Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Information-Technology-Management Exam Dumps - WGU Information Technology Management QGC2

Searching for workable clues to ace the WGU Information-Technology-Management Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s Information-Technology-Management PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 25

Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.

A.

Business continuity plans

B.

Augmentation plans

C.

Authentication plans

D.

Disaster recovery plans

E.

Backup and recovery plans

Full Access
Question # 26

What is the purpose of an IT ethics policy?

A.

To require approval before implementing new technologies

B.

To define values as adherence to internal technical policies

C.

To guide decisions based on values and standards

D.

To encourage proper conduct in IT project budgeting

Full Access
Question # 27

What is a primary purpose of using prototypes in the business analysis process?

A.

To develop the back-end code of the final product

B.

To replace user manuals with interactive simulations

C.

To model requirements and gather early feedback from stakeholders

D.

To finalize the visual design and branding of the product

Full Access
Question # 28

What is the purpose of system testing in the system development life cycle (SDLC)?

A.

To review the individual components of the system

B.

To gather the system’s user requirements

C.

To design the software architecture

D.

To verify the system meets specific requirements

Full Access
Question # 29

Which outsourcing model has the least security compliance risk?

A.

Cloud-based outsourcing

B.

Nearshore outsourcing

C.

Offshore outsourcing

D.

Onshore outsourcing

Full Access
Question # 30

Which network gives outside users controlled access to internal resources?

A.

Intranet

B.

Virtual private network

C.

Local area network

D.

Extranet

Full Access
Question # 31

Which type of malware disguises itself as legitimate software to gain access to systems?

A.

Keylogger

B.

Trojan horse

C.

Spyware

D.

Rootkit

Full Access
Question # 32

Which tool can be used to list project tasks vertically against project time frame listed horizontally?

A.

PERT chart

B.

Project model

C.

Venn diagram

D.

Gantt chart

Full Access
Go to page: