Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

DMF-1220 Sample Questions Answers

Questions 4

Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?

Options:

A.

Each division of an enterprise may have its own way to describe its business and associated metrics

B.

There is disagreement among divisions on the meaning of key metrics

C.

There is typically significant waste in an enterprise through duplication of reports and metrics

D.

Increasing regulation in industry can impose real penalties in terms of substantial fines or jail terms for non-compliance to properly managed data (e.g. accurate reporting/accounting)

E.

I've been to a conference and found that lots of our competitors are doing it

Buy Now
Questions 5

There are three basic approaches to implementing a Master Data hub environment, including:

Options:

A.

Compliance hub

B.

Transaction hub

C.

Consolidated hub

D.

Emotions hub

E.

Location hub

F.

Registry

Buy Now
Questions 6

What is the final step in the development of a business-data-driven roadmap?

Options:

A.

Describe the Data Value Chain that supports the Business Capabilities

B.

Finalize the Data flow between business capabilities

C.

Establish the sequence of projects that will be used to establish the data value chain

D.

Resequencing of some of the business capabilities to resolve data dependencies

E.

Resolve Data Dependency challenges

Buy Now
Questions 7

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

Options:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Buy Now
Questions 8

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

Options:

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Buy Now
Questions 9

A "Data Governance strategy" usually includes the following deliverables:

Options:

A.

A Statement of Intent, a Decision Framework, an Implementation Roadmap, and a Governance Toolkit

B.

A Charter, a Data Architecture, a Program Data Model, and a Plan for Operational Success

C.

A Program Plan, a Resource Plan, an Implementation Plan, and a Test Plan

D.

A Charter, an Operating Framework, an Implementation Roadmap, and a Plan for Operational Success

E.

A Charter, a Security Strategy, a Solution Roadmap, and a User Experience Plan

Buy Now
Questions 10

To understand and evaluate ethical use of data within the organization what principles should we base our decisions on?

Options:

A.

Principles focused on ideas such as fairness, respect, responsibility, integrity, quality, reliability, transparency and trust

B.

Data Security and Privacy Principles

C.

Data Management principles that have been agreed by the organization

D.

There are several ethical theories that need to be understood and will provide the principles we have to apply: 1. Virtue-based ethics. 2. Deontological ethics. 3. Consequentialist ethics

E.

Generally Accepted Information Principles defined by GAAP

Buy Now
Questions 11

A Business Glossary forces a business to adopt a single definition of a business term.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 12

One common KPI of e-discovery is cost reduction.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 13

Hierarchical database model is the newest database model

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

The term data quality refers to both the characteristics associated with high quality data and to the processes used to measure or improve the quality of data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

When doing reference data management, there many organizations that have standardized data sets that are incredibly valuable and should be subscribed to. Which of these organizations would be least useful?

Options:

A.

The company registration organization

B.

Wikipedia

C.

ISO

D.

IEEE

E.

The national post office

Buy Now
Questions 16

A database uses foreign keys from code tables for column values. This is a way of

implementing:

Options:

A.

Event data

B.

Temporal data

C.

Reference data

D.

Master data

E.

Star schema data

Buy Now
Questions 17

The goals of Data Integration and Interoperability include:

Options:

A.

Provide data securely, with regulatory compliance, in the format and timeframe needed.

B.

Lower cost and complexity of managing solutions by developing shared models and interfaces.

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Identify meaningful events and automatically trigger alerts and actions.

F.

Support business intelligence, analytics, master data management and operational efficiency efforts.

Buy Now
Questions 18

A node is a group of computers hosting either processing or data as part of a distributed database.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

A data model that consists of a single fact table linked to important concepts of the

business is a:

Options:

A.

elational Model

B.

Dimensional Model

C.

Transition State Model

D.

Process Model

E.

Machine Leaming Model

Buy Now
Questions 20

Issues caused by data entry processes include:

Options:

A.

Training issues

B.

List entry replacement

C.

Software issues

D.

Soft state issues

E.

Change to business processes

F.

Inconsistent business process execution

Buy Now
Questions 21

Industry is struggling to distinguish the accountabilities of CDO and CIO. The definition of their responsibilities may specify parts of:

Options:

A.

Financial management functions

B.

Metadata functions

C.

Data security functions

D.

Data architecture functions

E.

Business intelligence functions

Buy Now
Questions 22

What area do you not consider when developing a 'Data Governance operating model?

Options:

A.

Impact of regulation

B.

Cultural factors - such as acceptance of discipline and adaptability to change

C.

The availability of industry data models

D.

The business model - decentralised versus centralised

E.

The value of data to the organization

Buy Now
Questions 23

CMDB provide the capability to manage and maintain Metdata specifically related to the IT assets, the relationships among them, and contractual details of the assets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

A limitation of the centralized metadata repository approach is it may be less expensive.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

Data Governance includes developing alignment of the data management approach with organizational touchpoints outside of the direct authority of the Chief Data Officer. Select the example of such a touchpoint.

Options:

A.

Content Management

B.

Requirements

C.

Business Glossary

D.

Records Management

E.

Regulatory Compliance

Buy Now
Questions 26

Examples of technical metadata include:

Options:

A.

Access permission

B.

Recovery and backup rules

C.

Colum properties

D.

Data subject properties

Buy Now
Questions 27

The Belmont principles that may be adapted for Information Management disciplines, include:

Options:

A.

Respect for Persons

B.

