Which type of cybersecurity threat spreads across networks without needing to attach itself to a program or file?
Ransomware
Trojan horse
Worm
Virus
Comprehensive and Detailed Explanation From Exact Extract:
A worm is a type of self-replicating malware that can spread across networks without attaching itself to a host program or file. Worms exploit vulnerabilities in network protocols, operating systems, or software to move from one device to another automatically. Once inside a system, they can consume bandwidth, overload systems, install backdoors, or deliver additional malicious payloads.
Key characteristics of a worm include:
Standalone malware: Does not need to embed itself in another program.
Self-replicating and network-aware: Designed to spread rapidly across networks.
Often automatic propagation: Requires little or no user interaction once launched.
Why the other options are incorrect:
A. Ransomware – Ransomware encrypts data and demands payment but is usually delivered via another malware vector (like a trojan or phishing email). It is not defined by independent network-spreading behavior.
B. Trojan horse – A trojan disguises itself as legitimate software to trick users into installing it. It does not self-replicate across networks.
D. Virus – A virus requires a host program or file to attach to and typically spreads when that file is shared or executed. This is explicitly different from a worm, which does not need to attach to a file or program.
Therefore, the correct answer is C. Worm, as it is the threat type that spreads independently across networks without needing a host file or program.
How does a leader demonstrate empowerment?
By outlining job expectations to enhance clarity
By using authority to oversee decisions
By guiding strategy while involving team input
By supporting employee decision-making
Comprehensive and Detailed Explanation From Exact Extract:
In management and leadership principles, empowerment means giving employees the authority, autonomy, and confidence to make decisions, solve problems, and take ownership of their work. A leader demonstrates empowerment by supporting employee decision-making, encouraging them to use their judgment, and backing them when they take responsible initiative.
Key points associated with empowerment in IT and organizational leadership concepts include:
Delegating decision-making authority where appropriate.
Encouraging employees to propose solutions, not just follow instructions.
Providing support, coaching, and resources, then trusting the team to act.
Creating an environment where employees feel safe to contribute ideas and take ownership.
Why the other options are not the best match:
A. By outlining job expectations to enhance clarity – Setting clear expectations is part of good management, but it is more about structure and guidance than empowerment.
B. By using authority to oversee decisions – This reflects a control-oriented style, not empowerment. It centralizes decisions with the leader instead of sharing power.
C. By guiding strategy while involving team input – This is collaborative and positive, but the emphasis is still on the leader guiding strategy. Empowerment focuses more directly on enabling others to decide and act.
Therefore, the behavior that most clearly reflects empowerment is supporting employee decision-making, making D the correct answer.
Which cybersecurity method prevents unauthorized users from accessing readable data?
Steganography
Data masking
Access control lists
Encryption
Encryption is the process of converting data into an unreadable format (ciphertext) that can only be accessed or decrypted by authorized users with the proper key. This ensures that even if unauthorized individuals access the data, they cannot interpret or misuse it.
Option A: Steganography hides data but does not inherently protect access.
Option B: Data masking obfuscates data for testing or limited use but is not a comprehensive security method.
Option C: Access control lists restrict access but do not make data unreadable.
Therefore, the cybersecurity method that prevents unauthorized users from accessing readable data is Encryption.
What is an advantage of virtualization?
Restricts the availability of resources
Reduces the cost of ownership and makes IT simpler to manage
Allows for greater workload stagnation
Increases reliance on manual operations
Understanding Virtualization:
Virtualization is the process of creating virtual versions of physical resources, such as servers, storage, or networks, to maximize their utilization.
Cost Reduction and Simplified Management:
Virtualization reduces hardware costs by allowing multiple virtual machines to run on a single physical server.
It simplifies IT management by enabling easier resource allocation, scaling, and disaster recovery.
Why Other Options Are Incorrect:
Option A: Virtualization increases resource availability, not restricts it.
Option C: Virtualization enhances workload distribution, reducing stagnation.
Option D: It reduces reliance on manual operations by enabling automation and centralized control.
How might a leader manage conflict constructively?
By limiting conversations to scheduled team updates
By favoring top-down decisions to reduce conflict arising from team input
By fostering respectful dialogue between employees
By prioritizing task completion over team dynamics
Effective leaders manage conflict constructively by encouraging open, respectful dialogue between employees. This allows issues to be addressed directly, builds trust, and strengthens team cohesion. Constructive conflict management focuses on resolution and collaboration rather than suppression or avoidance.
Option A: Incorrect—restricting conversations can allow conflicts to grow unresolved.
Option B: Incorrect—top-down control may suppress input and damage morale.
Option D: Incorrect—ignoring team dynamics undermines long-term effectiveness.
Thus, the best approach is fostering respectful dialogue between employees.
Which lifecycle stage of ITIL focuses on creating services and procedures?
Service design (SD)
Service transition (ST)
Service strategy (SS)
Service operation (SO)
Lifecycle Stage Overview in ITIL:The Service Design (SD) stage in ITIL focuses on creating and refining services and procedures that meet business requirements. It involves planning and designing new or updated services to ensure alignment with strategic business objectives.
Core Objectives of Service Design:
Designing services and processes to deliver high-quality outcomes.
Ensuring services are cost-effective, scalable, and aligned with the business's technical and operational requirements.
Key Elements of Service Design:
Service catalog management.
Capacity, availability, and continuity planning.
Service level management.
Incorrect Options Analysis:
Service Transition (ST): Focuses on moving new or changed services into operation, not designing them.
Service Strategy (SS): Involves defining the organization's strategic approach, not the specifics of service creation.
Service Operation (SO): Manages day-to-day operations of IT services, focusing on stability and efficiency.
References and Documents of Information Technology Management:
ITIL Foundation: Axelos (2019).
ITIL 4 Service Design Best Practices Guide (Axelos Publications).
A finance company wants to analyze subjective financial values of intangibles such as goodwill.
Which type of artificial intelligence should it use to meet this goal?
Intelligent agent
Genetic algorithm
Neural network
Fuzzy logic
Fuzzy logic is an artificial intelligence approach used to handle uncertainty and imprecise data. It is particularly useful for analyzing subjective financial values such as goodwill, brand value, and customer perception, which do not have precise numerical definitions. Unlike traditional Boolean logic, fuzzy logic allows partial truth values between 0 and 1, making it ideal for financial analysis where subjective judgments play a role.
How does a manager improve efficiency?
By optimizing resource allocation
By prioritizing output over quality
By focusing on speed over strategic planning
By eliminating collaboration to speed up tasks
Comprehensive and Detailed Explanation From Exact Extract:
In management theory, efficiency refers to achieving desired outcomes while using the least necessary resources, such as time, money, and effort, without sacrificing appropriate quality. A manager improves efficiency by optimizing resource allocation—that means ensuring the right people, tools, budget, and time are assigned to the right tasks and processes.
Core management responsibilities tied to efficiency include:
Matching skills and roles so work is done by the most suitable team members.
Reducing waste in processes (time, duplication, unnecessary steps).
Ensuring tools and systems are used effectively and appropriately.
Balancing workload across the team to prevent bottlenecks and idle capacity.
Why the other options reduce, not improve, true efficiency:
B. By prioritizing output over quality – Sacrificing quality may appear to boost short-term output, but it leads to rework, failures, and customer dissatisfaction, ultimately reducing efficiency.
C. By focusing on speed over strategic planning – Ignoring planning often creates confusion, misalignment, and errors, which wastes more time later.
D. By eliminating collaboration to speed up tasks – Cutting collaboration can hurt problem-solving, innovation, and accuracy. Lack of communication often leads to misunderstandings and duplication of work.
