Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Information-Technology-Management WGU Information Technology Management QGC2 Questions and Answers

Questions 4

How can a unified communications system meet the communication goals of most organizations?

Options:

A.

Manages customer expectations

B.

Reduces latency between parties

C.

Generates innovative solutions

D.

Makes employees more comfortable

Buy Now
Questions 5

Which customer relationship management (CRM) feature includes digitized customer support processes, such as ticket routing and escalation?

Options:

A.

Workflow automation

B.

Response queue analytics

C.

Channel preference management

D.

Interaction history management

Buy Now
Questions 6

What is the purpose of the Internet Use portion of the IT ethics policy?

Options:

A.

To improve worker productivity

B.

To specify which email messages may be read by others

C.

To identify company branding for use in communications

D.

To specify what a user can and cannot do with company printers

Buy Now
Questions 7

What is a feature of a supply chain enterprise resource planning (ERP) system?

Options:

A.

Reduced lead times

B.

Brand awareness via marketing

C.

Inventory and material tracking

D.

Automated customer service

Buy Now
Questions 8

What is the function of the Internet Protocol (IP) in the Transmission Control Protocol (TCP)/Internet Protocol (IP) stack?

Options:

A.

To provide a user interface for network applications

B.

To encrypt data for secure transmission

C.

To direct data packets between devices

D.

To ensure data packets are delivered in order

Buy Now
Questions 9

A team tests a prototype prior to meeting with a company's client and discovers the "My Account" menu is not working. The team revises the code and presents a functioning prototype to the client.

Which advantage of prototyping does this describe?

Options:

A.

Static example of the finished product

B.

Blueprint of the entire project

C.

Early detection of coding errors

D.

Detailed instructions for development

Buy Now
Questions 10

What is the purpose of the continual service improvement (CSI) stage in the Information Technology Infrastructure Library (ITIL)?

Options:

A.

It serves as a foundational step before moving on to other stages during the initial implementation of ITIL.

B.

It ensures IT services are aligned with changing needs, enabling ongoing changes to maintain relevance and effectiveness.

C.

It mandates an overhaul of IT systems every year to keep up with technological advancements and industry standards.

D.

It focuses on reducing IT costs by implementing saving measures and optimizing resource allocation.

Buy Now
Questions 11

Which IT ethics policy discloses some or all of the ways an organization gathers, uses, discloses, and manages customer or client data?

Options:

A.

Information privacy

B.

Email privacy

C.

Social media

D.

Acceptable use

Buy Now
Questions 12

Which staffing issue can occur with offshore outsourcing?

Options:

A.

High turnover with less consistency

B.

Increased time spent on coordination

C.

Limited visibility into daily work

D.

Longer onboarding timelines

Buy Now
Questions 13

A manager asks a team member to identify the top five customers by total dollars spent on the company's services in the past calendar year. Which phase of the customer relationship management (CRM) system does this represent?

Options:

A.

Distributing

B.

Analyzing

C.

Predicting

D.

Reporting

Buy Now
Questions 14

What is an advantage of virtualization?

Options:

A.

Restricts the availability of resources

B.

Reduces the cost of ownership and makes IT simpler to manage

C.

Allows for greater workload stagnation

D.

Increases reliance on manual operations

Buy Now
Questions 15

Why is user consent important in data collection?

Options:

A.

It authorizes indefinite use without further review.

B.

It replaces the need for user privacy policies.

C.

It confirms that users agree to specific data use.

D.

It allows flexible data use without safeguards.

Buy Now
Questions 16

Which action helps ensure legal compliance in IT?

Options:

A.

Focusing on implementing new IT systems

B.

Auditing IT practices on a regular basis

C.

Reviewing laws during annual planning

D.

Consulting external experts without follow-up

Buy Now
Questions 17

Which type of network topology entirely shuts down if there is a break in the main cable?

Options:

A.

Ring

B.

Wireless

C.

Bus

D.

Star

Buy Now
Questions 18

How do environmental, social, and governance (ESG) principles affect IT projects?

Options:

A.

They influence sustainability and ethics in decisions.

B.

They guide procurement based on economic factors.

