Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Information-Technology-Management Questions and answers with ValidTests

Exam Information-Technology-Management All Questions
Exam Information-Technology-Management Premium Access

View all detail and faqs for the Information-Technology-Management exam

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

What is the bullwhip effect?

Options:

A.

The process of stockpiling excess inventory due to incorrect product demand communication between the supplier and its partners

B.

The optimization resulting from high visibility of all areas up and down the supply chain

C.

A cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things

D.

The process by which products in a network increase in value to users as the number of users increases

Expert Solution
Questions # 22:

A manager asks a team member to identify the top five customers by total dollars spent on the company's services in the past calendar year. Which phase of the customer relationship management (CRM) system does this represent?

Options:

A.

Distributing

B.

Analyzing

C.

Predicting

D.

Reporting

Expert Solution
Questions # 23:

Which business layer determines which products or services are being sold and to whom?

Options:

A.

Systems

B.

Operating

C.

Corporate

D.

Strategy

Questions # 24:

How might global population growth impact IT leaders?

Options:

A.

By supporting the rapid expansion of digital infrastructures

B.

By restricting access to conserve existing resources

C.

By delaying upgrades until population trends stabilize

D.

By focusing on routine system upkeep instead of expanding

Questions # 25:

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

Options:

A.

Monitors enclosures

B.

Protects against encrypted attacks

C.

Provides authentication and authorization

D.

Features full-time monitoring

Questions # 26:

Which risk do strategic chief information officers face?

Options:

A.

Falling behind on market trends

B.

Organizational resistance to change

C.

Focusing too much on technical solutions

D.

Losing credibility with non-technical employees

Questions # 27:

What is a consequence of offshore outsourcing?

Options:

A.

Longer feedback cycles

B.

Increased management overhead

C.

Offshore growth challenges

D.

Time zone coordination issues

Questions # 28:

What is a global workforce trend that will impact IT leaders?

Options:

A.

Growing demand for service-oriented employment opportunities

B.

Increasing demand for highly skilled professionals in specialized fields

C.

Decreasing reliance on technical roles due to automation

D.

Decreasing emphasis on specialized education and training

Questions # 29:

What is an example of a knowledge factor used for authentication?

Options:

A.

ID card

B.

Password

C.

Security token

D.

Fingerprint

Questions # 30:

What is a method for confirming users' identities?

Options:

A.

Information secrecy

B.

Public key encryption

C.

Authentication

D.

Authorization

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions