Big Black Friday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

WGU Information-Technology-Management WGU Information Technology Management QGC2 Exam Practice Test

WGU Information Technology Management QGC2 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which type of cybersecurity threat spreads across networks without needing to attach itself to a program or file?

Options:

A.

Ransomware

B.

Trojan horse

C.

Worm

D.

Virus

Question 2

How does a leader demonstrate empowerment?

Options:

A.

By outlining job expectations to enhance clarity

B.

By using authority to oversee decisions

C.

By guiding strategy while involving team input

D.

By supporting employee decision-making

Question 3

Which cybersecurity method prevents unauthorized users from accessing readable data?

Options:

A.

Steganography

B.

Data masking

C.

Access control lists

D.

Encryption

Question 4

What is an advantage of virtualization?

Options:

A.

Restricts the availability of resources

B.

Reduces the cost of ownership and makes IT simpler to manage

C.

Allows for greater workload stagnation

D.

Increases reliance on manual operations

Question 5

How might a leader manage conflict constructively?

Options:

A.

By limiting conversations to scheduled team updates

B.

By favoring top-down decisions to reduce conflict arising from team input

C.

By fostering respectful dialogue between employees

D.

By prioritizing task completion over team dynamics

Question 6

Which lifecycle stage of ITIL focuses on creating services and procedures?

Options:

A.

Service design (SD)

B.

Service transition (ST)

C.

Service strategy (SS)

D.

Service operation (SO)

Question 7

A finance company wants to analyze subjective financial values of intangibles such as goodwill.

Which type of artificial intelligence should it use to meet this goal?

Options:

A.

Intelligent agent

B.

Genetic algorithm

C.

Neural network

D.

Fuzzy logic

Question 8

How does a manager improve efficiency?

Options:

A.

By optimizing resource allocation

B.

By prioritizing output over quality

C.

By focusing on speed over strategic planning

D.

By eliminating collaboration to speed up tasks

Question 9

What is the primary purpose of regular communication between Agile teams and stakeholders?

Options:

A.

To define and enforce a fixed set of project requirements from the start

B.

To distribute tasks evenly and ensure team workloads are balanced

C.

To confirm the solution aligns with evolving requirements throughout the project

D.

To finalize documentation and lock project details early in development

Question 10

Which minor component holds non-volatile memory?

Options:

A.

Arithmetic-logic unit (ALU)

B.

Read-only memory (ROM)

C.

Random-access memory (RAM)

D.

Solid-state drive (SSD)

Question 11

Which process is improved by manufacturing enterprise resource planning (ERP) systems?

Options:

A.

Coordinating materials and production

B.

Developing packaging designs

C.

Managing employee time-off

D.

Designing prototypes

Question 12

Which enterprise resource planning (ERP) feature benefits small businesses?

Options:

A.

Minimal IT infrastructure

B.

Offline processing only

C.

Customizable business modules

D.

Simple setup and low cost

Question 13

Which term describes an iterative design approach that builds a model of a system to ensure it meets user and business requirements?

Options:

A.

Rapid application development (RAD)

B.

Joint application development (JAD)

C.

Discovery prototyping

D.

Loose coupling

Question 14

What is the purpose of project communication management?

Options:

A.

To define quality standards for deliverables

B.

To ensure the right people receive the right information

C.

To monitor risks that could affect communication

D.

To document who is responsible for tasks

Question 15

What is a preliminary concern when moving disaster recovery operations to the cloud?

Options:

A.

Multiple delays in data access during outages

B.

Regulatory challenges in some regions

C.

Limited visibility into system performance

D.

Backup processes are interrupted

Question 16

Which cybersecurity attack disrupts the normal use of a network?

Options:

A.

Session hijacking

B.

Denial-of-service

C.

DNS spoofing

D.

Malware infection

Question 17

How should high-risk, high-impact items be handled?

Options:

A.

Develop a plan to revisit them in future phases

B.

Draft a summary of risks for status reports

C.

Track them without taking immediate action

D.

Create mitigation plans to address them

Question 18

What is the benefit of internet protocol (IP) telephony in unified communications?

Options:

A.

It integrates voice and video.

B.

It has superior sound quality for all users.

C.

It is compatible with chat and email.

D.

It uses physical phone lines.

Question 19

Which hardware component controls and carries out operations within a computer system?

Options:

A.

Hard drive

B.

Random access memory

C.

Graphics card

D.

Processor

Question 20

What are ecological results of the expanded use of technology? Choose 2 answers.

Options:

A.

Lengthened life span of computer equipment

B.

Increased carbon emissions

C.

More people purchasing computer equipment

D.

Decreased electronic waste

E.

Increased energy consumption

Question 21

Which system supports front-line retail teams in real-time decision-making by updating sales and inventory information as activity occurs?

Options:

A.

Online transaction processing system

B.

Decision support system

C.

Management information system

D.

Customer relationship management system

Question 22

What is the meaning of scope creep?

Options:

A.

Managing new requests through change control

B.

Updating the project schedule

C.