C.

They place restrictions on how companies are structured.

D.

They emphasize successful planning processes and strategies.

Buy Now
Questions 19

A company wants to unify its inventory, production, and financial reporting systems to improve coordination.

Which type of software would support this?

Options:

A.

Digital inventory logging utility

B.

Team collaboration scheduling

C.

Departmental metrics dashboard tool

D.

Enterprise resource planning

Buy Now
Questions 20

Which cybersecurity method ensures that data remains unchanged during transmission?

Options:

A.

Encryption

B.

Access control lists

C.

Authentication

D.

Hashing

Buy Now
Questions 21

Which type of memory describes a special type of rewritable memory that is compact and portable?

Options:

A.

Flash

B.

Random access

C.

Cache

D.

Read-only

Buy Now
Questions 22

What is a common risk associated with outsourcing software development?

Options:

A.

Risk of breach of confidential information

B.

High cost of developers' salaries

C.

Lack of flexibility to respond to rapid market changes

D.

Short-term contracts that are difficult to renew

Buy Now
Questions 23

How does service-oriented architecture (SOA) help companies become more agile?

Options:

A.

Breaks the project into four phases to provide quicker feedback and improve results

B.

Aligns business needs and the management information system capabilities that support these needs

C.

Requires a tight adherence to a sequence of steps to accomplish the original goal

D.

Builds a working model of the system on a small scale to detect errors early in development

Buy Now
Questions 24

Which statement describes the role of Information Technology Infrastructure Library (ITIL) in modern IT management?

Options:

A.

ITIL dictates the step-by-step processes for IT departments.

B.

ITIL replaces existing IT management frameworks.

C.

ITIL offers adaptable guidelines to enhance IT services.

D.

ITIL is applicable to large enterprises with extensive IT departments.

Buy Now
Questions 25

How does IT transparency support ethics?

Options:

A.

It explains how data is collected, used, and protected.

B.

It supports internal communication to promote collaboration.

C.

It shares timelines, protocols, and decisions to inform teams.

D.

It emphasizes strategic goals to strengthen leadership.

Buy Now
Questions 26

Which statement describes the development phase of the systems development life cycle (SDLC)?

Options:

A.

Physically constructing software and information systems using programming languages

B.

Performing corrections, additions, and upgrades to ensure the system continually meets business goals

C.

Bringing project pieces together, checking interoperability, and verifying functionality

D.

Placing the software or information system into production to allow users to perform business operations

Buy Now
Questions 27

Which outsourcing model has the least security compliance risk?

Options:

A.

Cloud-based outsourcing

B.

Nearshore outsourcing

C.

Offshore outsourcing

D.

Onshore outsourcing

Buy Now
Questions 28

Which cybersecurity method prevents unauthorized users from accessing readable data?

Options:

A.

Steganography

B.

Data masking

C.

Access control lists

D.

Encryption

Buy Now
Questions 29

What is a primary purpose of using prototypes in the business analysis process?

Options:

A.

To develop the back-end code of the final product

B.

To replace user manuals with interactive simulations

C.

To model requirements and gather early feedback from stakeholders

D.

To finalize the visual design and branding of the product

Buy Now
Questions 30

Which characteristic defines Vision in leadership?

Options:

A.

Implementing structured financial reporting procedures

B.

Focusing consistently on daily operational tasks

C.

Assigning specific roles and responsibilities to employees

D.

Establishing goals that promote long-term growth

Buy Now
Questions 31

Employees in different business levels need knowledge to effectively drive their work and decision-making.

Which term describes the trait of an IT leader to effectively translate perspectives at both a broad and corporate strategic level?

Options:

A.

Systems thinking

B.

Coordinate

C.

Courage

D.

Breadth

Buy Now
Questions 32

How should high-risk, high-impact items be handled?

Options:

A.

Develop a plan to revisit them in future phases

B.

Draft a summary of risks for status reports

C.

Track them without taking immediate action

D.

Create mitigation plans to address them

Buy Now
Questions 33

How is urban population growth influencing IT leadership strategies globally?

Options:

A.

By balancing upgrades across urban and rural technology networks

B.

