WGU D075 - UNIT 2 - MODULES 1 – 3 | PA|PRE-ASSESSMENT| EXAM
Correct
Incorrect
Hosts Hardware
, 2 of 55
Term
Which category of software is Microsoft Office?
Give this one a try later!
Collaboration software Systems software
Productivity software Presentation software
Don't know?
3 of 55
Term
A company has recently discovered that unauthorized users have
accessed data on the company intranet. Which IT professional
should investigate this concern?
Give this one a try later!
Information security analyst Computer systems analyst
Database administrator Computer system administrator
Don't know?
, 4 of 55
Term
What is the term used to refer to a massive, room-sized computer
that processes and stores enormous amounts of bulk data and
information?
Give this one a try later!
Mainframes Rack Servers
Microcomputer Routers
Don't know?
5 of 55
Definition
Responsible for protecting all sensitive information in an
organization. Also known as cyber security analysts.
Develops and implements compliance policies.
Deploys firewalls.
Identifies security problems, risks, and attacks.
Performs regular internal audits of system, application, and supplier
interfaces to check for system vulnerabilities.
Give this one a try later!
, Chief Technology Officer Information Security Analyst
(ISA)
Computer Systems Administrator Database Administrator (DBA)
Don't know?
6 of 55
Term
A company is planning several major software development
projects.
Which IT professional leads the software applications development
team that will develop, design, program, and test the software
applications?
Give this one a try later!
IT Manager IT Architects
Server Marketing Specialist
Don't know?
7 of 55
Term
In the report, the consultant noted that the company’s network is in
need of maintenance.
Correct
Incorrect
Hosts Hardware
, 2 of 55
Term
Which category of software is Microsoft Office?
Give this one a try later!
Collaboration software Systems software
Productivity software Presentation software
Don't know?
3 of 55
Term
A company has recently discovered that unauthorized users have
accessed data on the company intranet. Which IT professional
should investigate this concern?
Give this one a try later!
Information security analyst Computer systems analyst
Database administrator Computer system administrator
Don't know?
, 4 of 55
Term
What is the term used to refer to a massive, room-sized computer
that processes and stores enormous amounts of bulk data and
information?
Give this one a try later!
Mainframes Rack Servers
Microcomputer Routers
Don't know?
5 of 55
Definition
Responsible for protecting all sensitive information in an
organization. Also known as cyber security analysts.
Develops and implements compliance policies.
Deploys firewalls.
Identifies security problems, risks, and attacks.
Performs regular internal audits of system, application, and supplier
interfaces to check for system vulnerabilities.
Give this one a try later!
, Chief Technology Officer Information Security Analyst
(ISA)
Computer Systems Administrator Database Administrator (DBA)
Don't know?
6 of 55
Term
A company is planning several major software development
projects.
Which IT professional leads the software applications development
team that will develop, design, program, and test the software
applications?
Give this one a try later!
IT Manager IT Architects
Server Marketing Specialist
Don't know?
7 of 55
Term
In the report, the consultant noted that the company’s network is in
need of maintenance.