WGU Information-Technology-Management Exam (page: 5)
WGU Information Technology Management QGC2
Updated on: 24-Mar-2026

Which two reasons show why organizations need to effectively grasp the deep currents of technological evolution? Choose 2 answers.

  1. To use this knowledge to protect themselves against sudden and fatal technological obsolescence
  2. To provide an organization with a valuable strategic advantage
  3. To keep its manufacturing production running at the current rate
  4. To discover ways to reduce its number of employees and, at the same time, reduce labor costs

Answer(s): A,B

Explanation:

Protecting Against Technological Obsolescence:

Rapid technological advancements can render existing tools or processes obsolete.

Staying updated helps organizations mitigate risks and ensure sustainability.

Providing Strategic Advantage:

Understanding technological trends enables innovation and provides a competitive edge.

This knowledge helps organizations predict market shifts and align their strategies accordingly.

Why Other Options Are Incorrect:

Option C: Maintaining the current manufacturing rate is operational and not directly tied to technological evolution.

Option D: Reducing labor costs might be a result of technological evolution but is not the primary reason for understanding it.

"Technological Evolution and Strategic Advantage" ­ Gartner

IT Obsolescence Risk Mitigation ­ MIT Technology Review



Which software carries out a set of operations on behalf of a user with a degree of independence and employs knowledge of the user's goals?

  1. Information of Everything
  2. Virtual assistant
  3. Autonomous agent
  4. Ambient digital experience

Answer(s): C

Explanation:

Understanding Autonomous Agents:

An autonomous agent is a software entity capable of performing tasks on behalf of a user independently.

It employs knowledge of the user's goals and adapts to achieve them.

Examples of Autonomous Agents:

Examples include shopping bots, automated trading systems, and decision-making software.

Why Other Options Are Incorrect:

Option A (Information of Everything): Refers to interconnected data but not software entities.

Option B (Virtual assistant): Virtual assistants interact with users but are not fully autonomous.

Option D (Ambient digital experience): Refers to seamless digital interaction, not task automation.

"Autonomous Agents in AI Systems" ­ IEEE

Adaptive Software and Autonomous Agents ­ AI Journal



What is a benefit of globalization?

  1. Costs associated with operating in new geographic areas
  2. Adherence to regulatory requirements
  3. Increased competition
  4. Access to new talent pools

Answer(s): D

Explanation:

Definition of Globalization Benefits:

Globalization allows organizations to expand their operations globally, gaining access to diverse markets and resources, including new talent pools from different regions.

Key Benefit:

Accessing new talent pools enables businesses to tap into a diverse workforce with varied skills, fostering innovation and improving operational efficiency.

Incorrect Options Analysis:

A . Costs associated with new geographic areas: This is a challenge, not a benefit.

B . Adherence to regulatory requirements: This is an obligation, not a benefit.

C . Increased competition: This is a consequence of globalization, but not a direct benefit.

and Documents of Information Technology Management:

"Global Workforce Management" (Harvard Business Review).

ITIL Global IT Strategy Framework (Axelos).



Which hacking method involves forging the from address so that replies go to an unintended audience?

  1. Packet tampering
  2. Spoofing
  3. Spyware
  4. Hoaxes

Answer(s): B

Explanation:

Definition of Spoofing:

Spoofing involves forging the "from" address in communications (e.g., emails) so that replies or interactions are misdirected.

Attackers use this method to impersonate trusted entities, steal sensitive information, or redirect responses to malicious actors.

Impact of Spoofing:

Misleads recipients into sharing sensitive information.

Often used in phishing and social engineering attacks.

Incorrect Options Analysis:

A . Packet tampering: Involves altering data packets during transmission.

C . Spyware: Refers to software that secretly monitors user activity.

D . Hoaxes: Refers to false warnings or scams, not address forgery.

and Documents of Information Technology Management:

"Email Security and Spoofing Prevention" (NIST Cybersecurity Framework).

ITIL Security Management Practices (Axelos).



An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information.
Which type of attack is described?

  1. Packet tampering
  2. Spoofing
  3. Elevation of privilege
  4. Hoaxing

Answer(s): C

Explanation:

Definition of Elevation of Privilege Attack:

This attack occurs when an attacker exploits vulnerabilities in systems to escalate their permissions beyond what they are authorized for, gaining access to sensitive data or control over the system.