By expanding urban IT infrastructure at a slower pace to manage costs

C.

By increasing the demand for scalable urban digital services

D.

By preserving the traditional pace of urban service delivery

Buy Now
Questions 34

What does implementation planning involve in the system development life cycle (SDLC)?

Options:

A.

Summarizing user experiences after deployment

B.

Defining and evaluating the coding standards

C.

Reviewing individual software components

D.

Organizing and scheduling the system’s rollout

Buy Now
Questions 35

Which phase of the waterfall methodology is executed immediately prior to the implementation phase?

Options:

A.

Analysis

B.

Testing

C.

Development

D.

Maintenance

Buy Now
Questions 36

What is an example of a knowledge factor used for authentication?

Options:

A.

ID card

B.

Password

C.

Security token

D.

Fingerprint

Buy Now
Questions 37

How do small and medium enterprise (SME)-focused enterprise resource planning (ERP) systems help small businesses?

Options:

A.

They simplify budgets by reducing reporting.

B.

They automate growth strategy design.

C.

They provide core functions at low cost.

D.

They deliver advanced forecasting.

Buy Now
Questions 38

Which method protects against unauthorized physical access to sensitive data?

Options:

A.

Software patching

B.

Data encryption

C.

Firewall configuration

D.

Biometric authentication

Buy Now
Questions 39

How does operational decision-making differ from strategic decision-making?

Options:

A.

It establishes the mission statement of the company.

B.

It focuses on long-term goals.

C.

It involves day-to-day activities.

D.

It sets the overall direction of the company.

Buy Now
Questions 40

Which method of encryption enables secure communication using a shared secret key?

Options:

A.

Asymmetrical encryption

B.

Secure hashing

C.

Data masking

D.

Symmetrical encryption

Buy Now
Questions 41

Which term describes a type of computer built using environment-friendly materials and designed to save energy?

Options:

A.

Green

B.

Workstation

C.

Personal

D.

Server

Buy Now
Questions 42

A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?

Options:

A.

Virtual reality

B.

Neural network

C.

Intelligent agent

D.

Fuzzy logic

Buy Now
Questions 43

What is the function of a primary key in a database table?

Options:

A.

To connect tables to external systems

B.

To manage user access for each table row

C.

To identify each record in a table

D.

To improve storage efficiency for large tables

Buy Now
Questions 44

What are the other elements in the triple constraint along with cost?

Options:

A.

Procurement and compliance

B.

Risk and integration

C.

Quality and resources

D.

Scope and time

Buy Now
Questions 45

How can a customer relationship management (CRM) system support marketing strategies aimed at specific groups?

Options:

A.

By logging interactions

B.

By segmenting data

C.

By mapping sales territories

D.

By reporting financial information

Buy Now
Questions 46

What does the Information Technology Infrastructure Library (ITIL) provide to organizations in managing IT services?

Options:

A.

Enforcement of detailed operational controls across departments

B.

Provision of structured guidance for operational considerations

C.

Alignment of processes with external compliance standards

D.

Promotion of transparency through ethical oversight of services

Buy Now
Questions 47

Which two reasons show why organizations need to effectively grasp the deep currents of technological evolution? Choose 2 answers.

Options:

A.

To use this knowledge to protect themselves against sudden and fatal technological obsolescence

B.

To provide an organization with a valuable strategic advantage

C.

To keep its manufacturing production running at the current rate

D.

To discover ways to reduce its number of employees and, at the same time, reduce labor costs

Buy Now
Questions 48

Which statement describes the planning phase of the systems development life cycle (SDLC)?

Options:

A.

Performing corrections, additions, and upgrades to ensure the system continually meet business goals

B.

Establishing full descriptions of the desired features and operations of the system

C.

Establishing a high-level strategy and goals for an intended project

D.

Bringing project pieces together, checking interoperability, and verifying functionality

Buy Now
Questions 49

What distinguishes a wireframe from a prototype?

Options:

A.

It focuses on backend logic and data flow.

B.

It is created without input from users.

C.

It shows layout and structure without interaction.

D.

It provides a functional version of the solution.

