WGU D322 - INTRODUCTION TO IT (D322 - INTRODUCTION TO IT) ALREADY PASSED/NEWEST
UPDATE !!
Question 1
Which of the following is NOT one of the five specific domains covered by IT functions within
an organization?
A) Communication
B) Data collection and management
C) Human resources recruitment
D) Information security management
E) Process improvement
Correct Answer: C) Human resources recruitment
Rationale: According to the curriculum, IT functions specifically cover five domains:
communication, data collection and management, information security management,
consumer relationship management (CRM), and process improvement. While HR may use
IT tools for recruitment, recruitment itself is a function of the HR department, not a core
IT functional domain.
Question 2
Which term describes the system of processes that ensures the effective and efficient use of IT to
enable an organization to achieve its business goals and add value to key stakeholders?
A) IT Governance
B) IT Infrastructure
C) System Administration
D) Technical Support Management
E) Project Execution
Correct Answer: A) IT Governance
Rationale: IT governance is the formal framework that provides a structure for
organizations to ensure that IT investments support business objectives. It involves the
system of processes used to monitor and control IT decisions to ensure they add value to
stakeholders and minimize risks.
Question 3
Which IT professional is primarily responsible for setting up, maintaining, and monitoring the
hardware and software that support the networking components of computer systems?
A) Systems administrator
B) Web administrator
C) Database administrator
D) Network administrator
E) Cybersecurity analyst
Correct Answer: D) Network administrator
Rationale: The network administrator's core role is the health of the network. This includes
, 2
managing routers, switches, and the connectivity between systems, ensuring that the
hardware and software required for communication across the infrastructure are
functional and secure.
Question 4
A training manager notices that the smartboard and projector in a conference room are not
functioning. Which IT professional should be contacted to maintain and monitor these devices
that support business operations?
A) Web administrator
B) Systems administrator
C) Database administrator
D) Cybersecurity analyst
E) Technical support specialist
Correct Answer: B) Systems administrator
Rationale: Systems administrators are responsible for the setup, maintenance, and
monitoring of devices that support daily business operations. This range extends from
server room equipment to end-user hardware like smartboards and projectors.
Question 5
Which role is responsible for controlling the outward-facing content on an organization's website
and ensuring integration with back-end databases?
A) Network administrator
B) Database administrator
C) Web administrator
D) Technical support specialist
E) Systems administrator
Correct Answer: C) Web administrator
Rationale: Web administrators focus on the website and intranet. They manage content,
ensure the site is functional for users, and verify that the front-end interface correctly
integrates with back-end systems like databases.
Question 6
Which IT professional is tasked with configuring and troubleshooting an organization's data
repositories?
A) Systems administrator
B) Database administrator
C) Network administrator
D) Cybersecurity analyst
E) Web administrator
Correct Answer: B) Database administrator
Rationale: Database administrators (DBAs) specialize in the management of data
, 3
repositories. They ensure that data is stored efficiently, is accessible to authorized users,
and is configured correctly to handle the organization's data needs.
Question 7
A company experiences a spike in unusual login attempts from a foreign IP address. Which IT
professional is responsible for monitoring for these anomalies and mitigating the threat?
A) Systems administrator
B) Database administrator
C) Cybersecurity analyst
D) Technical support specialist
E) Web administrator
Correct Answer: C) Cybersecurity analyst
Rationale: Cybersecurity analysts monitor system behaviors for anomalies and malicious
attacks. They are the primary defense against internal and external threats, implementing
measures to detect and mitigate security breaches.
Question 8
Which IT professional provides end-user training and helps users resolve issues when they
cannot access specific resources or systems?
A) Network administrator
B) Systems administrator
C) Cybersecurity analyst
D) Technical support specialist
E) Database administrator
Correct Answer: D) Technical support specialist
Rationale: Technical support specialists are the direct link between IT and the end-user.