Thus, the best way a manager improves efficiency—aligned with standard management principles—is optimizing resource allocation, so A is the correct answer.
What is the primary purpose of regular communication between Agile teams and stakeholders?
To define and enforce a fixed set of project requirements from the start
To distribute tasks evenly and ensure team workloads are balanced
To confirm the solution aligns with evolving requirements throughout the project
To finalize documentation and lock project details early in development
Comprehensive and Detailed Explanation From Exact Extract:
A core principle of Agile is frequent collaboration with stakeholders to ensure that the evolving solution continues to meet current and changing needs. Regular communication between Agile teams and stakeholders allows feedback to be incorporated frequently, so the product can be adjusted based on new information, shifting priorities, or clarified requirements.
This ongoing interaction ensures that:
The solution remains aligned with business value and user needs.
Requirements can evolve and be refined as the project progresses.
Misunderstandings are caught early, reducing rework and waste.
Therefore, the primary purpose is to confirm that the solution aligns with evolving requirements throughout the project.
Why the other options are incorrect:
A. To define and enforce a fixed set of project requirements from the start – This reflects a traditional, plan-driven (waterfall) mindset; Agile specifically embraces changing requirements.
B. To distribute tasks evenly and ensure team workloads are balanced – Task distribution is an internal team concern and is not the main reason for stakeholder communication.
D. To finalize documentation and lock project details early in development – Agile prioritizes working software and flexibility, not early lock-in of documentation and details.
Which minor component holds non-volatile memory?
Arithmetic-logic unit (ALU)
Read-only memory (ROM)
Random-access memory (RAM)
Solid-state drive (SSD)
ROM (Read-Only Memory) is a type of non-volatile memory that permanently stores firmware and critical system instructions, such as BIOS. Unlike RAM, ROM retains data even when power is turned off.
Which process is improved by manufacturing enterprise resource planning (ERP) systems?
Coordinating materials and production
Developing packaging designs
Managing employee time-off
Designing prototypes
In manufacturing, ERP systems are used to coordinate materials, resources, and production schedules. ERP integrates procurement, inventory, and production planning, ensuring that the right materials are available at the right time, reducing downtime and waste.
Option B: Packaging design is a marketing and design activity, not ERP-driven.
Option C: Time-off management is handled by HR systems, not ERP production modules.
Option D: Prototyping is a product design function, not ERP-based.
Thus, ERP systems in manufacturing improve coordination of materials and production.
Which enterprise resource planning (ERP) feature benefits small businesses?
Minimal IT infrastructure
Offline processing only
Customizable business modules
Simple setup and low cost
Small businesses often adopt ERP systems that are designed for simple setup, ease of use, and low cost. These ERP solutions typically provide scaled-down, cloud-based options that do not require heavy IT infrastructure, making them affordable and accessible for organizations with limited resources.
Option A: Incorrect—ERP requires infrastructure or cloud resources, not “minimal” infrastructure alone.
Option B: Incorrect—modern ERP systems are cloud-based and support online integration, not offline only.
Option C: While customizable modules are helpful, the primary small-business advantage is affordability and simplicity.
Thus, the ERP feature that benefits small businesses is simple setup and low cost.
Which term describes an iterative design approach that builds a model of a system to ensure it meets user and business requirements?
Rapid application development (RAD)
Joint application development (JAD)
Discovery prototyping
Loose coupling
Definition of Discovery Prototyping:
Discovery prototyping is an iterative design approach that builds a working model or prototype of a system to gather feedback and ensure it meets user and business requirements.
The goal is to refine the system iteratively based on feedback before full development begins.
Key Characteristics:
Helps identify gaps between user expectations and design early in the process.
Reduces risks of rework and enhances user satisfaction.
Incorrect Options Analysis:
A. Rapid Application Development (RAD): Focuses on faster delivery of applications through iterative development but not solely on prototyping.
B. Joint Application Development (JAD): Refers to collaborative sessions for gathering requirements, not iterative prototyping.
D. Loose Coupling: Refers to software design principles, not prototyping.
References and Documents of Information Technology Management:
"Iterative Design and Prototyping Best Practices" (Gartner).
ITIL Systems Design Guidelines (Axelos).
What is the purpose of project communication management?
To define quality standards for deliverables
To ensure the right people receive the right information
To monitor risks that could affect communication
To document who is responsible for tasks
Project communication management ensures that the right information is delivered to the right stakeholders at the right time. It defines how information flows within a project, supporting collaboration, decision-making, and stakeholder engagement.
Option A: Quality standards are part of quality management, not communication.
Option C: Risk management addresses communication risks, but communication management’s purpose is broader.
Option D: Responsibility documentation belongs to resource or responsibility assignment matrices, not communication.
Thus, the purpose is to ensure the right people receive the right information.
What is a preliminary concern when moving disaster recovery operations to the cloud?
Multiple delays in data access during outages
Regulatory challenges in some regions
Limited visibility into system performance
Backup processes are interrupted
Comprehensive and Detailed Explanation From Exact Extract:
When planning to move disaster recovery (DR) operations to the cloud, a preliminary concern is ensuring that the solution complies with legal and regulatory requirements, especially those involving data residency, data protection, and industry-specific regulations. Different countries and regions may enforce rules about where data can be stored and processed, and how it must be protected in the cloud.
Organizations must evaluate whether the chosen cloud provider’s regions, services, and controls can meet these regulatory challenges, or whether some jurisdictions restrict the use of cloud-based DR for certain types of data.
Option A (multiple delays in data access during outages) is a performance concern, but it is not typically the first or primary planning concern compared to compliance and legal issues.
Option C (limited visibility into system performance) can be an operational concern, but it is generally addressed after feasibility and compliance are considered.
Option D (backup processes are interrupted) describes an operational problem, not a planning-stage concern inherent to moving DR to the cloud.
Therefore, the regulatory challenges in some regions are a key preliminary concern when shifting disaster recovery operations to cloud infrastructure.
Which cybersecurity attack disrupts the normal use of a network?
Session hijacking
Denial-of-service
DNS spoofing
Malware infection
A Denial-of-Service (DoS) attack (or Distributed Denial-of-Service, DDoS) aims to flood a network, server, or system with excessive traffic, making it unable to respond to legitimate users. This results in disruption of normal network operations, downtime, and loss of service availability.
Option A (Session hijacking): Involves taking over a user’s session, not large-scale network disruption.
Option C (DNS spoofing): Redirects users to fraudulent sites, not directly disrupting entire network use.
Option D (Malware infection): Can harm systems, but is not specifically aimed at disrupting network availability.
Thus, the attack that disrupts normal network use is a Denial-of-Service attack.
How should high-risk, high-impact items be handled?
Develop a plan to revisit them in future phases
Draft a summary of risks for status reports
Track them without taking immediate action
Create mitigation plans to address them
Comprehensive and Detailed Explanation From Exact Extract:
In risk management, risks are evaluated based on probability (likelihood) and impact (consequence). Items that are high-risk and high-impact represent the most critical threats to project success and must be addressed proactively.
The appropriate response for high-risk, high-impact items is to create mitigation plans to address them, which includes:
Identifying specific actions to reduce the likelihood or impact of the risk.
Assigning owners responsible for executing mitigation actions.
Establishing timelines and triggers for when actions must be taken.
Monitoring these risks regularly in risk reviews and status meetings.
Why the other options are incorrect:
A. Develop a plan to revisit them in future phases – Waiting to revisit critical risks delays action and increases the chance that they will negatively affect the project.