Respect for Machines

C.

Beneficence

D.

Criminality

E.

Justice

Buy Now
Questions 28

A data architecture team is best described as:

Options:

A.

A group of strong database administrators

B.

A strategic planning and compliance team

C.

An operational data provisioning group

D.

The authors of reference data

E.

A well-managed project of architectural development

Buy Now
Questions 29

The European Commission Article 29 Data Protection Working Party provides a set of criteria to evaluate anonymization methods. What do they recommend?

Options:

A.

It is useful to use small groups because it is not possible to discover the identity of an individual from a small group of individuals.

B.

Datasets that includes individuals occupations as well as demographic information could never be linked to publicly available profiles.

C.

Delete particular types of data to prevent identification of an individual. This is better than masking data.

D.

Anonymity is protected when it is only possible to analyse sizable 'clusters' of individuals who cannot be distinguished from one another based on their attributes.

E.

Use Social Media data because people have already shared their information and do not care about anonymity.

Buy Now
Questions 30

With reliable Metadata an organization does not know what data it has, what the data represents and how it moves through the systems, who has access to it, or what it means for the data to be of high quality.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

Record management starts with a vague definition of what constitutes a record.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

Data flows map and document relationships between data and:

Options:

A.

Locations where local differences occur

B.

Situations where local differences occur

C.

Network segments

D.

Applications within a business process

E.

None of the above

F.

All of the above

Buy Now
Questions 33

SPARC published their three-schema approach to database management. The three key components were:

Options:

A.

Internal

B.

Logical

C.

Generic

D.

Conceptual

E.

External

Buy Now
Questions 34

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:

Options:

A.

Specific risk management

B.

General risk management

C.

Data ethics

D.

Data security

E.

Publicity

F.

Privacy

Buy Now
Questions 35

RACI is an acronym that is made up of the following terms.

Options:

A.

Control

B.

Responsible

C.

Accountable

D.

Informed

E.

Reliable

F.

Consulted

Buy Now
Questions 36

Data for Big Data ingestion can also be called the data lake. This needs to be carefully managed, or the data lake will become:

Options:

A.

A data model

B.

An organizational statistic

C.

A biased report

D.

A level of data not usable by Data Scientists

E.

A data swamp

Buy Now
Questions 37

Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

The Shewhart chart contains the following elements:

Options:

A.

Plan

B.

Utilization

C.

Do

D.

Check

E.

Act

F.

All of the above

Buy Now
Questions 39

The purpose for adding redundancy to a data model (denormalisation) is to:

Options:

A.

Make it easier for developers to join tables

B.

Avoid the loss of data by storing key values more than once

C.

Improve aggregate database performance across read requests

D.

Fully utilize all the indexes

E.

Ensure surrogate keys are retaining their unique values in all satellite tables

Buy Now
Questions 40

Device security standard include:

Options:

A.

Installation of anti-malware and encryption software

B.

Relational security policies

C.

Access policies regarding connections using mobile devices

D.

Regulation compliance standards

E.

None of the above

F.

Awareness of security vulnerabilities

Buy Now
Questions 41

Content needs to be modular, structured, reusable and device and platform independent.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

The best way to validate that a database backup is working, is to:

Options:

A.

Periodically recover from the backup file

B.

Appoint a special DBA in charge of backups

C.

Check the size of the backup file

D.

Check the backup logs every day

E.

Check for the automatic email notification of backup success

Buy Now
Questions 43

Big data primarily refers specifically to the volume of the data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

Open by default' document control will assist data sharing by:

Options:

A.

Allocating more metadata to each document

B.

Automatically opening the document when it is selected on the desktop

C.

Keeping the documents open on the desktop ready for use

D.

Setting the security to shared unless overwritten

E.

Automatically moving the data to the warehouse where everybody can access it

Buy Now
Questions 45

SOA stand for Service Orchestrated Architecture

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

Enterprise data architecture project-related activities include:

Options:

A.

Define maturity assessment

B.

Define scope

C.

Design

D.

Implement

E.

None of the above

F.

All of the above

Buy Now
Questions 47

The library of Alexandria was one of the largest collection of books in the ancient

world. Which DMBoK knowledge area is most aligned with managing the collection?

Options:

A.

Data Integration and Interoperability

B.

Reference and Master Data

C.

Data Security

D.

Document and Content Management

E.

Data Govemance

Buy Now
Questions 48

What is one of the most important things about collecting data?

Options:

A.

To share the data across the organization

B.

To keep data away from the public

C.

To resolve many-to-many relationships

D.

To collect as much data as possible into the data repository

E.

To keep data for each department separate because no one needs all the data

Buy Now
Questions 49

A minimal super key is:

Options:

A.

Also known as a candidate key, it is a superkey without duplicated attributes. I.e., any set of attributes without duplicates that uniquely identify an entity instance

B.

A synonym for a surrogate key

C.

An artificial key, made up of several meaningful components to help the reader understand the nature of the entity from the key alone

D.

Any set of attributes where each attribute that makes up the key is a foreign key in its own right

E.

A type of advanced index key structure, in the same family as Hash, Heap, B-Tree, and Inverted

Buy Now
Questions 50

Service accounts are convenient because they can tailor enhanced access for the processes that use them.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

Top down' and "bottom up' data analysis and profiling is best done in concert

because:

Options:

A.

It gets everyone involved

B.

It balances business relevance and the actual state of the data

C.

