Winter Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Courses and Certificates Information-Technology-Management Book

WGU Information Technology Management QGC2 Questions and Answers

Question 25

What is the function of a firewall in a network security strategy?

Options:

A.

To prevent phishing attacks

B.

To detect malware

C.

To control unauthorized access

D.

To manage encryption keys

Question 26

A hospital has implemented several new software systems and has chosen to implement ITIL to maintain and continually improve services. Which need influenced the hospital's decision to implement ITIL?

Options:

A.

Increased dependence on human interaction

B.

Increased access to global consumer

C.

Increased dependence on technology

D.

Increased access to global vendors

Question 27

An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?

Options:

A.

Packet tampering

B.

Spoofing

C.

Elevation of privilege

D.

Hoaxing

Question 28

What is a primary purpose of the analysis phase in the systems development life cycle (SDLC)?

Options:

A.

To validate the system, functionality, and user interface

B.

To define the business, user, and system requirements

C.

To structure how components will interact

D.

To optimize the system for performance