B. Draft a summary of risks for status reports – Reporting alone does not reduce risk; it must be paired with concrete mitigation actions.
C. Track them without taking immediate action – Simply tracking high-risk, high-impact items without acting is not acceptable risk management.
Therefore, high-risk, high-impact items should be handled by creating mitigation plans to address them, making D the correct answer.
What is the benefit of internet protocol (IP) telephony in unified communications?
It integrates voice and video.
It has superior sound quality for all users.
It is compatible with chat and email.
It uses physical phone lines.
Comprehensive and Detailed Explanation From Exact Extract:
Internet Protocol (IP) telephony, often called Voice over IP (VoIP), transmits voice (and often video) over data networks using the Internet Protocol. Within unified communications, a key benefit of IP telephony is that it enables voice and video communication to be integrated over the same IP-based infrastructure used for data.
Benefits in the UC context include:
Integration of voice and video services on the same network.
Easier integration with other UC components such as presence, conferencing, and collaboration tools.
More flexible and scalable communication services compared to traditional circuit-switched phone systems.
Why the other options are incorrect:
B. It has superior sound quality for all users – Sound quality depends on network conditions, bandwidth, codecs, and configuration; IP telephony can be high quality, but it is not guaranteed superior for all users.
C. It is compatible with chat and email – While IP telephony can be integrated into a broader UC platform that also supports chat and email, this is an indirect benefit of the overall UC system rather than the core defining benefit of IP telephony itself.
D. It uses physical phone lines – This is incorrect. IP telephony replaces or reduces reliance on traditional physical phone lines by using IP networks instead.
Therefore, the most accurate benefit described in the options is that IP telephony integrates voice and video over IP networks as part of a unified communications environment.
Which hardware component controls and carries out operations within a computer system?
Hard drive
Random access memory
Graphics card
Processor
The Processor (CPU – Central Processing Unit) is the “brain” of the computer. It controls operations and executes instructions, performing arithmetic, logic, control, and input/output operations as directed by the program instructions.
Option A (Hard drive): Provides long-term storage, not operations control.
Option B (RAM): Stores data temporarily for quick access but does not control operations.
Option C (Graphics card): Handles rendering of images and video, but does not serve as the primary system controller.
Therefore, the processor is the component that carries out operations and manages execution.
What are ecological results of the expanded use of technology? Choose 2 answers.
Lengthened life span of computer equipment
Increased carbon emissions
More people purchasing computer equipment
Decreased electronic waste
Increased energy consumption
Increased Carbon Emissions:
Technology relies on electricity, often generated from fossil fuels, leading to higher carbon emissions.
The production, transportation, and disposal of electronic devices contribute to the carbon footprint.
Increased Energy Consumption:
Expanded use of technology leads to higher energy demands for operating servers, cooling data centers, and powering devices.
The rise of 24/7 technology operations has amplified global energy consumption.
Why Other Options Are Incorrect:
Option A: The lifespan of technology tends to shorten due to rapid advancements and planned obsolescence.
Option C: While more devices are purchased, this does not directly indicate an ecological result.
Option D: Electronic waste has increased, not decreased, due to growing technology adoption and lack of recycling initiatives.
Which system supports front-line retail teams in real-time decision-making by updating sales and inventory information as activity occurs?
Online transaction processing system
Decision support system
Management information system
Customer relationship management system
An Online Transaction Processing (OLTP) system supports real-time processing of sales and inventory data. In retail, OLTP systems update information immediately as transactions occur, enabling front-line employees to make accurate, real-time decisions on sales, stock, and customer service.
Option B: Decision support systems (DSS) help managers with complex analysis, not real-time retail decisions.
Option C: Management information systems (MIS) provide summaries and reports, not live updates.
Option D: CRM systems manage customer relationships, not transaction-level sales and inventory.
Thus, the system is Online Transaction Processing (OLTP).
What is the meaning of scope creep?
Managing new requests through change control
Updating the project schedule
Making minor changes to improve team efficiency
Adding unapproved changes
Scope creep refers to the uncontrolled expansion of project scope without formal approval, often caused by adding features or changes that were not originally planned. Scope creep can lead to missed deadlines, budget overruns, and reduced project quality if not managed properly.
Option A: Change control is the correct process for managing approved changes, not scope creep.
Option B: Updating schedules is part of project time management, not scope creep.
Option C: Process improvements are beneficial, not unauthorized scope increases.
Thus, scope creep means adding unapproved changes.
What is a benefit of unified communications?
Faster access to resources
Increased storage capacity
Centralized billing support
Enhanced collaboration
Unified communications (UC) integrates various communication tools such as instant messaging, email, voice, video conferencing, and collaboration platforms into a single interface. The primary benefit is enhanced collaboration, allowing teams to work together seamlessly across multiple channels and geographic locations.
Option A: Incorrect—UC focuses on communication, not resource speed.
Option B: Incorrect—UC does not provide additional storage.
Option C: Incorrect—billing is unrelated to unified communications.
Thus, the benefit of unified communications is enhanced collaboration.
What is the role of executive sponsors in a project?
Tracking to ensure all key project milestones are completed on time
Defining and developing the project plan
Providing financial resources for a project
Collaborating with project staff to ensure their own interests are represented
Role of Executive Sponsors in a Project:
Executive sponsors are senior stakeholders responsible for providing financial resources and ensuring the project aligns with organizational strategy.
They advocate for the project at the executive level and help remove obstacles that could hinder its success.
Key Responsibilities:
Securing funding and allocating resources.
Ensuring alignment with business goals and priorities.
Supporting the project team by addressing high-level challenges.
Incorrect Options Analysis:
A. Tracking milestones: This is typically the role of the project manager.
B. Developing the project plan: Also the responsibility of the project manager.
D. Representing staff interests: Sponsors focus on organizational priorities, not individual interests.
References and Documents of Information Technology Management:
"Executive Sponsorship in Project Management" (PMI Whitepaper).
ITIL Governance and Sponsorship Guidelines (Axelos).
How long does an Agile sprint typically last?
Two to four weeks
One to two months
Until all sprint goals are completed
Three to six weeks
In Agile Scrum, a sprint typically lasts two to four weeks. This time-boxed iteration balances being long enough to deliver meaningful work but short enough to allow flexibility and frequent feedback.
Option B: One to two months is too long for a sprint cycle.
Option C: A sprint ends at its time-box, not “until goals are completed.”
Option D: Three to six weeks exceeds the recommended sprint length.
Thus, the typical sprint length is two to four weeks.
What does the Information Technology Infrastructure Library (ITIL) provide to organizations in managing IT services?
Enforcement of detailed operational controls across departments
Provision of structured guidance for operational considerations
Alignment of processes with external compliance standards
Promotion of transparency through ethical oversight of services
ITIL provides a structured framework and guidance for organizations to manage IT services effectively. It outlines best practices, processes, and operational considerations for delivering IT services in alignment with business needs. ITIL is not about enforcing control, compliance, or ethics oversight—it focuses on service management practices that ensure consistent quality and continual improvement.
Option A: Incorrect, ITIL does not enforce controls but provides guidance.
Option C: Incorrect, ITIL focuses on internal IT service alignment with business goals, not primarily compliance.
Option D: Incorrect, ITIL is not centered on ethical oversight but on operational best practices.
Thus, the correct answer is provision of structured guidance for operational considerations.
A logistics company wants to reduce fuel costs and improve route efficiency.
Which type of software would support this goal?