Data quality tools are more productive when they are effectively configured

D.

It gives something for the architects to do while the profilers get on with thework

E.

It allows the profiler to show the business the true state of the data

Buy Now
Questions 52

BI tool types include:

Options:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

Buy Now
Questions 53

Data Governance is at the centre if the data management activities, since governance is required for consistency within and balance between functions.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 54

XML is the abbreviation for standard mark-up language.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 55

Governance ensures data is managed, but is not include the actual act of managing data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 56

A weakness or defect in a system that allows it to be successfully attacked and

compromised is a:

Options:

A.

Risk

B.

Threat

C.

Feature

D.

Vulnerability

E.

Chasm

Buy Now
Questions 57

Inputs in the Data Integration and Interoperability context diagram include:

Options:

A.

Data needs & standards

B.

Data semantics

C.

Business goals & strategies

D.

Source data

Buy Now
Questions 58

Data Integration and Interoperability is dependent on these other areas of data management:

Options:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Buy Now
Questions 59

Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

Confidentiality classification schemas might include two or more of the five confidentiality classification levels. Three correct classifications levels are:

Options:

A.

Consistency

B.

Internal use only

C.

Restricted confidential

D.

System development

E.

Confidential

F.

None of the above

Buy Now
Questions 61

One of the key differences between operational systems and data warehouses is:

Options:

A.

Operational systems focus on data quality: data warehouses focus on datasecurity

B.

Operational systems focus on historical data; data warehouses contain currentdata

C.

Operational systems are available 24x7; data warehouses are available duringbusiness hours

D.

Operational systems focus on current data; data warehouses contain historicaldata

E.

Operational systems focus on business processes: data warehouses focus onbusiness strategies

Buy Now
Questions 62

A design approach for managing the risk of errors in data marts is:

Options:

A.

Purge the data in the data marts and reload from the data warehouse

B.

Purge the data in the source system and reload the data warehouse

C.

Purge the data in the data warehouse and copy back to the data mart

D.

Purge the data in the data warehouse and reload from the source systems

E.

Purge the data generally and reload from the best system

Buy Now
Questions 63

Repositories facilitate the collection, publishing and distribution of data in a centralized and possibly standardized way. Data is most often used to:

Options:

A.

Make sure the DBAs are not creating new tables and columns

B.

Document and organize the provided data

C.

To support the business users not the technical users

D.

Give developers all the data they will need for programming

E.

Find new initiatives for the business to pursue

Buy Now
Questions 64

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

Options:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Buy Now
Questions 65

A successful Data Governance program requires that all enterprise data be certified.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 66

The dependencies of enterprise technology architecture are that it acts on specified data according to business requirements.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

How do data management professionals maintain commitment of key stakeholders to the data management initiative?

Options:

A.

Talking to a stakeholder when passing them in the passage

B.

Weekly email reports showing metrics on data management progress/lack thereof

C.

Rely on the stakeholder group to be self-sustaining

D.

This is not necessary, stakeholders signed up at the beginning of the program

E.

Continuous communication identifying and promoting the value of data and information assets to the organization

Buy Now
Questions 68

The DMBOK support’s DAMA’s mission by:

Options:

A.

Establish a common vocabulary

B.

Guides IT personnel to improve data management

C.

Serving as the fundamental reference guide

D.

roviding a functional framework

Buy Now
Questions 69

Data Governance requires which of the following?

Options:

A.

Culture Change

B.

Data Reference Model

C.

Data Governance Tools

D.

Master Data Management

E.

Data Dictionary

Buy Now
Questions 70

Integration of ETL data flows will usually be developed within tools specialised to manage those flows in a proprietary way.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 71

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 72

Possible application coupling designs include:

Options:

A.

Relaxed coupling

B.

Loose coupling

C.

Value coupling

D.

Tight coupling

Buy Now
Questions 73

Small reference data value sets in the logical data model can be implemented in a physical model in three common ways:

Options:

A.

Create a matching separate code table

B.

Create a master shared code table

C.

None of the above

D.

Program integration by joining tables

E.

Embed rules or valid codes into the appropriate object’s definition.

F.

Roadmap Development

Buy Now
Questions 74

The difference between warehouses and operational systems do not include the following element:

Options:

A.

Time variant

B.

Database

C.

Subject-orientated

D.

Historical

Buy Now
Questions 75

Please select the correct General Accepted Information Principles:

Options:

A.

Asset Principle

B.

Audit Principle

C.

Due Diligence Principle

D.

Going Concern Principle

E.

Ethical Principle

F.

All of the above

Buy Now
Questions 76

Data warehouses are often loaded and serviced by a nightly batch window.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 77

Change Data Capture is a method of reducing bandwidth by filtering to include only data that has been changed within a defined timeframe.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 78

Assessment criteria are broken into levels, and most capability maturity models use five (5) levels. This is important since:

Options:

A.

It is not important how many levels there are; vendors do this to show they have a complex model

B.

Each capability level will have specific criteria associated with its completion. To move to the next higher level, all the capabilities of the current level must be satisfied

C.

Each capability is separate, so each level represents a separate stage in development

D.

Assessments are difficult and breaking them into levels makes them more difficult to perform

E.

The organization must be able to manage each criterion, and breaking them into levels is the only way to do that

Buy Now
Questions 79

Inputs in the data quality context diagram include:

Options:

A.

Data stores

B.

Data lakes

C.

