WGU Information-Technology-Management Exam (page: 5)
WGU Information Technology Management QGC2
Updated on: 09-Feb-2026

Which two reasons show why organizations need to effectively grasp the deep currents of technological evolution? Choose 2 answers.

  1. To use this knowledge to protect themselves against sudden and fatal technological obsolescence
  2. To provide an organization with a valuable strategic advantage
  3. To keep its manufacturing production running at the current rate
  4. To discover ways to reduce its number of employees and, at the same time, reduce labor costs

Answer(s): A,B

Explanation:

Protecting Against Technological Obsolescence:

Rapid technological advancements can render existing tools or processes obsolete.

Staying updated helps organizations mitigate risks and ensure sustainability.

Providing Strategic Advantage:

Understanding technological trends enables innovation and provides a competitive edge.

This knowledge helps organizations predict market shifts and align their strategies accordingly.

Why Other Options Are Incorrect:

Option C: Maintaining the current manufacturing rate is operational and not directly tied to technological evolution.

Option D: Reducing labor costs might be a result of technological evolution but is not the primary reason for understanding it.

"Technological Evolution and Strategic Advantage" ­ Gartner

IT Obsolescence Risk Mitigation ­ MIT Technology Review



Which software carries out a set of operations on behalf of a user with a degree of independence and employs knowledge of the user's goals?

  1. Information of Everything
  2. Virtual assistant
  3. Autonomous agent
  4. Ambient digital experience

Answer(s): C

Explanation:

Understanding Autonomous Agents:

An autonomous agent is a software entity capable of performing tasks on behalf of a user independently.

It employs knowledge of the user's goals and adapts to achieve them.

Examples of Autonomous Agents:

Examples include shopping bots, automated trading systems, and decision-making software.

Why Other Options Are Incorrect:

Option A (Information of Everything): Refers to interconnected data but not software entities.

Option B (Virtual assistant): Virtual assistants interact with users but are not fully autonomous.

Option D (Ambient digital experience): Refers to seamless digital interaction, not task automation.

"Autonomous Agents in AI Systems" ­ IEEE

Adaptive Software and Autonomous Agents ­ AI Journal



What is a benefit of globalization?

  1. Costs associated with operating in new geographic areas
  2. Adherence to regulatory requirements
  3. Increased competition
  4. Access to new talent pools

Answer(s): D

Explanation:

Definition of Globalization Benefits:

Globalization allows organizations to expand their operations globally, gaining access to diverse markets and resources, including new talent pools from different regions.

Key Benefit:

Accessing new talent pools enables businesses to tap into a diverse workforce with varied skills, fostering innovation and improving operational efficiency.

Incorrect Options Analysis:

A . Costs associated with new geographic areas: This is a challenge, not a benefit.

B . Adherence to regulatory requirements: This is an obligation, not a benefit.

C . Increased competition: This is a consequence of globalization, but not a direct benefit.

and Documents of Information Technology Management:

"Global Workforce Management" (Harvard Business Review).

ITIL Global IT Strategy Framework (Axelos).



Which hacking method involves forging the from address so that replies go to an unintended audience?

  1. Packet tampering
  2. Spoofing
  3. Spyware
  4. Hoaxes

Answer(s): B

Explanation:

Definition of Spoofing:

Spoofing involves forging the "from" address in communications (e.g., emails) so that replies or interactions are misdirected.

Attackers use this method to impersonate trusted entities, steal sensitive information, or redirect responses to malicious actors.

Impact of Spoofing:

Misleads recipients into sharing sensitive information.

Often used in phishing and social engineering attacks.

Incorrect Options Analysis:

A . Packet tampering: Involves altering data packets during transmission.

C . Spyware: Refers to software that secretly monitors user activity.

D . Hoaxes: Refers to false warnings or scams, not address forgery.

and Documents of Information Technology Management:

"Email Security and Spoofing Prevention" (NIST Cybersecurity Framework).

ITIL Security Management Practices (Axelos).



An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information.
Which type of attack is described?

  1. Packet tampering
  2. Spoofing
  3. Elevation of privilege
  4. Hoaxing

Answer(s): C

Explanation:

Definition of Elevation of Privilege Attack:

This attack occurs when an attacker exploits vulnerabilities in systems to escalate their permissions beyond what they are authorized for, gaining access to sensitive data or control over the system.

Example in the Scenario:

The attacker uses a guest account, a low-privilege account, to exploit a system weakness and escalate their privileges, altering user account information.

Incorrect Options Analysis:

A . Packet tampering: Involves altering data packets, not access rights.

B . Spoofing: Involves impersonation, not privilege escalation.

D . Hoaxing: Refers to deceptive scams, unrelated to access rights.

and Documents of Information Technology Management:

"Cybersecurity Vulnerabilities and Exploits" (CIS Controls).

ITIL Risk Management Framework (Axelos).



Which pair of terms describes an add-on that purports to serve a useful function while transmitting user data and displaying pop-up boxes without the user's knowledge or permission?

  1. Downtime and uptime
  2. Hackers and viruses
  3. Ethics and cost
  4. Adware and spyware

Answer(s): D

Explanation:

Definition of Adware and Spyware:

Adware: Software that displays unwanted advertisements.

Spyware: Software that covertly collects user data without consent.

The combination of adware and spyware often masquerades as a legitimate add-on but operates maliciously.

Key Characteristics:

Adware displays pop-up advertisements, while spyware transmits user data to external parties.

Both operate without the user's permission or knowledge.

Incorrect Options Analysis:

A . Downtime and uptime: Relates to system availability, not malicious software.