Making minor changes to improve team efficiency

D.

Adding unapproved changes

Question 23

What is a benefit of unified communications?

Options:

A.

Faster access to resources

B.

Increased storage capacity

C.

Centralized billing support

D.

Enhanced collaboration

Question 24

What is the role of executive sponsors in a project?

Options:

A.

Tracking to ensure all key project milestones are completed on time

B.

Defining and developing the project plan

C.

Providing financial resources for a project

D.

Collaborating with project staff to ensure their own interests are represented

Question 25

How long does an Agile sprint typically last?

Options:

A.

Two to four weeks

B.

One to two months

C.

Until all sprint goals are completed

D.

Three to six weeks

Question 26

What does the Information Technology Infrastructure Library (ITIL) provide to organizations in managing IT services?

Options:

A.

Enforcement of detailed operational controls across departments

B.

Provision of structured guidance for operational considerations

C.

Alignment of processes with external compliance standards

D.

Promotion of transparency through ethical oversight of services

Question 27

A logistics company wants to reduce fuel costs and improve route efficiency.

Which type of software would support this goal?

Options:

A.

Warehouse management software

B.

Procurement management software

C.

Demand forecasting software

D.

Supply chain management software

Question 28

What is the purpose of a storyboard in the context of system development?

Options:

A.

To map the user’s journey with a system

B.

To create an interactive model of a system

C.

To conduct detailed user testing sessions

D.

To write code for a new software feature

Question 29

What is a global workforce trend that will impact IT leaders?

Options:

A.

Growing demand for service-oriented employment opportunities

B.

Increasing demand for highly skilled professionals in specialized fields

C.

Decreasing reliance on technical roles due to automation

D.

Decreasing emphasis on specialized education and training

Question 30

A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?

Options:

A.

Virtual reality

B.

Neural network

C.

Intelligent agent

D.

Fuzzy logic

Question 31

A business struggles to manage inquiries and follow-ups because data is spread across different systems.

Which software type could address this problem?

Options:

A.

Digital marketing management system

B.

Advanced business intelligence platform

C.

Customer relationship management system

D.

Enterprise resource planning solution

Question 32

What is the goal of the maintenance phase in the system development life cycle (SDLC)?

Options:

A.

To fix defects and update the software

B.

To gather initial business requirements

C.

To conduct unit testing and receive feedback

D.

To design and deploy the software architecture

Question 33

What is a consequence of offshore outsourcing?

Options:

A.

Longer feedback cycles

B.

Increased management overhead

C.

Offshore growth challenges

D.

Time zone coordination issues

Question 34

Which statement describes the planning phase of the systems development life cycle (SDLC)?

Options:

A.

Performing corrections, additions, and upgrades to ensure the system continually meet business goals

B.

Establishing full descriptions of the desired features and operations of the system

C.

Establishing a high-level strategy and goals for an intended project

D.

Bringing project pieces together, checking interoperability, and verifying functionality

Question 35

Which process involves the use of monitoring tools to detect and respond to unauthorized access attempts in real time?

Options:

A.

Penetration testing

B.

Access control

C.

Log review

D.

Intrusion detection

Question 36

Which information system facilitates the sharing of data between the human resources and purchasing department in the same corporation?

Options:

A.

Executive support (ES)

B.

Geographic information system (GIS)

C.

Enterprise resource planning (ERP)

D.

Customer relationship management (CRM)

Question 37

Which method protects against unauthorized physical access to sensitive data?

Options:

A.

Software patching

B.

Data encryption

C.

Firewall configuration

D.

Biometric authentication

Question 38

Which action helps ensure legal compliance in IT?

Options:

A.

Focusing on implementing new IT systems

B.

Auditing IT practices on a regular basis

C.

Reviewing laws during annual planning

D.

Consulting external experts without follow-up

Question 39

What is one benefit of reducing the movement of workers, raw materials, and equipment within a supply chain process?

Options:

A.

It enhances operational safety and efficiency.

B.

It reduces the need to train employees in multiple roles.

C.

It allows for more variation in workflow paths.

D.

It enables greater flexibility in resource allocation.

Question 40

A company no longer wants to sell one product to as many customers as possible. Now they want to sell one customer as many products as possible. Which type of software gathers and analyzes customer information to tailor this marketing campaign?

Options:

A.

Distribution management (DM)

B.

Customer relationship management (CRM)

C.

Supply chain management (SCM)

D.

Operations management (OM)

Question 41

What is a key part of resource management?

Options:

A.

Reviewing communication methods with stakeholders

B.

Obtaining and managing needed resources

C.

Monitoring quality standards across deliverables

D.

Scheduling tasks and project milestones

Question 42

Which feature of a customer relationship management (CRM) system allows sales representatives to track the progress of potential deals?

Options:

A.

Sales tracking

B.

Customer asset tracking

C.

Sales performance metrics

D.

Customer segmentation

Question 43

How should leaders promote ethical IT behavior among employees?

Options:

A.

By assigning responsibility for ethics to individual departments

B.