Their role is focused on troubleshooting user-level problems and providing the training
necessary for employees to use organizational systems effectively.
Question 9
An organization decides to use the resources and skills of a developed workforce from an
external company to manage their cloud storage. This is an example of:
A) Insourcing
B) Outsourcing
C) Governance
D) Requirements analysis
E) Maintenance
Correct Answer: B) Outsourcing
Rationale: Outsourcing is the practice of hiring an external organization to perform specific
IT functions or projects. This allows a company to leverage the expertise of a specialized
workforce without developing those capabilities in-house.
, 4
Question 10
Assigning an IT project to existing employees within the organization, which may require the
development of new internal operations and processes, is known as:
A) Outsourcing
B) Governance
C) Technical support
D) Insourcing
E) Implementation
Correct Answer: D) Insourcing
Rationale: Insourcing involves using the organization's internal team to complete a project.
While it keeps knowledge within the company, it can be expensive because it often requires
creating new processes or training staff to handle specialized tasks.
Question 11
What are the four general phases of the project management life cycle?
A) Planning, Design, Implementation, Testing
B) Initiation, Planning, Execution, Closure
C) Analysis, Design, Deployment, Maintenance
D) Requirement, Negotiation, Development, Testing
E) Alpha, Beta, User Acceptance, Deployment
Correct Answer: B) Initiation, Planning, Execution, Closure
Rationale: While various models exist, the standard project management life cycle consists
of broadly defining the project (Initiation), creating a roadmap (Planning), developing the
deliverables (Execution), and finalizing documentation/debriefing (Closure).
Question 12
During which phase of project management is a feasibility study typically conducted to
determine if a business case will lead to a reasonable solution?
A) Planning
B) Execution
C) Closure
D) Initiation
E) Maintenance
Correct Answer: D) Project initiation
Rationale: Project initiation is where the project is broadly defined. It starts with a business
case followed by a feasibility study to ensure the project is worth the investment before any
detailed planning begins.
Question 13
Which document results from the analysis of a business case and outlines the business needs,
stakeholders, and the project's broad definition?
UPDATE !!
Question 1
Which of the following is NOT one of the five specific domains covered by IT functions within
an organization?
A) Communication
B) Data collection and management
C) Human resources recruitment
D) Information security management
E) Process improvement
Correct Answer: C) Human resources recruitment
Rationale: According to the curriculum, IT functions specifically cover five domains:
communication, data collection and management, information security management,
consumer relationship management (CRM), and process improvement. While HR may use
IT tools for recruitment, recruitment itself is a function of the HR department, not a core
IT functional domain.
Question 2
Which term describes the system of processes that ensures the effective and efficient use of IT to
enable an organization to achieve its business goals and add value to key stakeholders?
A) IT Governance
B) IT Infrastructure
C) System Administration
D) Technical Support Management
E) Project Execution
Correct Answer: A) IT Governance
Rationale: IT governance is the formal framework that provides a structure for
organizations to ensure that IT investments support business objectives. It involves the
system of processes used to monitor and control IT decisions to ensure they add value to
stakeholders and minimize risks.
Question 3
Which IT professional is primarily responsible for setting up, maintaining, and monitoring the
hardware and software that support the networking components of computer systems?
A) Systems administrator
B) Web administrator
C) Database administrator
D) Network administrator
E) Cybersecurity analyst
Correct Answer: D) Network administrator
Rationale: The network administrator's core role is the health of the network. This includes
, 2
managing routers, switches, and the connectivity between systems, ensuring that the
hardware and software required for communication across the infrastructure are
functional and secure.
Question 4
A training manager notices that the smartboard and projector in a conference room are not
functioning. Which IT professional should be contacted to maintain and monitor these devices
that support business operations?
A) Web administrator
B) Systems administrator
C) Database administrator
D) Cybersecurity analyst
E) Technical support specialist
Correct Answer: B) Systems administrator
Rationale: Systems administrators are responsible for the setup, maintenance, and
monitoring of devices that support daily business operations. This range extends from
server room equipment to end-user hardware like smartboards and projectors.
