Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Information-Technology-Management PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

Information-Technology-Management PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: WGU Information Technology Management QGC1
  • Last Update: Dec 5, 2024
  • Questions and Answers: 66
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

Information-Technology-Management Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

Information-Technology-Management Practice Exam Questions with Answers WGU Information Technology Management QGC1 Certification

Question # 6

Which organizational policy states that an employee should never send unsolicited emails outside the organization?

A.

Information use policy

B.

Employee monitoring policy

C.

Anti-spam policy

D.

Social media policy

Full Access
Question # 7

Which epolicy is the starting point and the umbrella for all other policies the organization might establish?

A.

Computer use

B.

Email privacy

C.

Acceptable use

D.

Information privacy

Full Access
Question # 8

What should an IT leader consider when creating a presentation that will be delivered to the board of directors?

A.

Be through and provide all the technical details

B.

Focus on problems rather than solutions

C.

Brevity is key because of time constraints

D.

Know the audience and speak to their level of knowledge

Full Access
Question # 9

A company has a large percentage of employees who resist the use of new technologies. What should the company consider first before implementing a unified communications system?

A.

Pilot testing

B.

Employee accessibility

C.

Corporate culture

D.

Competitors' systems

Full Access
Question # 10

Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.

A.

Business continuity plans

B.

Augmentation plans

C.

Authentication plans

D.

Disaster recovery plans

E.

Backup and recovery plans

Full Access
Question # 11

Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.

A.

Automates the different activities of the supply chain

B.

Serves as a unique product identifier

C.

Tracks a product's journey from manufacturing facility to store

D.

Discards inconsistent, incorrect, or incomplete information

Full Access
Question # 12

Which business layer determines which products or services are being sold and to whom?

A.

Systems

B.

Operating

C.

Corporate

D.

Strategy

Full Access
Question # 13

Which operational customer relationship management (CRM)technology maintains customer data and identifies prospective customers for future sales?

A.

Cross-selling

B.

Campaign management

C.

Call scripting

D.

Contact management

Full Access
Question # 14

How can a unified communications system meet the communication goals of most organizations?

A.

Manages customer expectations

B.

Reduces latency between parties

C.

Generates innovative solutions

D.

Makes employees more comfortable

Full Access
Question # 15

Which benefit does a prototype provide to a client?

A.

Detailed instructions for development

B.

Demonstration of interaction with the interface

C.

Blueprint of the entire project

D.

Static example of the finished product

Full Access
Question # 16

What is the purpose of the Internet Use portion of the IT ethics policy?

A.

To improve worker productivity

B.

To specify which email messages may be read by others

C.

To identify company branding for use in communications

D.

To specify what a user can and cannot do with company printers

Full Access
Question # 17

What is an example of a knowledge factor used for authentication?

A.

ID card

B.

Password

C.

Security token

D.

Fingerprint

Full Access
Question # 18

Which statement describes the development phase of the systems development life cycle (SDLC)?

A.

Physically constructing software and information systems using programming languages

B.

Performing corrections, additions, and upgrades to ensure the system continually meets business goals

C.

Bringing project pieces together, checking interoperability, and verifying functionality

D.

Placing the software or information system into production to allow users to perform business operations

Full Access
Question # 19

Which lifecycle stage of ITIL focuses on creating services and procedures?

A.

Service design (SD)

B.

Service transition (ST)

C.

Service strategy (SS)

D.

Service operation (SO)

Full Access