Big Cyber Monday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Information-Technology-Management Questions and Answers

Question # 6

Which type of network connects devices such as smartphones within a short range?

A.

Personal area

B.

Local area

C.

Cellular

D.

Wide area

Full Access
Question # 7

Which tool can be used to list project tasks vertically against project time frame listed horizontally?

A.

PERT chart

B.

Project model

C.

Venn diagram

D.

Gantt chart

Full Access
Question # 8

Which protocol provides for the collection, organization, and modification of information about managed devices on IP networks?

A.

Telnet protocol (TELNET)

B.

Hypertext Transfer Protocol (HTTP)

C.

Simple Network Management Protocol (SNMP)

D.

File Transfer Protocol (FTP)

Full Access
Question # 9

Which method protects against unauthorized physical access to sensitive data?

A.

Software patching

B.

Data encryption

C.

Firewall configuration

D.

Biometric authentication

Full Access
Question # 10

Which type of malware disguises itself as legitimate software to gain access to systems?

A.

Keylogger

B.

Trojan horse

C.

Spyware

D.

Rootkit

Full Access
Question # 11

An organization wants to simulate how a product will perform under various conditions before it is built.

Which type of software supports this need?

A.

Computer-aided engineering

B.

Predictive analytics

C.

Supply chain management

D.

Asset management

Full Access
Question # 12

Which dashboard capability helps a business manager break down data into segments to understand it from different perspectives?

A.

Pivot

B.

Exploration

C.

Consolidation

D.

Slice-and-dice

Full Access
Question # 13

A software development team is translating software requirements into computer code.

Which gate of the Rational Unified Process (RUP) is the organization executing?

A.

Elaboration

B.

Inception

C.

Construction

D.

Transition

Full Access
Question # 14

A logistics company wants to reduce fuel costs and improve route efficiency.

Which type of software would support this goal?

A.

Warehouse management software

B.

Procurement management software

C.

Demand forecasting software

D.

Supply chain management software

Full Access
Question # 15

Which hacking method involves forging the from address so that replies go to an unintended audience?

A.

Packet tampering

B.

Spoofing

C.

Spyware

D.

Hoaxes

Full Access
Question # 16

How should leaders promote ethical IT behavior among employees?

A.

By assigning responsibility for ethics to individual departments

B.

By providing regular training on ethical expectations

C.

By covering ethics briefly during initial onboarding

D.

By relying on team leaders to address ethical concerns informally

Full Access
Question # 17

Which statement describes the role of Information Technology Infrastructure Library (ITIL) in modern IT management?

A.

ITIL dictates the step-by-step processes for IT departments.

B.

ITIL replaces existing IT management frameworks.

C.

ITIL offers adaptable guidelines to enhance IT services.

D.

ITIL is applicable to large enterprises with extensive IT departments.

Full Access
Question # 18

Which term is used to describe the business needs, justification, requirements, and boundaries of a project?

A.

Project scope

B.

Project management

C.

Project milestone

D.

Project plan

Full Access
Question # 19

Which term describes an iterative design approach that builds a model of a system to ensure it meets user and business requirements?

A.

Rapid application development (RAD)

B.

Joint application development (JAD)

C.

Discovery prototyping

D.

Loose coupling

Full Access
Question # 20

Which type of logical data structure uses graphics to illustrate relationships among data elements?

A.

Integration

B.

Structured query language

C.

Data model

D.

Relational database model

Full Access
Question # 21

What is the function of a primary key in a database table?

A.

To connect tables to external systems

B.

To manage user access for each table row

C.

To identify each record in a table

D.

To improve storage efficiency for large tables

Full Access
Question # 22

What is the purpose of the Internet Use portion of the IT ethics policy?

A.

To improve worker productivity

B.

To specify which email messages may be read by others

C.

To identify company branding for use in communications

D.

To specify what a user can and cannot do with company printers

Full Access
Question # 23

Which term refers to the ability to adapt a facility layout to accommodate new product lines or technology upgrades?

A.

Scalability

B.

Material requirements planning

C.

Operational redundancy

D.

Sustainability

Full Access
Question # 24

Which business layer determines which products or services are being sold and to whom?

A.

Systems

B.

Operating

C.

Corporate

D.

Strategy

Full Access
Question # 25

What is a reason an organization would implement unified communications?

A.

To expand employee connectivity

B.

To reduce reliance on mobile devices

C.

To maintain legacy systems

D.

To increase paper-based documentation

Full Access
Question # 26

A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?

A.

Virtual reality

B.

Neural network

C.

Intelligent agent

D.