Example in the Scenario:

The attacker uses a guest account, a low-privilege account, to exploit a system weakness and escalate their privileges, altering user account information.

Incorrect Options Analysis:

A . Packet tampering: Involves altering data packets, not access rights.

B . Spoofing: Involves impersonation, not privilege escalation.

D . Hoaxing: Refers to deceptive scams, unrelated to access rights.

and Documents of Information Technology Management:

"Cybersecurity Vulnerabilities and Exploits" (CIS Controls).

ITIL Risk Management Framework (Axelos).



Which pair of terms describes an add-on that purports to serve a useful function while transmitting user data and displaying pop-up boxes without the user's knowledge or permission?

  1. Downtime and uptime
  2. Hackers and viruses
  3. Ethics and cost
  4. Adware and spyware

Answer(s): D

Explanation:

Definition of Adware and Spyware:

Adware: Software that displays unwanted advertisements.

Spyware: Software that covertly collects user data without consent.

The combination of adware and spyware often masquerades as a legitimate add-on but operates maliciously.

Key Characteristics:

Adware displays pop-up advertisements, while spyware transmits user data to external parties.

Both operate without the user's permission or knowledge.

Incorrect Options Analysis:

A . Downtime and uptime: Relates to system availability, not malicious software.

B . Hackers and viruses: Refers to broader cybersecurity threats, not specific software.

C . Ethics and cost: Unrelated to malicious software behavior.

and Documents of Information Technology Management:

"Adware and Spyware: Detection and Prevention" (SANS Institute).

ITIL Information Security Practices (Axelos).



What is an example of a knowledge factor used for authentication?

  1. ID card
  2. Password
  3. Security token
  4. Fingerprint

Answer(s): B

Explanation:

Understanding Knowledge Factors:

Knowledge factors are something the user knows and are commonly used for authentication.

Examples include passwords, PINs, and security questions.

Why Other Options Are Incorrect:

Option A (ID card): This is a possession factor (something you have).

Option C (Security token): A security token is also a possession factor.

Option D (Fingerprint): This is a biometric factor (something you are).

NIST Authentication Guidelines (SP 800-63)

"Multi-Factor Authentication Best Practices" ­ Gartner



What is a method for confirming users' identities?

  1. Information secrecy
  2. Public key encryption
  3. Authentication
  4. Authorization

Answer(s): C

Explanation:

Defining Authentication:

Authentication is the process of verifying a user's identity to ensure they are who they claim to be.

This is commonly achieved through knowledge factors (passwords), possession factors (tokens), or biometric factors (fingerprints).

Why Other Options Are Incorrect:

Option A (Information secrecy): Focuses on protecting data, not identity confirmation.

Option B (Public key encryption): A method of encryption, not directly tied to user identity verification.

Option D (Authorization): Deals with granting access to resources after authentication.

"Authentication and Identity Management" ­ NIST

Authentication Processes Overview ­ ISO 27001



Viewing Page 5 of 28



Share your comments for WGU Information-Technology-Management exam with other users:

Na 8/9/2023 8:39:00 AM

could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
Anonymous


shime 10/23/2023 10:03:00 AM

this is really very very helpful for mcd level 1
ETHIOPIA


Vnu 6/3/2023 2:39:00 AM

very helpful!
Anonymous


Steve 8/17/2023 2:19:00 PM

question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
CANADA


RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous


Isak 7/6/2023 3:21:00 AM

i need it very much please share it in the fastest time.
Anonymous


Maria 6/23/2023 11:40:00 AM

correct answer is d for student.java program
IRELAND


Nagendra Pedipina 7/12/2023 9:10:00 AM

q:37 c is correct
INDIA


John 9/16/2023 9:37:00 PM

q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
GERMANY


SAM 12/4/2023 12:56:00 AM

explained answers
INDIA


Andy 12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks
SINGAPORE


siva 5/17/2023 12:32:00 AM

very helpfull
Anonymous


mouna 9/27/2023 8:53:00 AM

good questions
Anonymous


Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous


Yves 8/29/2023 8:46:00 PM

very inciting
Anonymous