Practice Questions with Verified Answers & Detailed Explanations | IT
Strategy, Governance, Risk Management, Systems Planning, Project
Management, Cybersecurity Basics & Business Technology Leadership
Prep
Question 1: What is the primary objective of Information Technology Management?
• A) To develop software applications
• B) To align IT resources with business goals
• C) To manage hardware inventory
• D) To increase employee productivity
CORRECT ANSWER: B
Rationale: Aligning IT resources with business goals ensures that technology supports
strategic objectives, maximizing the value of IT investments.
Question 2: Which of the following is a key component of IT governance?
• A) Software development lifecycle
• B) Cybersecurity measures
• C) Policy and decision-making frameworks
• D) Network infrastructure
CORRECT ANSWER: C
Rationale: IT governance encompasses the processes and structures that ensure the IT
strategy aligns with business goals and objectives, making policy and decision-making
crucial.
Question 3: What does ITIL stand for?
• A) Information Technology Infrastructure Library
• B) Internet Technology Integration Layer
• C) Information Technology Implementation Lifecycle
• D) Integrated Technology Innovation Laboratory
CORRECT ANSWER: A
Rationale: ITIL stands for Information Technology Infrastructure Library, which provides
best practices for IT service management.
Question 4: Which model is commonly used for managing IT projects?
, • A) Waterfall
• B) Agile
• C) Scrum
• D) All of the above
CORRECT ANSWER: D
Rationale: All these models (Waterfall, Agile, Scrum) are commonly used in managing
IT projects, each suitable for different project requirements.
Question 5: What does the term 'digital transformation' refer to?
• A) The shift from physical to digital products
• B) The process of using digital technologies to change business models
• C) The integration of digital technology into all areas of a business
• D) None of the above
CORRECT ANSWER: C
Rationale: Digital transformation means integrating digital technology into all aspects
of a business, fundamentally changing how it operates and delivers value.
Question 6: What is the function of a firewall in an IT environment?
• A) To speed up network connections
• B) To manage user access
• C) To monitor and control incoming and outgoing network traffic
• D) To manage software updates
CORRECT ANSWER: C
Rationale: Firewalls act as a barrier between trusted and untrusted networks,
monitoring and controlling the flow of data.
Question 7: Which of the following is an example of a cloud service model?
• A) Infrastructure as a Service (IaaS)
• B) Software as a Service (SaaS)
• C) Platform as a Service (PaaS)
• D) All of the above
,CORRECT ANSWER: D
Rationale: IaaS, SaaS, and PaaS are all cloud service models that provide different
levels of service and resources over the internet.
Question 8: What does 'Big Data' refer to?
• A) Large physical storage devices
• B) Data that is complex and unstructured
• C) Data sets that are too large or complex for traditional data-processing
software
• D) All of the above
CORRECT ANSWER: D
Rationale: Big Data refers to large and complex data sets that require advanced tools
and methods for processing and analysis.
Question 9: Which of the following best describes a 'help desk'?
• A) A physical location for customer service
• B) A support service for resolving IT issues
• C) A management tool for IT services
• D) A software program for financial management
CORRECT ANSWER: B
Rationale: A help desk provides support and assistance to users for resolving IT-related
issues and inquiries.
Question 10: What is the primary purpose of data encryption?
• A) To reduce data size
• B) To protect sensitive information from unauthorized access
• C) To improve data transfer speed
• D) To enhance data storage efficiency
CORRECT ANSWER: B
Rationale: Data encryption secures sensitive information by converting it into a coded
format that can only be read with a decryption key.
Question 11: What is the primary benefit of adopting an IT outsourcing strategy?
, • A) Increased hardware costs
• B) Limited access to expertise
• C) Focus on core business activities
• D) Cost savings and efficiency
CORRECT ANSWER: D
Rationale: IT outsourcing often leads to cost savings and allows organizations to focus
on their core business functions by leveraging external expertise.
Question 12: What is a significant challenge of implementing enterprise resource
planning (ERP) systems?
• A) High implementation costs
• B) Unlimited scalability
• C) Increased data redundancy
• D) Simplified maintenance
CORRECT ANSWER: A
Rationale: Implementing ERP systems can be expensive due to the resources required
for software, training, and integration.
Question 13: Which of the following is a benefit of adopting Agile methodologies?
• A) Fixed project scope
• B) Increased flexibility and adaptability
• C) Extended delivery timelines
• D) Reduced customer involvement
CORRECT ANSWER: B
Rationale: Agile methodologies prioritize flexibility, allowing teams to adapt quickly to
changing requirements and feedback.
Question 14: Which of the following is NOT a cybersecurity threat?
• A) Phishing
• B) Ransomware
• C) System updates
• D) Malware