ASSESSMENT EXAM WITH 100 QUESTIONS AND
CORRECT VERIFIED ANSWERS/ WGU D075 OA
INFORMATION TECHNOLOGY MANAGEMENT
ESSENTIALS REAL EXAM (BRAND NEW!!)
Computer system administrators protect the organization when they require strong
passwords to connect to the server, enact policies for safe internet browsing, and
install malware-protection software to keep unwanted users and viruses out.
Which term is used to describe this set of practices?
*Software protection
*End-user security
*Network security
*Malware protection - ANSWER-Network security
Which level of security is an organization using when access to a resource requires
a log-in ID and password to gain access to the network or an application?
Systems security.
Application security.
User level security.
Database security. - ANSWER-user level security
In a database management system (DBMS), data is stored in_____ and connected
to each other with related information.
Containers.
Queries.
pg. 1
,Tables.
Foreign key. - ANSWER-tables
What is the final step in the deployment and use of an app?
*Market the app using focused marketing to reach the desired audience
*Launch the app in the app stores for all applicable platforms
*Track the technical performance and user reviews of the app
*Maintain and upgrade the app based on use and user feedback - ANSWER-
Maintain and upgrade the app based on use and user feedback
Which type of device is an ethernet card?
*Network interface controller (NIC)
*Network firewall hardware
*Network operating system (NOS)
*Network server hardware - ANSWER-Network interface controller (NIC)
What is the purpose of a MAC address?
*To uniquely identify an internet URL
*To uniquely identify a computer motherboard
*To uniquely identify an email client
*To uniquely identify a computer on a network - ANSWER-To uniquely identify a
computer on a network
A large automobile maker has added sensors to its assembly line equipment to alert
managers to manufacturing anomalies via a mobile application (app) on their
smartphones. This Internet of Things (IoT) system connects proprietary
manufacturing components.
pg. 2
, What is the greatest risk created by incorporating this IoT system?
*Reduced worker productivity
*Increased production cost
*Reduced management effectiveness
*Increased security risk - ANSWER-Increased security risk
A design business has employees based in different parts of the country, with
employees working from home. This allows businesses to attract the best expertise
and talent. What IT solution would allow the employees to collaborate in real-time
as they work remotely?
Web-based software.
LAN based databases.
WAN based printers.
Forward facing processes. - ANSWER-web based software
What are collaborative systems that organize, create, and distribute an
organization's collective knowledge to its users and customers, and also serves as a
central location that organizes ideas making them easy to access company-wide?
Customer Relationship Management (CRM).
Knowledge Management System (KMS).
Enterprise Resource Planning (ERP).
Structured query language (SQL). - ANSWER-knowledge management systems
Which IT position serves as the conduit between IT infrastructure and the other
functions of a customer/business?
Computer Systems Analyst.
IT Architect.
pg. 3