Business requirements

D.

Data quality expectations

Buy Now
Questions 80

Which of the following are must-do for any successful Data Governance programme?

Options:

A.

Create a communications plan to inform to all stakeholders what you are doing.

B.

Ensure there is a Data Governance Policy with which everyone in the organization is required to comply.

C.

Create a training programme for all for data owners and data stewards.

D.

Set up a wiki for incorrect data definitions.

E.

Allocate Data Ownership responsibilities according to their role in the organization.

Buy Now
Questions 81

Type of Reference Data Changes include:

Options:

A.

Row level changes to internal Reference Data sets

B.

Row level changes to external Reference Data sets

C.

Creation of new Reference Data sets

D.

Business model changes on column level

E.

Structural changes to external Reference Data sets

F.

None of the above

Buy Now
Questions 82

Implementing a BI portfolio is about identifying the right tools for the right user communities within or across business units.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 83

Effectiveness metrics for a data governance programme includes: achievement of goals and objectives; extend stewards are using the relevant tools; effectiveness of communication; and effectiveness of education.

Options:

A.

FALSE

B.

RRUE

Buy Now
Questions 84

Validity, as a dimension of data quality, refers to whether data values are consistent with a defined domain of values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 85

When constructing models and diagrams during formalisation of data architecture there are certain characteristics that minimise distractions and maximize useful information. Characteristics include:

Options:

A.

Linear symmetry

B.

A match between all diagram objects and the legend

C.

A clear and consistent legend

D.

A consistent line across display methods

E.

Consistent object attributes

F.

A clear and consistent line direction

Buy Now
Questions 86

A goal of reference and master data management is for data to ensure shared data is:

Options:

A.

Continuous, consistent, current and private

B.

Complete, consistent, current and authoritative

C.

Secure, auditable, publicly available and free

D.

Complete, consistent, content and relevant

E.

Secure, auditable. complete and relevant

Buy Now
Questions 87

How can the Data Governance process best support Regulatory reporting requirements?

Options:

A.

By providing a look up service for definitions

B.

By ensuring that data is properly owned, understood, defined, documented and controlled

C.

By performing a data audit

D.

By creating a map of the enterprise data stores where copies of information may be found

E.

By highlighting challenges of multiple definitions within the enterprise

Buy Now
Questions 88

Data management organizational constructs include the following type of model.

Options:

A.

Network operating model

B.

Decentralized operating model

C.

Centralized operating model

D.

Federation operating model

E.

Hybrid operating model

F.

Integrated operating model

Buy Now
Questions 89

Defining quality content requires understanding the context of its production and use, including:

Options:

A.

Producers

B.

Timing

C.

None of the above

D.

Delivery

E.

Consumers

F.

Format

Buy Now
Questions 90

The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 91

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 92

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 93

Select three correct attributes a data governance programme must be:

Options:

A.

Embedded

B.

Flexible

C.

Measures

D.

Rigid

E.

Independent responsibility

F.

Sustainable

Buy Now
Questions 94

Reference data management entails the preventative maintenance of undefined domain values, definitions and the relationship within and across domain values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 95

In Data Modelling, the generalization of the concept of person and organization into a party enables:

Options:

A.

The implementation of relationships between persons and organizations

B.

Single person organizations to be managed consistently

C.

Faster implementation into packages that use the same vocabulary

D.

Them to act in roles in agreements, shared address usages, and common interaction processes

E.

Greater security as users are unaware if this party is a person or an organization

Buy Now
Questions 96

Primary deliverables of the Data Warehouse and Business Intelligence context diagram include:

Options:

A.

Data Products

B.

Data Stewardship

C.

Governance Activities

D.

Release Plan

E.

Load Tuning Activities

F.

BI Activity Monitoring

Buy Now
Questions 97

The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:

Options:

A.

What -> The inventory Column

B.

What -> The entity column

C.

When -> The timing column

D.

Why -> The motivation column

E.

Who -> The responsibility column

F.

How -> The process column

Buy Now
Questions 98

Data and text mining use a range of techniques, including:

Options:

A.

Profiling

B.

Application reduction

C.

Association

D.

Data reduction

E.

Clustering

F.

All of the above

Buy Now
Questions 99

Operationality and interoperability depends on the data quality. In order to measure the efficiency of a repository the data quality needs to be:

Options:

A.

Stored in a Cloud for easy access

B.

Quantified by some type of metrics

C.

Be certified by a Data Governance team

D.

Have complete definitions

E.

Verified by the organization's legal department

Buy Now
Questions 100

Which of the following is NOT a stage of the Data Quality Management Cycle?

Options:

A.

Check

B.

Do

C.

Plan

D.

Act

E.

Intervene

Buy Now
Questions 101

Some ways to measure value of data include:

Options:

A.

Replacement cost

B.

Market value

C.

Selling Data

D.

Risk cost

E.

Identified opportunities

F.

All of the above

Buy Now
Questions 102

Achieving security risk reduction in an organisation begins with developing what?

Options:

A.

A change management model, prioritising security changes and then updatingthe active directory

B.

An enterprise data model, rolling out data flow diagrams and enbedding securityinto the database

C.

A security model, classifying each organisational role and putting the physicaldata behind a firewall

D.

A classification model, classifying each data concept and locating the physicaldata

E.

A metadata model, locating the data and moving it into the metadata repository

Buy Now
Questions 103

A DMZ is bordered by 2 firewalls. These are between the DMZ and the:

Options:

A.