By providing regular training on ethical expectations

C.

By covering ethics briefly during initial onboarding

D.

By relying on team leaders to address ethical concerns informally

Question 44

Which scenario would cause an organization to create a global team?

Options:

A.

As the organization grows it is becoming difficult to find talent in the local market.

B.

For security purposes the organization is moving to a private cloud provider.

C.

The organization is embarking on a digital transformation effort.

D.

The organization's largest client is the United States Military.

Question 45

Which feature makes mobile operating systems different from desktop operating systems in business use?

Options:

A.

Mobile operating systems support complex, multi-user access across enterprise domains.

B.

Mobile operating systems include advanced tools for high-end peripheral hardware.

C.

Mobile operating systems enable virtualization of enterprise server environments.

D.

Mobile operating systems function efficiently on battery-powered, touchscreen devices.

Question 46

What is the importance of the partners and suppliers dimension of the ITIL model?

Options:

A.

Staffing an organization fosters the creation of value.

B.

The relationship with both suppliers and consumers must create value.

C.

Supplying data allows companies to make wise investments and assemble technology solutions.

D.

The creation of value is solely beneficial to the customer.

Question 47

Which epolicy is the starting point and the umbrella for all other policies the organization might establish?

Options:

A.

Computer use

B.

Email privacy

C.

Acceptable use

D.

Information privacy

Question 48

Why is collaboration between the chief information officer (CIO) and the chief marketing officer (CMO) essential in digital strategy?

Options:

A.

To give the marketing team control over IT operations

B.

To prevent overlap between IT and marketing functions

C.

To coordinate strategic efforts across the organization

D.

To reduce the role of marketing in technology decisions

Question 49

Which challenge can arise from toxic materials in electronics?

Options:

A.

Maintaining employee safety during use

B.

Explaining performance limits to end users

C.

Meeting disposal and recycling rules

D.

Reducing environmental certification costs

Question 50

Which type of operating system is commonly used in specialized business devices like point-of-sale systems, industrial controllers, or smart appliances?

Options:

A.

A desktop system used to run office productivity software

B.

A Chrome OS cloud-based system used to access web applications from a laptop

C.

A Linux-based system designed to operate on embedded hardware

D.

A mobile system designed for personal communication and entertainment

Question 51

Which advantage does a storyboard provide in a rapid design challenge?

Options:

A.

It can quickly communicate a solution.

B.

It requires extensive resources and time to create.

C.

It allows for detailed coding and programming.

D.

It can be used to finalize the product design.

Question 52

Which basic business system serves operational level analysts in an organization?

Options:

A.

Optimization analysis system (OAS)

B.

Decision support system (DSS)

C.

Transaction processing system (TPS)

D.

Executive information system (EIS)

Question 53

Which material in electronic devices poses an environmental hazard?

Options:

A.

Mercury in displays

B.

Plastic used for insulation

C.

Aluminum in casings

D.

Gold used in connector pins

Question 54

What is communications media in a unified communications system?

Options:

A.

Software-based phone that uses VoIP

B.

Mobile conferencing phone-like tool

C.

Signal converter for analog phones

D.

Traditional phone with networking support

Question 55

What is the purpose of system testing in the system development life cycle (SDLC)?

Options:

A.

To review the individual components of the system

B.

To gather the system’s user requirements

C.

To design the software architecture

D.

To verify the system meets specific requirements

Question 56

Which type of malware disguises itself as legitimate software to gain access to systems?

Options:

A.

Keylogger

B.

Trojan horse

C.

Spyware

D.

Rootkit

Question 57

Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.

Options:

A.

Automates the different activities of the supply chain

B.

Serves as a unique product identifier

C.

Tracks a product's journey from manufacturing facility to store

D.

Discards inconsistent, incorrect, or incomplete information

Question 58

What is a preliminary concern when moving disaster operations to the cloud?

Options:

A.

Backup processes are interrupted

B.

Limited visibility into system performance

C.

Regulatory challenges in some regions

D.

Multiple delays in data access during outages

Question 59

Which phase of the waterfall methodology is executed immediately prior to the implementation phase?

Options:

A.

Analysis

B.

Testing

C.

Development

D.

Maintenance

Question 60

Where is data stored when using a USB flash drive?

Options:

A.

Shared network location

B.

Local solid-state memory

C.

Computer hardware

D.

Browser cache

Question 61

How do small and medium enterprise (SME)-focused enterprise resource planning (ERP) systems help small businesses?

Options:

A.

They simplify budgets by reducing reporting.

B.

They automate growth strategy design.

C.

They provide core functions at low cost.

D.

They deliver advanced forecasting.

Question 62

What does presence information help determine in unified communications?

Options:

A.

Currently active tools

B.

Availability of a user

C.

When the user last logged on

D.

If a message has been sent

Question 63

Which behavior supports ethical IT use in the workplace?

Options:

A.

Allowing personal devices without security controls

B.

Monitoring employee activity prior to explaining policies

C.

Providing clear guidelines on technology use

D.

Giving open access to company data for collaboration