Buy Now
Questions 50

Which advantage does a storyboard provide in a rapid design challenge?

Options:

A.

It can quickly communicate a solution.

B.

It requires extensive resources and time to create.

C.

It allows for detailed coding and programming.

D.

It can be used to finalize the product design.

Buy Now
Questions 51

During which phase of the systems development life cycle (SDLC) does an organization turn a project’s focus to a physical or technical point of view by defining the architecture that will support the system?

Options:

A.

Maintenance

B.

Development

C.

Design

D.

Implementation

Buy Now
Questions 52

What is the meaning of scope creep?

Options:

A.

Managing new requests through change control

B.

Updating the project schedule

C.

Making minor changes to improve team efficiency

D.

Adding unapproved changes

Buy Now
Questions 53

A company wants to streamline operations and ensure that different departments can share information and coordinate decisions using a unified digital platform.

Which type of software supports this goal?

Options:

A.

Project management

B.

Enterprise system

C.

Transaction processing system

D.

Data analysis platform

Buy Now
Questions 54

Which organizational policy states that an employee should never send unsolicited emails outside the organization?

Options:

A.

Information use policy

B.

Employee monitoring policy

C.

Anti-spam policy

D.

Social media policy

Buy Now
Questions 55

Which feature of a customer relationship management (CRM) system allows sales representatives to track the progress of potential deals?

Options:

A.

Sales tracking

B.

Customer asset tracking

C.

Sales performance metrics

D.

Customer segmentation

Buy Now
Questions 56

What is a customer relationship management (CRM) system used for?

Options:

A.

To provide fundamental decision-making support.

B.

To support diverse business functions such as accounting, manufacturing, marketing, and human resources.

C.

To improve supplier and customer relations and increase revenues.

D.

To increase customer loyalty and retention and increase an organization's profitability.

Buy Now
Questions 57

Which feature makes mobile operating systems different from desktop operating systems in business use?

Options:

A.

Mobile operating systems support complex, multi-user access across enterprise domains.

B.

Mobile operating systems include advanced tools for high-end peripheral hardware.

C.

Mobile operating systems enable virtualization of enterprise server environments.

D.

Mobile operating systems function efficiently on battery-powered, touchscreen devices.

Buy Now
Questions 58

Which protocol provides for the collection, organization, and modification of information about managed devices on IP networks?

Options:

A.

Telnet protocol (TELNET)

B.

Hypertext Transfer Protocol (HTTP)

C.

Simple Network Management Protocol (SNMP)

D.

File Transfer Protocol (FTP)

Buy Now
Questions 59

Which business impact is attributed to the creation of a knowledge-dependent global society from growth in information industries?

Options:

A.

Autonomous agent

B.

Ambient digital experience

C.

Information of Everything

D.

Virtual assistant

Buy Now
Questions 60

What is a benefit of unified communications?

Options:

A.

Faster access to resources

B.

Increased storage capacity

C.

Centralized billing support

D.

Enhanced collaboration

Buy Now
Questions 61

What is a focus of the Information Technology Infrastructure Library's (ITIL) guidelines for service management?

Options:

A.

Reduction of direct engagement with end users

B.

Implementation of advanced technologies

C.

Minimization of operational expenses

D.

Alignment with business objectives

Buy Now
Questions 62

Which minor component holds non-volatile memory?

Options:

A.

Arithmetic-logic unit (ALU)

B.

Read-only memory (ROM)

C.

Random-access memory (RAM)

D.

Solid-state drive (SSD)

Buy Now
Questions 63

Which type of storage retains data even when the computer is powered off?

Options:

A.

Solid state drive (SSD)

B.

Optical drive

C.

Virtual memory

D.

Random access memory (RAM)

Buy Now
Exam Name: WGU Information Technology Management QGC2
Last Update: Dec 5, 2025
Questions: 210
Information-Technology-Management pdf

Information-Technology-Management PDF

$25.5  $84.99
Information-Technology-Management Engine

Information-Technology-Management Testing Engine

$30  $99.99
Information-Technology-Management PDF + Engine

Information-Technology-Management PDF + Testing Engine

$40.5  $134.99