Korean peninsula

B.

Internet, for added security

C.

Internet and extranet

D.

Internet and internal systems

E.

Internet and intranet

Buy Now
Questions 104

Preparation and pre-processing of historical data needed in a predictive model may be performed in nightly batch processes or in near real-time.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 105

Data security issues, breaches and unwarranted restrictions on employee access to data cannot directly impact operational success.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 106

The neutral zone is one of the phases in the Bridges’ transition phases.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 107

Please select the four domains of enterprise architecture:

Options:

A.

Enterprise software architecture

B.

Enterprise technology architecture

C.

Enterprise business architecture

D.

Enterprise data architecture

E.

Enterprise hardware architecture

F.

Enterprise application architecture

Buy Now
Questions 108

An advantage of a centralized repository include: Quick metadata retrieval, since the repository and the query reside together.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 109

When starting a Data Governance initiative it is important to understand what the Business cannot achieve due to data issues because:

Options:

A.

It is important to understand the data quality issues that will need to be addressed

B.

Unless you correctly identify the most important business stakeholders it is harder to sustain political buy-in to Data Governance

C.

It is essential to identify key stakeholders so you can sell your vision of Data Governance to them

D.

Change management creates a sense of dissatisfaction.

E.

Aligning Data Governance with actual business needs makes it easier to communicate the vision and value of Data Governance

Buy Now
Questions 110

The goals of data storage and operations include:

Options:

A.

Managing performance of data assets

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 111

Examples of concepts that can be standardized within the data quality knowledge area include:

Options:

A.

Standard measurement methodologies

B.

Data security standards

C.

Data remediation standards and procedures

D.

None of the above

E.

Data quality rules

F.

Data quality rules

Buy Now
Questions 112

Sample value metrics for a data governance program include:

Options:

A.

Reduction of risk

B.

Improved efficiency in operations

C.

Effectiveness of education

D.

Achievements of goals and objectives

E.

Contributions to business objectives

F.

Effectiveness of communication

Buy Now
Questions 113

What result(s) is/are Data Handling Ethics trying to avoid?

Options:

A.

Loss of reputation for the organization and loss of customers

B.

Unethical use of information by staff to achieve business outcomes; customers trust so they are willing to pay more

C.

Increased Risk for people whose data is exposed and criminal proceedings

D.

Ensure that Data Governance is in line with Corporate Governance and ethic business statements

E.

Ensure that organizations are adhering to ethical standards set by industry and bodies such as the World Economic Forum

Buy Now
Questions 114

Please select the two concepts that drive security restrictions:

Options:

A.

Regulation

B.

Regression

C.

Confidence level

D.

Confidentiality level

Buy Now
Questions 115

Temporal aspects usually include:

Options:

A.

Valid time

B.

Transmitting time

C.

Transaction time

D.

Value time

Buy Now
Questions 116

A complexity in documenting data lineage is:

Options:

A.

Establishing data quality metrics

B.

Conflicting application requirements from data owners

C.

Choosing which content management software to use

D.

Identifying source databases

E.

Different data element names and formats

Buy Now
Questions 117

A ‘Golden Record’ means that it is always a 100% complete and accurate representation of all entities within the organization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 118

Measuring the effects of change management on in five key areas including: Awareness of the need to change; Desire to participate and support the change; Knowledge about how to change; Ability to implement new skills and behaviors; and Reinforcement to keep the change in place.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 119

Common understanding of the core business concepts and terminology is the objective of which deliverable?

Options:

A.

Security Framework

B.

Data Dictionary

C.

Data Warehouse Architecture

D.

Business Glossary

E.

Metadata Repositories

Buy Now
Questions 120

Through similarity analysis, slight variation in data can be recognized and data values can be consolidated. Two basic approaches, which can be used together, are:

Options:

A.

Realistic

B.

Opportunistic

C.

Deterministic

D.

Probabilistic

E.

Procedural

F.

All of the above

Buy Now
Questions 121

Which of the following would NOT be an interest of Data Governance?

Options:

A.

Inconsistent definitions

B.

Competing versions of source data

C.

Metadata

D.

Database development

E.

Redundant data

Buy Now
Questions 122

Data quality management is a key capability of a data management practice and organization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 123

The scope and focus of any data governance program depend on organizational needs, but most programs include:

Options:

A.

Strategy

B.

Policy

C.

Data Management Projects

D.

Compliance

E.

Oversight

F.

All of the above

Buy Now
Questions 124

Machine learning explores the construction and study of learning algorithms.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 125

Which Data Architecture artefact contains the names of key business entities, their

relationships, critical guiding business rules and critical attributes?

Options:

A.

Enterprise Data Standards

B.

Enterprise Business Glossary

C.

Enterprise Semantic Model

D.

Enterprise Data Model

E.

Enterprise Data Flows

Buy Now
Questions 126

Value is the difference between the cost of a thing and the benefit derived from that thing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 127

Reference and Master data definition: Managing shared data to meet organizational goals, reduce risks associated with data redundancy, ensure higher quality, and reduce the costs of data integration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 128

Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 129

Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 130

Key processing steps for MDM include:

Options:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Buy Now
Questions 131

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

Options:

A.

All of the above

B.

Streaming

C.

Messaging

D.

Technology

E.

Data

F.

Trickle Feeds

Buy Now
Questions 132

Reference and master data require governance processes, including:

Options:

A.

