Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.

Which phase of CRM does this describe?

A.

Predicting

B.

Defining

C.

Reporting

D.

Analyzing

Full Access
Question # 5

Which business impact is attributed to the creation of a knowledge-dependent global society from growth in information industries?

A.

Autonomous agent

B.

Ambient digital experience

C.

Information of Everything

D.

Virtual assistant

Full Access
Question # 6

What is the expert system type of artificial intelligence?

A.

A system that imitates the reasoning processes used by skilled humans

B.

A system that attempts to emulate the way a typical human brain works

C.

The longest identified stretch of dependent activities measured from start to finish

D.

Knowledge-based information system that accomplishes specific tasks on behalf of its users

Full Access
Question # 7

Employees in different business levels need knowledge to effectively drive their work and decision-making.

Which term describes the trait of an IT leader to effectively translate perspectives at both a broad and corporate strategic level?

A.

Systems thinking

B.

Coordinate

C.

Courage

D.

Breadth

Full Access
Question # 8

Which two reasons show why organizations need to effectively grasp the deep currents of technological evolution? Choose 2 answers.

A.

To use this knowledge to protect themselves against sudden and fatal technological obsolescence

B.

To provide an organization with a valuable strategic advantage

C.

To keep its manufacturing production running at the current rate

D.

To discover ways to reduce its number of employees and, at the same time, reduce labor costs

Full Access
Question # 9

Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.

A.

Business continuity plans

B.

Augmentation plans

C.

Authentication plans

D.

Disaster recovery plans

E.

Backup and recovery plans

Full Access
Question # 10

Which term is used to describe the business needs, justification, requirements, and boundaries of a project?

A.

Project scope

B.

Project management

C.

Project milestone

D.

Project plan

Full Access
Question # 11

An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?

A.

Packet tampering

B.

Spoofing

C.

Elevation of privilege

D.

Hoaxing

Full Access
Question # 12

Which basic business system serves operational level analysts in an organization?

A.

Optimization analysis system (OAS)

B.

Decision support system (DSS)

C.

Transaction processing system (TPS)

D.

Executive information system (EIS)

Full Access
Question # 13

A company no longer wants to sell one product to as many customers as possible. Now they want to sell one customer as many products as possible. Which type of software gathers and analyzes customer information to tailor this marketing campaign?

A.

Distribution management (DM)

B.

Customer relationship management (CRM)

C.

Supply chain management (SCM)

D.

Operations management (OM)

Full Access
Question # 14

A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?

A.

Virtual reality

B.

Neural network

C.

Intelligent agent

D.

Fuzzy logic

Full Access
Question # 15

What are two purposes of the IT Strategy Board in any organization? Choose 2 answers.

A.

Report IT issues to the CIO as they arise and implement the ClO's solutions

B.

Recognize the possibility of budget overages before they occur

C.

Discover and review development in information technology

D.

Recommend opportunities and actions to benefit the organization

E.

Oversee hiring to enhance the implementation of future improvements

Full Access
Question # 16

Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.

A.

Automates the different activities of the supply chain

B.

Serves as a unique product identifier

C.

Tracks a product's journey from manufacturing facility to store

D.

Discards inconsistent, incorrect, or incomplete information

Full Access
Question # 17

A director of software development observes friction between various team members. How should the director alleviate team friction?

A.

Ask each team member to provide weekly feedback via email

B.

Create a culture of showing appreciation

C.

Nurture competition among team members

D.

Provide a public forum for anonymous feedback

Full Access
Question # 18

Which benefit does a prototype provide to a client?

A.

Detailed instructions for development

B.

Demonstration of interaction with the interface

C.

Blueprint of the entire project

D.

Static example of the finished product

Full Access
Question # 19

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

A.

Monitors enclosures

B.

Protects against encrypted attacks

C.

Provides authentication and authorization

D.

Features full-time monitoring

Full Access