Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

WGU Information-Technology-Management WGU Information Technology Management QGC1 Exam Practice Test

Page: 1 / 7
Total 74 questions

WGU Information Technology Management QGC1 Questions and Answers

Question 1

Which system provides a foundation for collaboration between departments, enabling people in different business areas to communicate?

Options:

A.

Enterprise resource planning (ERP)

B.

Supply chain management (SCM)

C.

Customer relationship management (CRM)

D.

Electronic data interchange (EDI)

Question 2

When should a product management team utilize a prototype?

Options:

A.

While creating a way to show how the various features in a new application will work together.

B.

When a preliminary model is needed to seek user feedback

C.

When testing various user interface designs for a new application

D.

While creating training on a new application for IT Technicians

Question 3

An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.

Which phase of CRM does this describe?

Options:

A.

Predicting

B.

Defining

C.

Reporting

D.

Analyzing

Question 4

Which type of software would a company use to view the physical world with computer-generated layers of information added to it?

Options:

A.

Expert systems

B.

Intelligent agent

C.

Neural network

D.

Augmented reality

Question 5

Which scenario would cause an organization to create a global team?

Options:

A.

As the organization grows it is becoming difficult to find talent in the local market.

B.

For security purposes the organization is moving to a private cloud provider.

C.

The organization is embarking on a digital transformation effort.

D.

The organization's largest client is the United States Military.

Question 6

An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?

Options:

A.

Packet tampering

B.

Spoofing

C.

Elevation of privilege

D.

Hoaxing

Question 7

What is a customer relationship management (CRM) system used for?

Options:

A.

To provide fundamental decision-making support.

B.

To support diverse business functions such as accounting, manufacturing, marketing, and human resources.

C.

To improve supplier and customer relations and increase revenues.

D.

To increase customer loyalty and retention and increase an organization's profitability.

Question 8

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

Options:

A.

Monitors enclosures

B.

Protects against encrypted attacks

C.

Provides authentication and authorization

D.

Features full-time monitoring

Question 9

What is the expert system type of artificial intelligence?

Options:

A.

A system that imitates the reasoning processes used by skilled humans

B.

A system that attempts to emulate the way a typical human brain works

C.

The longest identified stretch of dependent activities measured from start to finish

D.

Knowledge-based information system that accomplishes specific tasks on behalf of its users

Question 10

Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.

Options:

A.

Business continuity plans

B.

Augmentation plans

C.

Authentication plans

D.

Disaster recovery plans

E.

Backup and recovery plans

Question 11

Which factor in the planning process is considered true, real, or certain without proof or demonstration?

Options:

A.

Project requirements

B.

Project theory

C.

Project Assumption

D.

Project objective

Question 12

A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?

Options:

A.

Virtual reality

B.

Neural network

C.

Intelligent agent

D.

Fuzzy logic

Question 13

Which tool can be used to list project tasks vertically against project time frame listed horizontally?

Options:

A.

PERT chart

B.

Project model

C.

Venn diagram

D.

Gantt chart

Question 14

A team tests a prototype prior to meeting with a company's client and discovers the "My Account" menu is not working. The team revises the code and presents a functioning prototype to the client.

Which advantage of prototyping does this describe?

Options:

A.

Static example of the finished product

B.

Blueprint of the entire project

C.

Early detection of coding errors

D.

Detailed instructions for development

Question 15

Which organizational policy states that an employee should never send unsolicited emails outside the organization?

Options:

A.

Information use policy

B.

Employee monitoring policy

C.

Anti-spam policy

D.

Social media policy

Question 16

What should an IT leader consider when creating a presentation that will be delivered to the board of directors?

Options:

A.

Be through and provide all the technical details

B.

Focus on problems rather than solutions

C.

Brevity is key because of time constraints

D.

Know the audience and speak to their level of knowledge

Question 17

Which statement describes the development phase of the systems development life cycle (SDLC)?

Options:

A.

Physically constructing software and information systems using programming languages

B.

Performing corrections, additions, and upgrades to ensure the system continually meets business goals

C.

Bringing project pieces together, checking interoperability, and verifying functionality

D.

Placing the software or information system into production to allow users to perform business operations

Question 18

Which type of logical data structure uses graphics to illustrate relationships among data elements?

Options:

A.

Integration

B.

Structured query language

C.

Data model

D.

Relational database model

Question 19

Why is employee training important in an ethical IT use policy?

Options:

A.

To create automatic updates of software patches

B.

To reduce sensitivity to the accuracy of company communications

C.

To make employees understand the company's culture and ethical boundaries

D.

To eliminate information management risks

Page: 1 / 7
Total 74 questions