The data sources to be integrated

B.

Emotions matrix

C.

Compliance framework

D.

The priority and response levels of data stewardship efforts

E.

The conditions of use rules to be followed

F.

None of the above

Buy Now
Questions 133

Location Master Data includes business party addresses and business party location, as well as facility addresses for locations owned by organizations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 134

A weak point in an organization’s defenses is a:

Options:

A.

Anti-virus software

B.

Security model problem

C.

Penetration

D.

Vulnerability

E.

Firewall

Buy Now
Questions 135

Differentiating between data and information. Please select the correct answers based on the sentence below: Here is a marketing report for the last month [1]. It is based on data from our data warehouse[2]. Next month these results [3] will be used to generate our month-over-month performance measure [4].

Options:

A.

[1] Information, [2] Information, [3] Data, [4] Information

B.

[1] Data, [2] Information, [3] Data, [4] Data

C.

[1] Data, [2] Data, [3] Data, [4] Information

D.

[1] Information, [2] Data, [3] Data, [4] Information

Buy Now
Questions 136

DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 137

Improving an organization’s ethical behaviour requires an informal Organizational Change Management (OCM) process.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 138

A content strategy should end with an inventory of current state and a gap assessment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 139

An implemented warehouse and its customer-facing BI tools is a technology product.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 140

Over a decade an organisation has rationalised implementation of party concepts

from 48 systems to 3. This is a result of good:

Options:

A.

Data quality and data governance

B.

Data architecture and data warehousing

C.

Data operations and system rationalization

D.

System rationalization and metadata management

E.

Data architecture and data governance

Buy Now
Questions 141

To build models, data modellers heavily rely on previous analysis and modelling work.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 142

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 143

An advantage of a centralized repository include: High availability since it is independent of the source systems.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 144

Data mining is a sub-field of supervised learning where users attempt to model data elements and predict future outcomes through the evaluation of probability estimates.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 145

Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?

Options:

A.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

B.

Alignment of Business and IT strategies, definition of data standards, implementation of Data Governance and metadata software tools

C.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

D.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

E.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

Buy Now
Questions 146

In the context of big data the Three V’s refer to: Volume, Velocity and Validity

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 147

Which of the following is a Data Quality principle?

Options:

A.

Prevention

B.

Governance

C.

Criticality

D.

Standards Driven

E.

All of these

Buy Now
Questions 148

The categories of the Data Model Scorecard with the highest weightings include:

Options:

A.

How well does the model capture the requirements?

B.

None of the above

C.

How good are the definitions?

D.

How complete is the model?

E.

How structurally sound is the model?

F.

All of the above

Buy Now
Questions 149

A security mechanism that searches for customer bank account details in outgoing

emails is achieving the goal of:

Options:

A.

Ensuring stakeholder requirements for concise definitions and usage are met

B.

Ensuring stakeholder requirements for confidentiality and privacy are met

C.

Ensuring stakeholder requirements for openness and transparency are met

D.

Ensuring stakeholder requirements for response time and availability levels aremet

E.

Ensuring stakeholder requirements for service design and experience are met

Buy Now
Questions 150

What techniques should be used and taught to produce the required ethical data handling deliverables?

Options:

A.

Change, Communication and training techniques need to be established

B.

A privacy impact assessment (PIA) is critical to ensuring that we are adhering to ethical data management

C.

Do an ethical impact assessment framework for all projects and activities involved in data management

D.

Due to fact that ethics are constantly changing we need to constantly affirm the organizations ethic statements on an annual basis

E.

Data Governance should define the set of ethical practices that are good for the organization

Buy Now
Questions 151

Modeling Bid data is a non-technical challenge but critical if an organization that want to describe and govern its data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 152

Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:

Options:

A.

Consistency

B.

Rich data sources

C.

Information alignment and analysis

D.

Information delivery

E.

Presentation of findings and data insights

F.

All of the above

Buy Now
Questions 153

Referential Integrity (RI) is often used to update tables without human intervention. Would this be a good idea for reference tables?

Options:

A.

Yes, since Standards Bodies typically supply reference data, the enterprise can automatically update when a new code or value is received

B.

No, updates should always be made directly via data entry or through a specific batch interface based on operator-entered information partly because of regulatory reporting and archiving

C.

Yes, you do not have to worry about archived data with reference data so tables can be updated automatically

D.

No, but an enterprise can use program logic to do updates as there is little potential for problems to occur with reference data

E.

Yes, older transactions do not have to be removed because with the Cloud there is unlimited database storage

Buy Now
Questions 154

What is the most critical task for a new Data Governance team?

Options:

A.

To begin developing the Business Data Glossary

B.

To identify metrics for data quality issues in the organisation

C.

To define the requirements for technologies to support DG activities

D.

To collate an Information Risk Register

E.

To establish its purpose, process, and measures of team progress

Buy Now
Questions 155

Barriers to effective management of data quality include:

Options:

A.

Inappropriate or ineffective instruments to measure value

B.

Lack of awareness on the part of leadership and staff

C.

Lack of leadership and management

D.

Lack of business governance

E.

None of the above

F.

Difficulty in justification of improvements

Buy Now
Questions 156

Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 157

A communication plan includes an engagement model for stakeholders, the type of information to be shared, and the schedule for sharing information.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 158

The advantage of a decentralized data governance model over a centralized model is:

Options:

A.