Fuzzy logic

Full Access
Question # 27

Which step involves validating a user's identity before allowing access to a system or resource?

A.

Confidentiality

B.

Authorization

C.

Accounting

D.

Authentication

Full Access
Question # 28

What is the purpose of procurement management in a project?

A.

To evaluate internal team workloads and capacity

B.

To obtain goods and services from external providers

C.

To manage internal teams and physical resources

D.

To control project communications with stakeholders

Full Access
Question # 29

Which type of computer is designed for high-volume data processing and enterprise-level tasks?

A.

Mainframe

B.

Desktop

C.

Laptop

D.

Workstation

Full Access
Question # 30

Which enterprise resource planning (ERP) feature benefits small businesses?

A.

Minimal IT infrastructure

B.

Offline processing only

C.

Customizable business modules

D.

Simple setup and low cost

Full Access
Question # 31

Which process includes assessing and prioritizing threats to reduce the potential impact on an organization?

A.

Threat modeling

B.

Penetration testing

C.

Cyber hygiene

D.

Risk management

Full Access
Question # 32

What is an advantage of virtualization?

A.

Restricts the availability of resources

B.

Reduces the cost of ownership and makes IT simpler to manage

C.

Allows for greater workload stagnation

D.

Increases reliance on manual operations

Full Access
Question # 33

Which minor component holds non-volatile memory?

A.

Arithmetic-logic unit (ALU)

B.

Read-only memory (ROM)

C.

Random-access memory (RAM)

D.

Solid-state drive (SSD)

Full Access
Question # 34

How do environmental, social, and governance (ESG) principles affect IT projects?

A.

They influence sustainability and ethics in decisions.

B.

They guide procurement based on economic factors.

C.

They place restrictions on how companies are structured.

D.

They emphasize successful planning processes and strategies.

Full Access
Question # 35

What happens during the implementation phase of the systems development life cycle (SDLC)?

A.

Software and information systems are physically constructed using programming languages.

B.

Corrections, additions, and upgrades are performed to ensure the system continually meets business goals.

C.

Software or information systems are placed into production to allow users to perform business operations.

D.

Project pieces are brought together, interoperability is checked, and functionality is verified.

Full Access
Question # 36

What is a wireframe in IT design?

A.

A diagram of system data flow without functionality

B.

A polished design with visual design and interactivity

C.

A basic layout without visual design or interactivity

D.

A detailed coded interface for backend testing

Full Access
Question # 37

What is the benefit of internet protocol (IP) telephony in unified communications?

A.

It integrates voice and video.

B.

It has superior sound quality for all users.

C.

It is compatible with chat and email.

D.

It uses physical phone lines.

Full Access
Question # 38

Which benefit does a prototype provide to a client?

A.

Detailed instructions for development

B.

Demonstration of interaction with the interface

C.

Blueprint of the entire project

D.

Static example of the finished product

Full Access
Question # 39

A company wants to streamline operations and ensure that different departments can share information and coordinate decisions using a unified digital platform.

Which type of software supports this goal?

A.

Project management

B.

Enterprise system

C.

Transaction processing system

D.

Data analysis platform

Full Access
Question # 40

What is the goal of the maintenance phase in the system development life cycle (SDLC)?

A.

To fix defects and update the software

B.

To gather initial business requirements

C.

To conduct unit testing and receive feedback

D.

To design and deploy the software architecture

Full Access
Question # 41

Which activity is an example of operational decision-making in an organization?

A.

Managing schedules and daily workflows

B.

Evaluating investment opportunities

C.

Designing corporate policies

D.

Setting long-term strategic goals and objectives

Full Access
Question # 42

Which prototyping method demonstrates how a solution operates using various data and business rules as inputs?

A.

Storyboards

B.

Static modeling

C.

Simulation

D.

Workflow modeling

Full Access
Question # 43

What is an example of a knowledge factor used for authentication?

A.

ID card

B.

Password

C.

Security token

D.

Fingerprint

Full Access
Question # 44

Which term refers to the ability to adapt a facility layout to accommodate product lines or technology upgrades?

A.

Operational redundancy

B.

Material requirements planning

C.

Sustainability

D.

Scalability

Full Access
Question # 45

Which system provides a foundation for collaboration between departments, enabling people in different business areas to communicate?

A.

Enterprise resource planning (ERP)

B.

Supply chain management (SCM)

C.

Customer relationship management (CRM)

D.

Electronic data interchange (EDI)

Full Access
Question # 46

How do leaders use organization as a management strategy?

A.

By forming ad hoc teams to foster spontaneous collaboration

B.