Warehouse management software
Procurement management software
Demand forecasting software
Supply chain management software
Supply Chain Management (SCM) software provides organizations with tools to optimize logistics, manage transportation routes, monitor shipments, and reduce fuel and delivery costs. It enables real-time visibility across the supply chain and ensures that goods are moved efficiently.
Option A: Warehouse management optimizes storage and retrieval within warehouses, not routing logistics.
Option B: Procurement software manages supplier relationships and purchasing, not logistics efficiency.
Option C: Demand forecasting helps predict customer demand, not optimize transportation.
Thus, the correct software for reducing fuel costs and improving route efficiency is Supply Chain Management software.
What is the purpose of a storyboard in the context of system development?
To map the user’s journey with a system
To create an interactive model of a system
To conduct detailed user testing sessions
To write code for a new software feature
Comprehensive and Detailed Explanation From Exact Extract:
In system development, a storyboard is a visual tool used to map the user’s journey with a system. It presents a sequence of screens, steps, or interactions that a user experiences while performing tasks. Storyboards help:
Visualize how users will navigate through the system
Communicate the flow of interactions to stakeholders and developers
Clarify requirements related to user experience and interface behavior
Identify potential usability issues early, before detailed design or coding
By walking through the user’s journey in a visual, step-by-step format, storyboards support better understanding and communication of how the system should support user tasks.
Option B (To create an interactive model of a system) is more accurately describing a prototype or simulation, not a storyboard.
Option C (To conduct detailed user testing sessions) refers to usability testing, which may use storyboards as input but is not the purpose of the storyboard itself.
Option D (To write code for a new software feature) is a development activity and unrelated to what storyboards are used for.
Thus, the purpose of a storyboard in system development is to map the user’s journey with a system.
What is a global workforce trend that will impact IT leaders?
Growing demand for service-oriented employment opportunities
Increasing demand for highly skilled professionals in specialized fields
Decreasing reliance on technical roles due to automation
Decreasing emphasis on specialized education and training
A major global workforce trend is the increasing demand for highly skilled professionals in specialized IT fields such as cybersecurity, artificial intelligence, cloud computing, and data analytics. IT leaders must adapt by recruiting, training, and retaining talent to fill these advanced roles.
Option A: Service-oriented jobs are growing, but IT leadership is impacted most by specialized skills demand.
Option C: Automation reduces some routine tasks but increases the need for specialized technical expertise.
Option D: Incorrect—specialized education and training are becoming more important, not less.
Thus, the workforce trend impacting IT leaders is increased demand for highly skilled professionals in specialized fields.
A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?
Virtual reality
Neural network
Intelligent agent
Fuzzy logic
Understanding Intelligent Agents:
Intelligent agents are software programs that perform tasks autonomously, such as searching for information, making recommendations, or automating repetitive actions.
They are designed to mimic human behavior in specific tasks.
Application in Shopping Bots:
A shopping bot uses intelligent agents to search multiple websites, compare prices, and find the best deals.
These bots automate the process of price comparison, saving time and effort for the company.
Why Other Options Are Incorrect:
Option A (Virtual reality): VR is immersive and does not search for online products.
Option B (Neural network): Neural networks are used for pattern recognition, not autonomous tasks like shopping.
Option D (Fuzzy logic): Fuzzy logic handles imprecision and is not designed for automating searches.
A business struggles to manage inquiries and follow-ups because data is spread across different systems.
Which software type could address this problem?
Digital marketing management system
Advanced business intelligence platform
Customer relationship management system
Enterprise resource planning solution
Comprehensive and Detailed Explanation From Exact Extract:
A Customer Relationship Management (CRM) system is designed to centralize and manage all customer-related information and interactions in a single database and interface. This includes inquiries, contacts, communication history, sales opportunities, and follow-up tasks.
In this scenario, the business has inquiries and follow-ups scattered across different systems, making it hard to track and respond. A CRM system would:
Consolidate customer data and communication history into one place.
Provide tools to manage leads, cases, and follow-up activities.
Improve customer service and responsiveness by giving staff a unified view of each customer’s interactions.
This directly addresses the problem of fragmented data and poor management of inquiries and follow-ups.
Why the other options are incorrect:
A. Digital marketing management system – Focuses on planning and executing marketing campaigns (email campaigns, social media, ads), not on end-to-end tracking of customer inquiries and follow-ups across sales and service.
B. Advanced business intelligence platform – BI tools analyze data and create reports or dashboards; they do not provide the operational, day-to-day tracking and workflow for customer interactions like a CRM does.
D. Enterprise resource planning (ERP) solution – ERP focuses on internal business processes (finance, inventory, HR, manufacturing). Some ERPs have customer-related modules, but the primary system specifically designed to manage customer interactions and inquiries is CRM.
Thus, the correct software type to solve the issue of scattered customer inquiries and follow-ups is a Customer Relationship Management (CRM) system.
What is the goal of the maintenance phase in the system development life cycle (SDLC)?
To fix defects and update the software
To gather initial business requirements
To conduct unit testing and receive feedback
To design and deploy the software architecture
In the maintenance phase of the SDLC, the goal is to ensure the system continues to meet business needs by fixing defects, applying updates, and implementing enhancements. This phase ensures the system remains secure, reliable, and effective after deployment.
Option B: Gathering requirements occurs in the planning/analysis phase.
Option C: Unit testing is part of the testing phase, not maintenance.
Option D: Designing and deploying the architecture occurs in development and implementation phases.
Thus, the goal of the maintenance phase is to fix defects and update the software.
What is a consequence of offshore outsourcing?
Longer feedback cycles
Increased management overhead
Offshore growth challenges
Time zone coordination issues
Comprehensive and Detailed Explanation From Exact Extract:
Offshore outsourcing involves contracting services or development work to organizations in distant countries, often with significant time zone differences. One of the most direct and common consequences of this arrangement is time zone coordination issues.
These time zone challenges can include:
Limited overlapping working hours between onshore and offshore teams.
Delays in real-time communication, such as meetings or quick clarifications.
More reliance on asynchronous communication (email, tickets), which can slow responsiveness.
Increased need for careful planning of handoffs, status updates, and support coverage.
Why the other options are less precise:
A. Longer feedback cycles – Longer feedback cycles can occur, but they are often a result of time zone issues, making D the more direct and primary consequence.
B. Increased management overhead – Oversight can increase with any outsourcing model, not just offshore, and is not as specifically tied to geographic distance.
C. Offshore growth challenges – This is vague and does not name a clear, recognized operational impact.
Thus, one of the clearest and most recognized consequences of offshore outsourcing is time zone coordination issues, making D the correct answer.
Which statement describes the planning phase of the systems development life cycle (SDLC)?
Performing corrections, additions, and upgrades to ensure the system continually meet business goals
Establishing full descriptions of the desired features and operations of the system
Establishing a high-level strategy and goals for an intended project
Bringing project pieces together, checking interoperability, and verifying functionality
Planning Phase in SDLC:
The planning phase is the foundational step in the SDLC where project strategy, objectives, and goals are defined.
Key deliverables include a high-level project roadmap, scope definition, and resource allocation plans.
Purpose of the Planning Phase:
Ensures all stakeholders agree on the project objectives.
Sets the stage for subsequent phases by identifying potential risks, timelines, and budgets.
Incorrect Options Analysis:
A. Corrections, additions, upgrades: Part of the maintenance phase.
B. Descriptions of features: Occurs in the design or analysis phase.
D. Checking interoperability: Occurs in the integration or testing phase.
References and Documents of Information Technology Management:
"SDLC Best Practices for Project Planning" (Gartner).
ITIL Framework for Project Planning (Axelos).
Which process involves the use of monitoring tools to detect and respond to unauthorized access attempts in real time?
Penetration testing
Access control
Log review
Intrusion detection
Comprehensive and Detailed Explanation From Exact Extract:
Intrusion detection is the process of using monitoring tools and systems to identify and alert on unauthorized or suspicious activities on networks or hosts, often in real time. Intrusion Detection Systems (IDS) analyze traffic or system events to detect:
Unauthorized access attempts
Malicious or abnormal behavior
Known attack signatures or anomalies
When potential intrusions are detected, these systems can generate alerts, and in some configurations (IDS/IPS), they may also help automate responses or integrate with other security tools.
Why the other options are incorrect:
A. Penetration testing – Simulates attacks to find vulnerabilities but is periodic and manual, not continuous real-time monitoring.
B. Access control – Governs who is allowed to access what (through authentication and authorization). It is preventive, not primarily focused on real-time detection of unauthorized attempts once they occur.
C. Log review – Involves analyzing stored logs, often after the fact, for auditing or investigation. It is not necessarily real-time detection.
Therefore, the correct answer is D. Intrusion detection, because it is the process that specifically uses monitoring tools to detect and respond to unauthorized access attempts in real time.
Which information system facilitates the sharing of data between the human resources and purchasing department in the same corporation?
Executive support (ES)
Geographic information system (GIS)
Enterprise resource planning (ERP)
Customer relationship management (CRM)
Definition of ERP Systems:
ERP systems facilitate data sharing and process integration across multiple departments within an organization, such as HR and purchasing.
These systems improve coordination and decision-making by maintaining a single source of truth.
Example of ERP Usage:
If the HR department needs to coordinate with the purchasing team for new employee resources, ERP ensures both have access to relevant information like budgets and procurement requirements.
Incorrect Options Analysis:
A. Executive Support (ES): Caters to strategic decision-making, not operational collaboration.
B. Geographic Information System (GIS): Deals with spatial and geographical data, not departmental coordination.
D. Customer Relationship Management (CRM): Manages customer interactions, not internal department processes.
References and Documents of Information Technology Management:
"ERP for Organizational Efficiency" (Forrester Research).
ITIL 4 Foundation: Enterprise Systems Overview (Axelos).
Which method protects against unauthorized physical access to sensitive data?
Software patching
Data encryption
Firewall configuration
Biometric authentication
Biometric authentication methods (such as fingerprint scans, facial recognition, or iris scans) provide strong protection against unauthorized physical access to sensitive systems and data. These methods ensure that only authorized individuals can access secured facilities or devices.
Option A: Software patching addresses software vulnerabilities, not physical access.
Option B: Data encryption protects data confidentiality, but does not prevent physical access attempts.
Option C: Firewalls protect network access, not physical access.
Thus, biometric authentication protects against unauthorized physical access.
Which action helps ensure legal compliance in IT?
Focusing on implementing new IT systems
Auditing IT practices on a regular basis
Reviewing laws during annual planning
Consulting external experts without follow-up
Comprehensive and Detailed Explanation From Exact Extract:
To help ensure legal compliance in IT, organizations must actively verify that their systems, processes, and controls are operating in accordance with relevant laws, regulations, and policies. One of the most effective ways to do this is through regular audits of IT practices.
Regular IT audits involve systematically reviewing security controls, access management, data handling, logging, change management, and other processes to identify gaps, violations, or weaknesses. These audits support corrective actions, continuous improvement, and documented evidence of compliance. They also help detect non-compliant behavior early, before it leads to legal or regulatory consequences.
Option A is incorrect because implementing new systems alone does not ensure compliance; in fact, new systems can introduce new compliance risks if not audited.
Option C is insufficient; reviewing laws only during annual planning does not ensure ongoing compliance in day-to-day operations.
Option D is incomplete because consulting external experts without follow-up action or review does not guarantee that compliance requirements are actually met or maintained.
Therefore, the action that most directly helps ensure legal compliance in IT is B. Auditing IT practices on a regular basis.
What is one benefit of reducing the movement of workers, raw materials, and equipment within a supply chain process?
It enhances operational safety and efficiency.
It reduces the need to train employees in multiple roles.
It allows for more variation in workflow paths.
It enables greater flexibility in resource allocation.
Comprehensive and Detailed Explanation From Exact Extract:
In operations and supply chain management, unnecessary movement of people, materials, and equipment is classified as a form of waste. Reducing this movement improves both efficiency and safety:
Fewer material and equipment moves mean less time lost in transportation and handling.
Shorter and clearer paths reduce the chance of collisions, accidents, or injuries, improving workplace safety.
Streamlined flow supports faster throughput, fewer bottlenecks, and more predictable operations.
This aligns with process and layout design principles that seek to minimize motion and transport to improve operational performance.
Why the other options are incorrect:
B. It reduces the need to train employees in multiple roles.Cross-training is related to staffing strategy, not directly to physical movement reduction.
C. It allows for more variation in workflow paths.Good process design usually aims for less variation, not more, to improve control and predictability.
D. It enables greater flexibility in resource allocation.Flexibility can be influenced by many factors; reducing movement mainly targets efficiency and safety, not directly resource allocation flexibility.
A company no longer wants to sell one product to as many customers as possible. Now they want to sell one customer as many products as possible. Which type of software gathers and analyzes customer information to tailor this marketing campaign?
Distribution management (DM)
Customer relationship management (CRM)
Supply chain management (SCM)
Operations management (OM)
Understanding the Scenario:
The company is shifting focus from mass marketing to personalized marketing, targeting individual customers with tailored offerings.
Role of CRM:
CRM systems gather and analyze customer data, including purchase history, preferences, and interactions, to personalize marketing strategies.
CRM tools help businesses cross-sell and upsell products effectively by understanding customer needs.
Why Other Options Are Incorrect:
Option A (DM): Distribution management focuses on the logistics of product delivery.
Option C (SCM): Supply chain management optimizes production and delivery, not marketing.
Option D (OM): Operations management focuses on internal processes rather than customer interactions.
What is a key part of resource management?
Reviewing communication methods with stakeholders
Obtaining and managing needed resources
Monitoring quality standards across deliverables
Scheduling tasks and project milestones
Comprehensive and Detailed Explanation From Exact Extract:
In project and operations management, resource management focuses on ensuring that the right resources are available and used effectively. A core responsibility is to:
Identify the resources required (people, equipment, materials, budget).
Obtain or secure those resources when needed.
Manage and allocate them efficiently throughout the project or operation.
Adjust assignments as needs change to avoid bottlenecks or over-allocation.
This directly reflects “obtaining and managing needed resources”, which is central to effective resource management.
Why the other options are incorrect:
A. Reviewing communication methods with stakeholders – This is a component of communications management, not resource management.
C. Monitoring quality standards across deliverables – This belongs under quality management, focused on standards and conformance.
D. Scheduling tasks and project milestones – This is part of time/schedule management, not specifically resource management, even though resources and schedules are related.
Thus, Option B correctly states a key part of resource management: obtaining and managing needed resources.
Which feature of a customer relationship management (CRM) system allows sales representatives to track the progress of potential deals?
Sales tracking
Customer asset tracking
Sales performance metrics
Customer segmentation
Sales tracking is a core feature of CRM systems that allows sales representatives to monitor leads, opportunities, and deals through each stage of the sales pipeline. This enables better forecasting, prioritization, and management of customer relationships.
Option B: Customer asset tracking monitors product ownership, not sales pipeline progress.