The common metadata repository configurations

B.

Having a common approach to resolving data governance issues

C.

The easier implementation of industry data models

D.

An increased level of ownership from local decision making groups

E.

The cheaper execution of data governance operations

Buy Now
Questions 159

Metadata is described using a different set of categories, not including:

Options:

A.

Descriptive metadata

B.

Database metadata

C.

Structural metadata

D.

Administrative metadata

Buy Now
Questions 160

Data can be assessed based on whether it is required by:

Options:

A.

Regulatory reporting

B.

Capturing policy

C.

Ongoing operations

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Business policy

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 161

The business glossary application is structured to meet the functional requirements of the three core audiences:

Options:

A.

Data users

B.

Application users

C.

Innovation users

D.

Business users

E.

Data stewards

F.

Technical users

Buy Now
Questions 162

Data governance requires control mechanisms and procedures for, but not limited to, facilitating subjective discussions where managers’ viewpoints are heard.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 163

SDLC stands for:

Options:

A.

System development leverage cycle

B.

System design lifecycle

C.

System and design long cycle

D.

System development lifecycle

Buy Now
Questions 164

The deliverables of the data modelling process include:

Options:

A.

Lineage

B.

Definitions

C.

Issues and outstanding questions

D.

Assessments

E.

Diagram

F.

Roadmap

Buy Now
Questions 165

Instant Messaging (IM) allows a user to message each other in real-time.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 166

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

Options:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Buy Now
Questions 167

A catastrophic system failure due to processing attachments that are too large may

be solved by:

Options:

A.

Changing the network bandwidth to handle infinitely sized attachments

B.

Associating attachment size with the attachment and changing the process to check the size is less than the upper limit

C.

Compressing the attachment before sending it in an email

D.

Increasing the available memory on the database

E.

Associating attachment date with the attachment and changing the process tocheck the date is less than 1 month old

Buy Now
Questions 168

DAMA International’s Certified Data Management Professional (CDMP) certification required that data management professionals subscribe to a formal code of ethics, including an obligation to handle data ethically for the sake of society beyond the organization that employs them.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 169

On example of a transformation process in ETL is:

Options:

A.

Re-ordering

B.

Recording

C.

Duping

D.

Servicing

Buy Now
Questions 170

A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 171

In defining a Data Security Policy, what role should Data Governance play?

Options:

A.

Write the Data Security Policy

B.

Send all Data Security questions to the legal department

C.

Have no role in the Data Security Policy

D.

Review and approve the Data Security Policy

E.

Own and maintain the Data Security Policy

Buy Now
Questions 172

A deliverable in the data architecture context diagram includes an implementation roadmap.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 173

What does Data Handling Ethics concern itself with?

Options:

A.

Data Ethics is concerned with the right way of dealing with data throughout its lifecycle, ensuring that it’s in line with the organization’s policies and standards

B.

Data Handling Ethics is concerned with how to procure, store, manage, use, and dispose of data that are aligned with ethical principles

C.

Data Ethics is concerned about respect of persons, beneficence, and justice

D.

Data Handling Ethics is concerned with protecting individuals and society from inappropriate processing of data

E.

Data Ethics is concerned with applying ethical principles to data management. Data Management needs to be aligned to the ethical statements of the organization

Buy Now
Questions 174

Examples of business processes when constructing data flow diagrams include:

Options:

A.

Order Management

B.

Marketing & Sales

C.

Sales order

D.

Invoicing

E.

Product Development

F.

Customer

Buy Now
Questions 175

A goal of a Reference and Master Data Management program include enabling master and reference data to be shared across enterprise functions and applications.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 176

SLA Stands for:

Options:

A.

Service Level Agreement

B.

System Lifecycle Audit

C.

System Latitude Audit

D.

Service Lifecycle Audit

Buy Now
Questions 177

Technical Metadata provides data about the technical data, the systems that store data, and the processes that move between systems.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 178

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 179

What are the three characteristics of effective Data Governance communication?

Options:

A.

It must be clear, unambiguous, and consistent

B.

It must be clear, structured, repetitive

C.

It must be viral, vital, and have volume

D.

It must be colorful, engaging, using multi-media

E.

It must be consistent, unambiguous, engaging

Buy Now
Questions 180

GDPR and PIPEDA are examples of:

Options:

A.

Global data modelling standards

B.

Content management systems

C.

Data program rules

D.

Primary information parsing algorithms

E.

Data protection regulations

Buy Now
Questions 181

A ‘Content Distribution Network’ supporting a multi-national website is likely to use:

Options:

A.

An extract, transform, and load solution

B.

An archiving solution

C.

A replication solution

D.

A database backup and restore solution

E.

A records disposal solution

Buy Now
Questions 182

The Data Governance Council (DGC) manages data governance initiatives, issues, and escalations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 183

Please select the correct name for the PDM abbreviation when referring to modelling.

Options:

A.

Physical Dimension Model

B.

Photo Data Model

C.

None of the above

D.

Probabilistic Dimension Model

E.

Photo Dimensional Model

F.

Physical Data Model

Buy Now
Questions 184

Data modelling tools are software that automate many of the tasks the data modeller performs.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 185

Which of the following is a Data Quality principle?

Options:

A.

Prevention

B.

Governance

C.

Criticality

D.

Standards Driven

E.

All of these

Buy Now
Questions 186

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

Options:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Buy Now
Questions 187

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

Options:

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Buy Now
Questions 188

The placement of Data Governance is most effective when:

Options:

A.

