WGU C954 Information Technology Management
Objective Assessment Final Actual Exam Newest
2025/2026 Complete 100 Exam Questions And Correct
Answers (Verified Answers) |Already Graded A+
Which characteristic of the agile management information system (MIS)
allows organizations to meet business and environmental changes?
A. Reliability
B. Scalability
C. Maintainability
D. Accessibility - ANSWER-C. Maintainability
Which type of malware threatens user privacy and security by
continuously collecting and transmitting personal data without a user's
knowledge or consent?
A. Scareware
B. Adware
C. Spyware
D. Ransomware - ANSWER-C. Spyware
,2|Page
Which cyberattack targets vulnerabilities in software or hardware
systems in order to gain unauthorized access or control over the affected
device?
A. Exploit
B. Phishing
C. Spoofing
D. Trojan - ANSWER-A. Exploit
Which cybersecurity method uses algorithms to convert plaintext data
into ciphertext, thereby protecting it from unauthorized access or
interception?
A. Multi-factor authentication
B. Content filtering
C. Biometrics
D. Encryption - ANSWER-D. Encryption
Which authentication or authorization method is most effective in
maintaining security by verifying a user's identity?
A. Something the user knows, such as a user ID and password
B. Something that is part of the user, such as fingerprints or a voice
signature
C. Something the user has, such as a smart card or token
,3|Page
D. Something the user trusts, such as a link in an email that appears to be
from a legitimate source - ANSWER-B. Something that is part of the
user, such as fingerprints or a voice signature
A company's headquarters has been completely destroyed by a
hurricane. According to its disaster recovery plan (DRP), business
operations will relocate to a backup facility where all necessary
computer equipment is available. However, the equipment will need to
be installed and configured prior to use.
Which kind of facility does this DRP describe?
A. Cold site
B. Warm site
C. Secure site
D. Safe site - ANSWER-B. Warm site
What is the purpose of a business impact analysis within the context of a
business continuity plan (BCP)?
A. To detail priorities and strategies for recovery of critical functional
areas in the event of a specific disaster
B. To manage how incidents such as technology failure are identified
and corrected
C. To gather a record containing all the details of each unplanned
interruption of service
D. To chart the cost to the company of immediate and long-term
recovery of information and systems in the event of a catastrophic
, 4|Page
disaster - ANSWER-A. To detail priorities and strategies for recovery of
critical functional areas in the event of a specific disaster
Which policy requires a user to agree in order to gain access to a
company's email and information systems and to the internet?
A. Email privacy
B. Acceptable use
C. Workplace monitoring
D. Information privacy - ANSWER-B. Acceptable use
What is the definition of opt out?
A. The ability of a company to identify, search, gather, seize, or export
digital information in response to litigation, an audit, an investigation, or
an information inquiry.
B. A choice to deny permission to incoming emails
C. The assurance that messages and information are available only to
those who are authorized to view them
D. The process of watching and responding to what is being said about a
company, individual, product, or brand - ANSWER-B. A choice to deny
permission to incoming emails
What is the definition of workplace management information systems
(MIS) monitoring?