project assumption

D.

Project objective

Question 12

What is a customer relationship management (CRM) system used for?

Options:

A.

To provide fundamental decision-making support.

B.

To support diverse business functions such as accounting, manufacturing, marketing, and human resources.

C.

To improve supplier and customer relations and increase revenues.

D.

To increase customer loyalty and retention and increase an organization's profitability.

Question 13

Which business layer determines which products or services are being sold and to whom?

Options:

A.

Systems

B.

Operating

C.

Corporate

D.

Strategy

Question 14

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

Options:

A.

Monitors enclosures

B.

Protects against encrypted attacks

C.

Provides authentication and authorization

D.

Features full-time monitoring

Question 15

How does service-oriented architecture (SOA) help companies become more agile?

Options:

A.

Breaks the project into four phases to provide quicker feedback and improve results

B.

Aligns business needs and the management information system capabilities that support these needs

C.

Requires a tight adherence to a sequence of steps to accomplish the original goal

D.

Builds a working model of the system on a small scale to detect errors early in development

Question 16

Which term is used to describe the business needs, justification, requirements, and boundaries of a project?

Options:

A.

Project scope

B.

Project management

C.

Project milestone

D.

Project plan

Question 17

Which statement describes the development phase of the systems development life cycle (SDLC)?

Options:

A.

Physically constructing software and information systems using programming languages

B.

Performing corrections, additions, and upgrades to ensure the system continually meets business goals

C.

Bringing project pieces together, checking interoperability, and verifying functionality

D.

Placing the software or information system into production to allow users to perform business operations

Question 18

An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?

Options:

A.

Packet tampering

B.

Spoofing

C.

Elevation of privilege

D.

Hoaxing

Question 19

Which dashboard capability helps a business manager break down data into segments to understand it from different perspectives?

Options:

A.

Pivot

B.

Exploration

C.

Consolidation

D.

Slice-and-dice

Page: 1 / 7
Total 74 questions