Special Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

WGU Information-Technology-Management WGU Information Technology Management QGC1 Exam Practice Test

Page: 1 / 7
Total 74 questions

WGU Information Technology Management QGC1 Questions and Answers

Question 1

Which operational customer relationship management (CRM) technology maintains customer data and identifies prospective customers for future sales?

Options:

A.

Cross-selling

B.

Campaign management

C.

Call scripting

D.

Contact management

Question 2

Which hacking method involves forging the from address so that replies go to an unintended audience?

Options:

A.

Packet tampering

B.

Spoofing

C.

Spyware

D.

Hoaxes

Question 3

What is a customer relationship management (CRM) system used for?

Options:

A.

To provide fundamental decision-making support.

B.

To support diverse business functions such as accounting, manufacturing, marketing, and human resources.

C.

To improve supplier and customer relations and increase revenues.

D.

To increase customer loyalty and retention and increase an organization's profitability.

Question 4

Which type of artificial intelligence should it use to meet this goal?

Options:

A.

Intelligent agent

B.

Genetic algorithm

C.

Neural network

D.

Fuzzy logic

Question 5

Which minor component holds non-volatile memory?

Options:

A.

Arithmetic-logic unit (ALU)

B.

Read-only memory (ROM)

C.

Random-access memory (RAM)

D.

Solid-state drive (SSD)

Question 6

Which business layer determines which products or services are being sold and to whom?

Options:

A.

Systems

B.

Operating

C.

Corporate

D.

Strategy

Question 7

What are ecological results of the expanded use of technology? Choose 2 answers.

Options:

A.

Lengthened life span of computer equipment

B.

Increased carbon emissions

C.

More people purchasing computer equipment

D.

Decreased electronic waste

E.

Increased energy consumption

Question 8

Which type of network topology entirely shuts down if there is a break in the main cable?

Options:

A.

Ring

B.

Wireless

C.

Bus

D.

Star

Question 9

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

Options:

A.

Monitors enclosures

B.

Protects against encrypted attacks

C.

Provides authentication and authorization

D.

Features full-time monitoring

Question 10

Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.

Options:

A.

Automates the different activities of the supply chain

B.

Serves as a unique product identifier

C.

Tracks a product's journey from manufacturing facility to store

D.

Discards inconsistent, incorrect, or incomplete information

Question 11

What is a benefit of in-house development and maintenance of information technology systems?

Options:

A.

Increases financial savings because it costs less than outsourcing the work

B.

Utilizes state-of-the-art technological resources without having to acquire and maintain them

C.

Creates a better quality workforce by combining both technical and business skills

D.

Allows for the fastest development time and ability to scale to new demand levels

Question 12

Which system provides a foundation for collaboration between departments, enabling people in different business areas to communicate?

Options:

A.

Enterprise resource planning (ERP)

B.

Supply chain management (SCM)

C.

Customer relationship management (CRM)

D.

Electronic data interchange (EDI)

Question 13

An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.

Which phase of CRM does this describe?

Options:

A.

Predicting

B.

Defining

C.

Reporting

D.

Analyzing

Question 14

What is an advantage of virtualization?

Options:

A.

Restricts the availability of resources

B.

Reduces the cost of ownership and makes IT simpler to manage

C.

Allows for greater workload stagnation

D.

Increases reliance on manual operations

Question 15

Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.

Options:

A.

Business continuity plans

B.

Augmentation plans

C.

Authentication plans

D.

Disaster recovery plans

E.

Backup and recovery plans

Question 16

Which term is used to describe the business needs, justification, requirements, and boundaries of a project?

Options:

A.

Project scope

B.

Project management

C.

Project milestone

D.

Project plan

Question 17

Which factor in the planning process is considered true, real, or certain without proof or demonstration?

Options:

A.

Project requirements

B.

Project theory

C.

Project Assumption

D.

Project objective

Question 18

Which type of software would a company use to view the physical world with computer-generated layers of information added to it?

Options:

A.

Expert systems

B.

Intelligent agent

C.

Neural network

D.

Augmented reality

Question 19

Which business layer implements the processes, organizational designs, and compensation structures that enable the company to execute plans?

Options:

A.

Strategy

B.

Operating

C.

Corporate

D.

Systems

Question 20

Which lifecycle stage of ITIL focuses on creating services and procedures?

Options:

A.

Service design (SD)

B.

Service transition (ST)

C.

Service strategy (SS)

D.

Service operation (SO)

Question 21

Which type of memory describes a special type of rewritable memory that is compact and portable?

Options:

A.

Flash

B.

Random access

C.

Cache

D.

Read-only

Question 22

What is a common risk associated with outsourcing software development?

Options:

A.

Risk of breach of confidential information

B.

High cost of developers' salaries

C.

Lack of flexibility to respond to rapid market changes

D.

Short-term contracts that are difficult to renew

Page: 1 / 7
Total 74 questions