By encouraging independent work to enhance creativity

C.

By creating informal groups to solve problems flexibly

D.

By building teams for efficiency and productivity

Full Access
Question # 47

An organization struggles with slow, multi-step payroll operations across disconnected systems.

Which type of software could streamline this process?

A.

Talent development tracking platform

B.

Training compliance monitoring tool

C.

Internal communication portal

D.

Enterprise resource planning

Full Access
Question # 48

Which IT practice supports green computing?

A.

Extending device life with reuse and refurbishment

B.

Prioritizing high performance for faster task completion

C.

Choosing hardware that is economical

D.

Recycling old hardware before it reaches end of life

Full Access
Question # 49

What should an IT leader consider when creating a presentation that will be delivered to the board of directors?

A.

Be through and provide all the technical details

B.

Focus on problems rather than solutions

C.

Brevity is key because of time constraints

D.

Know the audience and speak to their level of knowledge

Full Access
Question # 50

Why is employee training important in an ethical IT use policy?

A.

To create automatic updates of software patches

B.

To reduce sensitivity to the accuracy of company communications

C.

To make employees understand the company's culture and ethical boundaries

D.

To eliminate information management risks

Full Access
Question # 51

Which type of storage retains data even when the computer is powered off?

A.

Solid state drive (SSD)

B.

Optical drive

C.

Virtual memory

D.

Random access memory (RAM)

Full Access
Question # 52

How can a customer relationship management (CRM) system support marketing strategies aimed at specific groups?

A.

By logging interactions

B.

By segmenting data

C.

By mapping sales territories

D.

By reporting financial information

Full Access
Question # 53

Which operational customer relationship management (CRM) technology maintains customer data and identifies prospective customers for future sales?

A.

Cross-selling

B.

Campaign management

C.

Call scripting

D.

Contact management

Full Access
Question # 54

What is a global workforce trend that will impact IT leaders?

A.

Growing demand for service-oriented employment opportunities

B.

Increasing demand for highly skilled professionals in specialized fields

C.

Decreasing reliance on technical roles due to automation

D.

Decreasing emphasis on specialized education and training

Full Access
Question # 55

How does a leader demonstrate empowerment?

A.

By outlining job expectations to enhance clarity

B.

By using authority to oversee decisions

C.

By guiding strategy while involving team input

D.

By supporting employee decision-making

Full Access
Question # 56

Which storage device provides quick access to data and uses flash memory technology?

A.

Hard disk drive

B.

Optical disc drive

C.

Solid-state drive

D.

Magnetic tape drive

Full Access
Question # 57

Which feature makes mobile operating systems different from desktop operating systems in business use?

A.

Mobile operating systems support complex, multi-user access across enterprise domains.

B.

Mobile operating systems include advanced tools for high-end peripheral hardware.

C.

Mobile operating systems enable virtualization of enterprise server environments.

D.

Mobile operating systems function efficiently on battery-powered, touchscreen devices.

Full Access
Question # 58

Which pair of terms describes an add-on that purports to serve a useful function while transmitting user data and displaying pop-up boxes without the user's knowledge or permission?

A.

Downtime and uptime

B.

Hackers and viruses

C.

Ethics and cost

D.

Adware and spyware

Full Access
Question # 59

Which statement describes the planning phase of the systems development life cycle (SDLC)?

A.

Performing corrections, additions, and upgrades to ensure the system continually meet business goals

B.

Establishing full descriptions of the desired features and operations of the system

C.

Establishing a high-level strategy and goals for an intended project

D.

Bringing project pieces together, checking interoperability, and verifying functionality

Full Access
Question # 60

Which method of encryption enables secure communication using a shared secret key?

A.

Asymmetrical encryption

B.

Secure hashing

C.

Data masking

D.

Symmetrical encryption

Full Access
Question # 61

Which scenario would cause an organization to create a global team?

A.

As the organization grows it is becoming difficult to find talent in the local market.

B.

For security purposes the organization is moving to a private cloud provider.

C.

The organization is embarking on a digital transformation effort.

D.

The organization's largest client is the United States Military.

Full Access
Question # 62

Which epolicy is the starting point and the umbrella for all other policies the organization might establish?

A.

Computer use

B.

Email privacy

C.

Acceptable use

D.

Information privacy

Full Access
Question # 63

What describes a Scrum master's role in Agile development?

A.

Coordinating team logistics and managing external vendors

B.

Reviewing code and merging development branches

C.

Guiding team processes and removing impediments

D.

Monitoring system performance and reporting outages

Full Access