Option C: Sales performance metrics measure results, not track deal progress in real-time.
Option D: Customer segmentation categorizes customers but does not track deals.
Thus, the CRM feature for monitoring deal progress is Sales tracking.
How should leaders promote ethical IT behavior among employees?
By assigning responsibility for ethics to individual departments
By providing regular training on ethical expectations
By covering ethics briefly during initial onboarding
By relying on team leaders to address ethical concerns informally
Leaders should promote ethical IT behavior by providing regular, ongoing training that communicates expectations, reinforces values, and keeps employees updated on evolving ethical standards and issues. Continuous training fosters a culture of integrity and accountability.
Option A: Incorrect, ethics should be an organization-wide responsibility, not siloed in departments.
Option C: Incorrect, a one-time onboarding session is insufficient for maintaining ethical awareness.
Option D: Incorrect, relying informally on team leaders does not ensure consistent organization-wide ethical practices.
Thus, the best approach is regular training on ethical expectations.
Which scenario would cause an organization to create a global team?
As the organization grows it is becoming difficult to find talent in the local market.
For security purposes the organization is moving to a private cloud provider.
The organization is embarking on a digital transformation effort.
The organization's largest client is the United States Military.
Global Team Formation:
Organizations often form global teams when they face talent shortages in their local markets. Expanding globally provides access to a larger and more diverse talent pool.
Global teams enable the organization to leverage regional expertise, foster innovation, and reduce dependency on local markets.
Incorrect Options Analysis:
B. Security via private cloud: Relates to infrastructure decisions, not team formation.
C. Digital transformation: Involves adopting technology, not directly forming a global team.
D. U.S. Military as a client: Security and compliance measures may be involved, but this is not necessarily linked to global team creation.
References and Documents of Information Technology Management:
"Global Talent Acquisition Strategies" (McKinsey).
ITIL Human Resources Alignment Best Practices (Axelos).
Which feature makes mobile operating systems different from desktop operating systems in business use?
Mobile operating systems support complex, multi-user access across enterprise domains.
Mobile operating systems include advanced tools for high-end peripheral hardware.
Mobile operating systems enable virtualization of enterprise server environments.
Mobile operating systems function efficiently on battery-powered, touchscreen devices.
Comprehensive and Detailed Explanation From Exact Extract:
Mobile operating systems are specifically designed to run on battery-powered, handheld, touchscreen devices such as smartphones and tablets. Their design priorities differ from desktop operating systems, with emphasis on:
Power efficiency to extend battery life
Touchscreen input, including gestures such as tapping, swiping, and pinching
Lightweight resource usage (CPU, memory, storage) suitable for mobile hardware
Wireless connectivity (Wi-Fi, cellular, Bluetooth, GPS) as core capabilities
App-centric user interface, optimized for small screens and mobile workflows
These characteristics make mobile operating systems particularly suited for on-the-go business use, enabling activities like email, messaging, collaboration apps, field data entry, and access to cloud services from anywhere.
Why the other options are incorrect:
A. Complex, multi-user access across enterprise domains – This is traditionally more associated with desktop operating systems (e.g., Windows with Active Directory domains) used in corporate environments.
B. Advanced tools for high-end peripheral hardware – Desktop OSs are typically stronger here, supporting devices like industrial printers, specialized input devices, and complex hardware configurations.
C. Virtualization of enterprise server environments – This is a feature typically associated with server and desktop operating systems (e.g., hypervisors and server OSs), not mobile OSs.
Therefore, the feature that best distinguishes mobile operating systems in business use is that they function efficiently on battery-powered, touchscreen devices.
What is the importance of the partners and suppliers dimension of the ITIL model?
Staffing an organization fosters the creation of value.
The relationship with both suppliers and consumers must create value.
Supplying data allows companies to make wise investments and assemble technology solutions.
The creation of value is solely beneficial to the customer.
The Partners and Suppliers dimension of the ITIL (Information Technology Infrastructure Library) model is critical to ensuring that organizations deliver optimal value to their customers and stakeholders. Here's a breakdown of its importance:
1. Purpose of the Partners and Suppliers Dimension:
ITIL emphasizes that an organization does not operate in isolation. It relies on external and internal partnerships and suppliers to deliver its products and services.
This dimension focuses on understanding the relationships between the organization and its partners, as well as optimizing the way value is co-created.
2. Importance of Creating Value Together:
The correct answer highlights the ITIL principle of co-creating value. Both suppliers and consumers must collaborate to achieve outcomes that benefit all parties.
The success of services depends on how well the organization manages these relationships to ensure that services meet customer needs and align with organizational goals.
3. ITIL's Emphasis on Value Co-Creation:
ITIL views service management as a way to create value through the combined efforts of the service provider, suppliers, and consumers.
Partnerships often involve shared resources, responsibilities, and risks, which require a cooperative mindset to achieve desired outcomes.
4. Incorrect Options Analysis:
Option A: Staffing refers to human resources management and is unrelated to the Partners and Suppliers dimension's primary focus.
Option C: Supplying data and technology is part of supplier management, but it does not encompass the full value-oriented relationship emphasized in ITIL.
Option D: Value creation benefits both the customer and the organization, making this statement too narrow to capture the essence of the dimension.
5. Practical Application of Partners and Suppliers Dimension:
Effective supplier management ensures reliable delivery, risk management, and adherence to organizational standards.
Examples of partnerships in IT include cloud providers, outsourced IT services, hardware vendors, and consulting firms.
References and Documents of Information Technology Management:
ITIL 4 Foundation: Axelos, "ITIL Foundation" (2019).
Official ITIL 4 Practice Guides: Supplier Management (Axelos Publications).
ISO/IEC 20000 Standard: "Service Management System Requirements" (ISO Standard, latest edition).
Which epolicy is the starting point and the umbrella for all other policies the organization might establish?
Computer use
Email privacy
Acceptable use
Information privacy
Definition of Acceptable Use Policy (AUP):An Acceptable Use Policy serves as the umbrella policy outlining how employees and users can utilize organizational IT assets and resources responsibly. It is the starting point for all other IT-related policies.
Purpose of AUP:
Provides general guidelines for using devices, networks, and data ethically and securely.
Sets the foundation for more specific policies such as email privacy and information privacy.
Incorrect Options Analysis:
Computer Use: A sub-policy derived from AUP, detailing how specific devices are to be used.
Email Privacy: Focuses specifically on email communication, not broader IT use.
Information Privacy: Covers the ethical handling of sensitive information, but not all IT usage aspects.
References and Documents of Information Technology Management:
ISO/IEC 27002 Standard (Information Security).
"The Role of Acceptable Use Policies in IT Governance" (ITIL Whitepaper).
Why is collaboration between the chief information officer (CIO) and the chief marketing officer (CMO) essential in digital strategy?
To give the marketing team control over IT operations
To prevent overlap between IT and marketing functions
To coordinate strategic efforts across the organization
To reduce the role of marketing in technology decisions
Collaboration between the CIO and CMO is essential because digital strategy requires a shared effort that aligns technology capabilities with customer engagement and marketing initiatives. By working together, these executives can ensure that IT infrastructure supports marketing technologies, such as customer analytics, digital campaigns, and personalized customer experiences, enabling a unified business strategy.
Option A: Incorrect—collaboration does not transfer IT control to marketing.
Option B: Incorrect—collaboration is about synergy, not avoiding overlap.
Option D: Incorrect—marketing’s role in technology decisions is critical, not reduced.
Thus, collaboration is essential to coordinate strategic efforts across the organization.
Which challenge can arise from toxic materials in electronics?