Question 5
Which role is responsible for controlling the outward-facing content on an organization's website
and ensuring integration with back-end databases?
A) Network administrator
B) Database administrator
C) Web administrator
D) Technical support specialist
E) Systems administrator
Correct Answer: C) Web administrator
Rationale: Web administrators focus on the website and intranet. They manage content,
ensure the site is functional for users, and verify that the front-end interface correctly
integrates with back-end systems like databases.
Question 6
Which IT professional is tasked with configuring and troubleshooting an organization's data
repositories?
A) Systems administrator
B) Database administrator
C) Network administrator
D) Cybersecurity analyst
E) Web administrator
Correct Answer: B) Database administrator
Rationale: Database administrators (DBAs) specialize in the management of data
, 3
repositories. They ensure that data is stored efficiently, is accessible to authorized users,
and is configured correctly to handle the organization's data needs.
Question 7
A company experiences a spike in unusual login attempts from a foreign IP address. Which IT
professional is responsible for monitoring for these anomalies and mitigating the threat?
A) Systems administrator
B) Database administrator
C) Cybersecurity analyst
D) Technical support specialist
E) Web administrator
Correct Answer: C) Cybersecurity analyst
Rationale: Cybersecurity analysts monitor system behaviors for anomalies and malicious
attacks. They are the primary defense against internal and external threats, implementing
measures to detect and mitigate security breaches.
Question 8
Which IT professional provides end-user training and helps users resolve issues when they
cannot access specific resources or systems?
A) Network administrator
B) Systems administrator
C) Cybersecurity analyst
D) Technical support specialist
E) Database administrator
Correct Answer: D) Technical support specialist
Rationale: Technical support specialists are the direct link between IT and the end-user.
Their role is focused on troubleshooting user-level problems and providing the training
necessary for employees to use organizational systems effectively.
Question 9
An organization decides to use the resources and skills of a developed workforce from an
external company to manage their cloud storage. This is an example of:
A) Insourcing
B) Outsourcing
C) Governance
D) Requirements analysis
E) Maintenance
Correct Answer: B) Outsourcing
Rationale: Outsourcing is the practice of hiring an external organization to perform specific
IT functions or projects. This allows a company to leverage the expertise of a specialized
workforce without developing those capabilities in-house.
, 4
Question 10
Assigning an IT project to existing employees within the organization, which may require the
development of new internal operations and processes, is known as:
A) Outsourcing
B) Governance
C) Technical support
D) Insourcing
E) Implementation
Correct Answer: D) Insourcing
Rationale: Insourcing involves using the organization's internal team to complete a project.
While it keeps knowledge within the company, it can be expensive because it often requires
creating new processes or training staff to handle specialized tasks.
Question 11
What are the four general phases of the project management life cycle?
A) Planning, Design, Implementation, Testing
B) Initiation, Planning, Execution, Closure
C) Analysis, Design, Deployment, Maintenance
D) Requirement, Negotiation, Development, Testing
E) Alpha, Beta, User Acceptance, Deployment
Correct Answer: B) Initiation, Planning, Execution, Closure
Rationale: While various models exist, the standard project management life cycle consists
of broadly defining the project (Initiation), creating a roadmap (Planning), developing the
deliverables (Execution), and finalizing documentation/debriefing (Closure).
Question 12
During which phase of project management is a feasibility study typically conducted to
determine if a business case will lead to a reasonable solution?
A) Planning
B) Execution
C) Closure
D) Initiation
E) Maintenance
Correct Answer: D) Project initiation
Rationale: Project initiation is where the project is broadly defined. It starts with a business
case followed by a feasibility study to ensure the project is worth the investment before any
detailed planning begins.
Question 13
Which document results from the analysis of a business case and outlines the business needs,
stakeholders, and the project's broad definition?