B . Hackers and viruses: Refers to broader cybersecurity threats, not specific software.

C . Ethics and cost: Unrelated to malicious software behavior.

and Documents of Information Technology Management:

"Adware and Spyware: Detection and Prevention" (SANS Institute).

ITIL Information Security Practices (Axelos).



What is an example of a knowledge factor used for authentication?

  1. ID card
  2. Password
  3. Security token
  4. Fingerprint

Answer(s): B

Explanation:

Understanding Knowledge Factors:

Knowledge factors are something the user knows and are commonly used for authentication.

Examples include passwords, PINs, and security questions.

Why Other Options Are Incorrect:

Option A (ID card): This is a possession factor (something you have).

Option C (Security token): A security token is also a possession factor.

Option D (Fingerprint): This is a biometric factor (something you are).

NIST Authentication Guidelines (SP 800-63)

"Multi-Factor Authentication Best Practices" ­ Gartner



What is a method for confirming users' identities?

  1. Information secrecy
  2. Public key encryption
  3. Authentication
  4. Authorization

Answer(s): C

Explanation:

Defining Authentication:

Authentication is the process of verifying a user's identity to ensure they are who they claim to be.

This is commonly achieved through knowledge factors (passwords), possession factors (tokens), or biometric factors (fingerprints).

Why Other Options Are Incorrect:

Option A (Information secrecy): Focuses on protecting data, not identity confirmation.

Option B (Public key encryption): A method of encryption, not directly tied to user identity verification.

Option D (Authorization): Deals with granting access to resources after authentication.

"Authentication and Identity Management" ­ NIST

Authentication Processes Overview ­ ISO 27001



Viewing Page 5 of 28



Share your comments for WGU Information-Technology-Management exam with other users:

DiligentSam 9/30/2023 10:26:00 AM

need it thx
Anonymous


Vani 8/10/2023 8:11:00 PM

good questions
NEW ZEALAND


Fares 9/11/2023 5:00:00 AM

good one nice revision
Anonymous


Lingaraj 10/26/2023 1:27:00 AM

i love this thank you i need
Anonymous


Muhammad Rawish Siddiqui 12/5/2023 12:38:00 PM

question # 142: data governance is not one of the deliverables in the document and content management context diagram.
SAUDI ARABIA


al 6/7/2023 10:25:00 AM

most answers not correct here
Anonymous


Bano 1/19/2024 2:29:00 AM

what % of questions do we get in the real exam?
UNITED STATES


Oliviajames 10/25/2023 5:31:00 AM

i just want to tell you. i took my microsoft az-104 exam and passed it. your program was awesome. i especially liked your detailed questions and answers and practice tests that made me well-prepared for the exam. thanks to this website!!!
UNITED STATES


Divya 8/27/2023 12:31:00 PM

all the best
UNITED STATES


KY 1/1/2024 11:01:00 PM

very usefull document
Anonymous


Arun 9/20/2023 4:52:00 PM

nice and helpful questions
INDIA


Joseph J 7/11/2023 2:53:00 PM

i found the questions helpful
UNITED STATES


Meg 10/12/2023 8:02:00 AM

q 105 . ans is d
INDIA


Navaneeth S 7/14/2023 7:57:00 AM

i have interest to get a sybase iq dba certification
UNITED STATES


Aish 10/11/2023 5:27:00 AM

want to pass exm.
INDIA


Anonymous 6/12/2023 7:23:00 AM

are the answers correct?
INDIA


Kris 7/7/2023 9:43:00 AM

good morning, could you please upload this exam again, i need it to test my knowledge in sd-wan with version 7.0.
Anonymous


Meghraj mali 10/7/2023 1:47:00 PM

very nice question
CANADA


Noel 11/1/2022 9:14:00 PM

i have learning disability and this exam dumps allowed me to focus on the actual questions and not worry about notes and the those other study materials.
SOUTH AFRICA


Jas 10/25/2023 6:01:00 PM

165 should be apt
UNITED STATES


Neetu 6/22/2023 8:41:00 AM

please upload the dumps, real need of them
Anonymous


Mark 10/24/2023 1:34:00 AM

any recent feeedback?
UNITED STATES


Gopinadh 8/9/2023 4:05:00 AM

question number 2 is indicating you are giving proper questions. observe and change properly.
Anonymous


Santhi 1/1/2024 8:23:00 AM

passed today.40% questions were new.litwere case study,lots of new questions on afd,ratelimit,tm,lb,app gatway.got 2 set series of questions which are not present here.questions on azure cyclecloud, no.of vnet/vms required for implimentation,blueprints assignment/management group etc
INDIA


Raviraj Magadum 1/12/2024 11:39:00 AM

practice test
INDIA


sivaramakrishnan 7/27/2023 8:12:00 AM

want the dumps for emc content management server programming(cmsp)
Anonymous


Aderonke 10/23/2023 1:52:00 PM

brilliant and helpful
UNITED KINGDOM


Az 9/16/2023 2:43:00 PM

q75. azure files is pass
SWITZERLAND


ketty 11/9/2023 8:10:00 AM

very helpful
Anonymous


Sonail 5/2/2022 1:36:00 PM

thank you for these questions. it helped a lot.
UNITED STATES


Shariq 7/28/2023 8:00:00 AM

how do i get the h12-724 dumps
Anonymous


adi 10/30/2023 11:51:00 PM

nice data dumps
Anonymous


EDITH NCUBE 7/25/2023 7:28:00 AM

answers are correct
SOUTH AFRICA


Raja 6/20/2023 4:38:00 AM

good explanation
UNITED STATES