Maintaining employee safety during use
Explaining performance limits to end users
Meeting disposal and recycling rules
Reducing environmental certification costs
Comprehensive and Detailed Explanation From Exact Extract:
Electronic devices often contain toxic or hazardous materials such as lead, mercury, cadmium, and certain flame retardants. These substances can create significant environmental and regulatory challenges, especially at the end of the product’s life cycle. A major challenge for organizations is meeting disposal and recycling rules designed to prevent environmental contamination and health risks.
Key aspects include:
Complying with regulations for safe disposal and recycling of electronic waste (e-waste).
Ensuring proper handling, collection, and processing so hazardous materials do not enter landfills, water, or air.
Managing relationships with certified recyclers and adhering to government and industry standards.
Documenting and verifying compliance for audits and reporting.
Why the other options are incorrect:
A. Maintaining employee safety during useWhile workplace safety is important, typical use of electronics (like computers or phones) does not generally expose employees directly to toxic materials. The main risk occurs during manufacturing, dismantling, or disposal, not normal office use.
B. Explaining performance limits to end usersPerformance limits relate to technical capability (speed, battery life, etc.) and are not directly caused by toxic materials in electronics.
D. Reducing environmental certification costsToxic materials usually increase complexity and cost for compliance and certification; they are not a source of cost reduction.
Therefore, the most accurate challenge associated with toxic materials in electronics is Option C: Meeting disposal and recycling rules, which directly reflects environmental and regulatory responsibilities.
Which type of operating system is commonly used in specialized business devices like point-of-sale systems, industrial controllers, or smart appliances?
A desktop system used to run office productivity software
A Chrome OS cloud-based system used to access web applications from a laptop
A Linux-based system designed to operate on embedded hardware
A mobile system designed for personal communication and entertainment
Embedded operating systems are lightweight operating systems designed for specialized hardware with specific functions. These are often Linux-based and optimized for devices such as point-of-sale (POS) systems, industrial controllers, smart appliances, and medical devices. They provide stability, security, and resource efficiency in environments where the device is dedicated to one or a few specialized tasks.
Option A: Refers to general-purpose desktop OS (e.g., Windows, macOS), not specialized.
Option B: Refers to Chrome OS, which is designed for laptops and cloud computing.
Option D: Refers to mobile OS (Android/iOS), focused on consumer use, not industrial or specialized embedded devices.
Thus, the correct answer is a Linux-based embedded operating system.
Which advantage does a storyboard provide in a rapid design challenge?
It can quickly communicate a solution.
It requires extensive resources and time to create.
It allows for detailed coding and programming.
It can be used to finalize the product design.
Comprehensive and Detailed Explanation From Exact Extract:
In rapid design challenges, hackathons, or design sprints, a storyboard is used as a fast, visual way to communicate a potential solution. It typically consists of a sequence of frames or panels that show:
The user’s journey through a product or service.
The key steps or screens involved in solving a problem.
The context in which the user interacts with the system.
This makes storyboards ideal when teams need to:
Quickly share ideas across stakeholders without building a full prototype.
Build a shared understanding of how the solution should work.
Gather early feedback before investing time in detailed design or development.
In a rapid design challenge, time and resources are limited, so the main advantage is that a storyboard can quickly communicate a solution in a clear, visual way.
Why the other options are incorrect:
B. It requires extensive resources and time to create.Storyboards are intentionally lightweight and quick to create; this is the opposite of their purpose in rapid design.
C. It allows for detailed coding and programming.Storyboards are conceptual and visual, not a medium for coding or technical implementation.
D. It can be used to finalize the product design.A storyboard is a preliminary design tool; it supports ideation and early validation, not final product specifications.
Which basic business system serves operational level analysts in an organization?
Optimization analysis system (OAS)
Decision support system (DSS)
Transaction processing system (TPS)
Executive information system (EIS)
Definition of Transaction Processing System (TPS):
A TPS handles the day-to-day business transactions of an organization, such as sales, payroll, order processing, and inventory tracking.
It is designed for operational-level analysts who need to process large volumes of routine transactions efficiently.
Purpose of TPS:
Ensures the integrity and accuracy of business transactions.
Provides operational data required for other systems like Decision Support Systems (DSS) or Management Information Systems (MIS).
Incorrect Options Analysis:
A. Optimization Analysis System (OAS): Not a standard system type in IT management.
B. Decision Support System (DSS): Focuses on tactical and strategic decision-making.
D. Executive Information System (EIS): Caters to high-level executives, not operational-level analysts.
References and Documents of Information Technology Management:
"Foundations of IT Systems" (McGraw-Hill Education).
ITIL Foundation Documentation (Axelos).
Which material in electronic devices poses an environmental hazard?
Mercury in displays
Plastic used for insulation
Aluminum in casings
Gold used in connector pins
Mercury, commonly found in older LCD displays, fluorescent backlights, and some batteries, is a toxic heavy metal that poses significant environmental and health hazards if electronic waste is not disposed of properly. It can contaminate soil and water supplies, harming both humans and wildlife.
Option B: Plastic is generally not toxic in the same way, though it contributes to waste.
Option C: Aluminum is recyclable and not considered highly hazardous.
Option D: Gold is valuable and recyclable, not an environmental hazard.
Therefore, the hazardous material in electronic devices is mercury in displays.
What is communications media in a unified communications system?
Software-based phone that uses VoIP
Mobile conferencing phone-like tool
Signal converter for analog phones
Traditional phone with networking support
In a unified communications system, communications media refers to the actual method by which communication takes place. A key example is a software-based phone that uses Voice over Internet Protocol (VoIP), which allows users to make phone calls through the internet instead of relying on traditional analog systems.
Option B: Incorrect—mobile conferencing devices are tools, not the core communications media.
Option C: Incorrect—signal converters are hardware for compatibility, not communications media.
Option D: Incorrect—traditional phones are legacy hardware, not unified digital media.
Thus, communications media in UC systems is represented by a software-based phone using VoIP.
What is the purpose of system testing in the system development life cycle (SDLC)?
To review the individual components of the system
To gather the system’s user requirements
To design the software architecture
To verify the system meets specific requirements
Comprehensive and Detailed Explanation From Exact Extract:
System testing is a phase in the SDLC where the entire integrated system is tested as a whole to ensure it behaves as specified. The primary purpose of system testing is to verify that the complete system meets the defined functional and non-functional requirements (such as performance, reliability, and security) documented earlier in the lifecycle.
Unlike unit testing, which focuses on individual components, or integration testing, which focuses on interactions between components, system testing validates the end-to-end behavior of the solution from the perspective of overall requirements.
Option A (To review the individual components of the system) describes unit testing, not system testing.
Option B (To gather the system’s user requirements) is an activity of the requirements analysis phase, which occurs before design and development.
Option C (To design the software architecture) corresponds to the design phase, not the testing phase.
Thus, the purpose of system testing is to verify the system meets specific requirements, making D the correct answer.
Which type of malware disguises itself as legitimate software to gain access to systems?
Keylogger
Trojan horse
Spyware
Rootkit
Comprehensive and Detailed Explanation From Exact Extract:
A Trojan horse (or simply “Trojan”) is a type of malware that pretends to be legitimate or useful software to trick users into installing or running it. Once executed, it can create backdoors, download additional malicious components, or allow unauthorized access to the system, while often hiding its true purpose.
Why B is correct: A Trojan disguises itself as something benign or helpful (such as a free utility, game, or update) in order to deceive the user and gain access. This matches the definition given in standard cybersecurity sections of IT management materials.
Why the others are incorrect:
A. Keylogger – Specializes in capturing keystrokes to steal information like passwords; it may be delivered by a Trojan, but the defining behavior is keystroke logging, not masquerading as legitimate software.
C. Spyware – Secretly monitors user activity and sends data to an attacker; it focuses on surveillance, not necessarily on pretending to be legitimate software as its core characteristic.
D. Rootkit – Designed to hide the presence of malware or attackers by modifying system processes and tools; its main role is stealth and persistence, not initial disguise as legitimate software.
Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.
Automates the different activities of the supply chain
Serves as a unique product identifier
Tracks a product's journey from manufacturing facility to store
Discards inconsistent, incorrect, or incomplete information
RFID Tagging Benefits in Supply Chain Management:
Unique Product Identifier: RFID tags provide a unique identifier for each product, enabling precise tracking and inventory management.
Product Tracking: RFID tags allow continuous tracking of products throughout their journey in the supply chain, from manufacturing to delivery.
Why Other Options Are Incorrect:
Option A: While RFID can streamline certain activities, it does not automate the entire supply chain.
Option D: RFID is not designed to discard incorrect or incomplete information but rather to provide accurate tracking.
What is a preliminary concern when moving disaster operations to the cloud?
Backup processes are interrupted
Limited visibility into system performance
Regulatory challenges in some regions
Multiple delays in data access during outages
When shifting disaster recovery operations to the cloud, one of the primary concerns is regulatory compliance challenges, especially in industries or regions with strict data sovereignty and privacy laws. Cloud providers may store data across borders, raising compliance issues with regulations such as GDPR or HIPAA.
Option A: Backups are often improved, not interrupted, in the cloud.
Option B: While visibility is important, compliance issues are typically a greater preliminary concern.
Option D: Cloud disaster recovery solutions are designed to minimize data delays, not create them.
Thus, the correct answer is Regulatory challenges in some regions.
Which phase of the waterfall methodology is executed immediately prior to the implementation phase?
Analysis
Testing
Development
Maintenance
In the Waterfall methodology, the phases flow sequentially:
Requirements → 2. Analysis → 3. Design → 4. Development → 5. Testing → 6. Implementation → 7. Maintenance.
The Testing phase comes immediately before Implementation, where the system is validated, bugs are fixed, and readiness is confirmed before deployment.
Option A: Analysis occurs much earlier in the process.
Option C: Development precedes testing, not implementation.
Option D: Maintenance comes after implementation.
Thus, the correct phase immediately before implementation is Testing.
Where is data stored when using a USB flash drive?
Shared network location
Local solid-state memory
Computer hardware
Browser cache
Comprehensive and Detailed Explanation From Exact Extract:
A USB flash drive is a type of portable storage device that uses solid-state memory (specifically, flash memory) to store data. When you save files to a USB flash drive, the data is written to and stored in the local solid-state memory chips inside the device itself, not on the computer’s main storage or any external network.
Key points aligned with Information Technology Management concepts:
Solid-state memory (flash memory) has no moving parts, unlike traditional hard disk drives. It stores data electronically in memory cells, which makes it durable, compact, and well-suited for portable devices such as USB drives.
A USB flash drive is considered removable storage, meaning it can be disconnected from one computer and connected to another while still retaining the stored data because it is kept in the device’s own internal solid-state memory.
The operating system simply treats the USB flash drive as another storage volume (like an additional drive letter), but the physical location of the data is on the flash memory inside the USB device, not in the computer’s internal hard drive or memory.
Why the other options are incorrect:
Option A: Shared network location – This refers to storage on a network server or cloud system accessed over a network connection. A USB flash drive does not require a network; it stores data locally on the device itself.
Option C: Computer hardware – While the USB drive plugs into the computer’s hardware (USB port), the data is not stored in the computer’s internal components (like the internal hard drive or RAM). It is stored on the USB drive’s own internal solid-state memory.
Option D: Browser cache – Browser cache is temporary storage used by web browsers on a local device to speed up loading web pages. It is unrelated to where data is stored on a USB flash drive.
Therefore, the correct answer is B. Local solid-state memory, because that accurately describes where data is physically stored when using a USB flash drive.
How do small and medium enterprise (SME)-focused enterprise resource planning (ERP) systems help small businesses?
They simplify budgets by reducing reporting.
They automate growth strategy design.
They provide core functions at low cost.
They deliver advanced forecasting.
SME-focused ERP systems provide small and medium businesses with essential business functions such as finance, HR, inventory, and sales at a lower cost compared to large-scale ERP solutions. This allows SMEs to gain the benefits of integration and automation without the high expense of enterprise-level systems.
Option A: Incorrect—ERP systems enhance reporting, not reduce it.
Option B: Incorrect—ERP does not design growth strategies, it supports operations.
Option D: Incorrect—advanced forecasting is more of a high-level analytics function, not the primary SME ERP focus.
Thus, SME-focused ERP systems primarily help by providing core functions at low cost.
What does presence information help determine in unified communications?
Currently active tools
Availability of a user
When the user last logged on
If a message has been sent
Comprehensive and Detailed Explanation From Exact Extract:
In unified communications systems, presence information indicates a user’s current status and availability for communication. This can include states such as available, busy, in a meeting, on a call, do not disturb, away, or offline.
Presence information allows users and systems to:
See whether a colleague is available to receive a call or message.
Automatically route communications based on status (for example, sending calls to voicemail if the user is on another call).
Improve collaboration by choosing the most appropriate time and channel to contact someone.
This means the core function of presence information is to determine the availability of a user.
Why the other options are incorrect:
A. Currently active tools – Presence does not primarily show which tool (email, chat, phone) is active; it shows user status, not application state.
C. When the user last logged on – That is a separate piece of log or audit information; presence is about current status, not historical logon times.
D. If a message has been sent – That is related to message status or delivery receipts, not presence information.
So, presence information in unified communications is used to determine the availability of a user.
Which behavior supports ethical IT use in the workplace?
Allowing personal devices without security controls
Monitoring employee activity prior to explaining policies
Providing clear guidelines on technology use
Giving open access to company data for collaboration
Comprehensive and Detailed Explanation From Exact Extract:
Ethical IT use in the workplace requires that employees understand what is allowed, what is prohibited, and how technology must be used to protect the organization and its stakeholders. Providing clear guidelines on technology use is a fundamental ethical and professional practice because it:
Establishes expectations for responsible use of devices, networks, and data.
Reduces misuse of systems by clarifying what constitutes inappropriate or risky behavior.
Supports compliance with security policies, privacy requirements, and legal regulations.
Ensures employees are treated fairly, because rules are known in advance and applied consistently.
These guidelines are typically defined in:
Acceptable Use Policies (AUPs)
Security and data protection policies
Bring Your Own Device (BYOD) policies
Monitoring and privacy notices
Why the other options are incorrect:
A. Allowing personal devices without security controlsThis violates basic IT security and ethical principles. Unsecured personal devices introduce risks such as data leakage, malware, and unauthorized access.
B. Monitoring employee activity prior to explaining policiesMonitoring without first informing employees and providing clear policy terms is ethically questionable and can violate expectations of privacy and fairness. Ethical practice requires notice and transparency before monitoring.
D. Giving open access to company data for collaborationWhile collaboration is valuable, open access to company data can violate the principles of least privilege and data protection, increasing the risk of breaches and misuse.
Therefore, Option C is correct because providing clear guidelines on technology use is a direct, ethical support for responsible IT behavior in the workplace.
Copyright © 2014-2025 Examstrust. All Rights Reserved