It is defined by Compliance because most of what is governed is driven by regulatory and compliance issues

B.

The Database Administrators incorporate Data Governance in their database design

C.

It has a Data Governance manager and some data stewards

D.

Defined at the department level at which is most important

E.

When it is at the enterprise level so it can support all other data management initiatives that cross functional boundaries

Buy Now
Questions 189

Examples of transformation in the ETL process onclude:

Options:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Buy Now
Questions 190

Data Governance deliverables commonly include:

Options:

A.

Data value chains

B.

IT methodology and practices

C.

Business culture assessment

D.

Roadmaps and implementation strategy

E.

Regulatory requirements

Buy Now
Questions 191

How does the DMBOK refer to an organization that values data as an asset and manages data through all phases of its lifecycle?

Options:

A.

A Data integration organization

B.

A Data support organization

C.

A Data-driven organization

D.

A Data-centric organization

E.

A Data management organization

Buy Now
Questions 192

Companies do not rely on their information systems to run their operations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 193

Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 194

What position is responsible for the quality and use of their organization’s data assets?

Options:

A.

Chief Information Officer

B.

Data Scientist

C.

Data Steward

D.

Data Modeler

E.

Data Architect

Buy Now
Questions 195

Issue management is the process for identifying, quantifying, prioritizing, and resolving Data Governance issues. Which of the following are areas where that issues might arise:

Options:

A.

Contract negotiations regarding data sharing & resolution of data quality issues

B.

Documenting accounting procedures

C.

Documenting physical assets

D.

Authority and decision rights Change management escalations Meeting Compliance requirements

E.

Conformance issues related to policies, standards and principles

Buy Now
Questions 196

The most informal enterprise data model is the most detailed data architecture design document.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 197

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 198

No recorded negative ethical outcomes does not mean that the organization is processing data ethically. Legislation cannot keep up with the evolution of the data environment so how do we stay compliant?

Options:

A.

Constant attention to ethical legislation and legal proceedings and international ethical bodies will enable the organization to recognize potential compliancy issues that can be addressed

B.

An active data quality and privacy assessment program can be used to detect ethical risks. Once identified, we can reduce the associated risks according to the organizations ethical values

C.

A healthy internal governance, risk and compliance function, including internal data audits will identify potential ethical issues

D.

An organization must develop and sustain a culture of ethical data handling to detect potential ethical risks. On identifying ethical risks, the onus is on the organization to modifying the processing to achieve acceptable data handling

E.

The best way to keep up with the evolution is to survey communities, customers and employees and what they consider to be appropriate use of the information

Buy Now
Questions 199

All metadata management solutions include architectural layers including:

Options:

A.

Metadata Quality Assurance Testing

B.

Metadata integration

C.

Metadata usage

D.

Metadata delivery

E.

Metadata control and management

F.

None of the above

Buy Now
Questions 200

The database administrator (DBA) is the most established and the most widely adopted data professional role.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 201

What are the business objectives for building a business glossary?

Options:

A.

To have a place to store physical schemas for the DBAs

B.

Make sure that the data stewards have valid work to perform, & justify that the budget for Data Governance

C.

Take all the core data elements from the data models and store them in the glossary

D.

Establish a common understanding of core business concepts and terminology & enable access to documented institutional knowledge

E.

Create a place to manage metadata and lineage

Buy Now
Questions 202

The TOGAF framework does NOT include a(n):

Options:

A.

Business focus

B.

Enterprise continuum approach

C.

Metamodel

D.

Methods

E.

Maturity model

Buy Now
Questions 203

Three data governance operating models types include:

Options:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Buy Now
Questions 204

An implemented warehouse and its customer facing BI tool is a data product.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 205

Different levels of policy are required to govern behavior to enterprise security. For example:

Options:

A.

Data security policy

B.

Business Security Policy

C.

IT security policy

D.

Enterprise security policy

E.

All of the above

F.

None of the above

Buy Now
Questions 206

The goals of implementing best practices around document and content management include:

Options:

A.

Ensuring effective and efficient retrieval and use of data and information in unstructured formats

B.

Ensuring integration capabilities between structured and unstructured data

C.

Complying with legal obligations and customer expectations

D.

Enduring integration competencies between semi-structured systems

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 207

An enterprise's organisation chart has multiple levels, each with a single reporting

line. This is an example of a:

Options:

A.

Ecological taxonomy

B.

Hierarchical taxonomy

C.

Flat taxonomy

D.

Compound taxonomy

E.

Hybrid taxonomy

Buy Now
Questions 208

Metadata management solutions include architectural layers including:

Options:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Buy Now
Questions 209

Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.

Options:

A.

Principle of integrity

B.

Principle of availability

C.

Principle of retention

D.

Principle of accountability

Buy Now
Questions 210

The goal of data architecture is to:

Options:

A.

Serve as a platform to enable data governance and management

B.

Bridge between business strategy and technology execution

C.

Provide the organisation with clear system of the architecture

D.

Make the integration between data management and data analytics possible

Buy Now
Questions 211

Data profiling examples include:

Options:

A.

Counts of null

B.

Max/Min value

C.

Max/Min length

D.

Frequency distribution

E.

Data type and format

F.

None of the above

Buy Now
Questions 212

Operational Metadata describes details of the processing and accessing of data. Which one is not an example:

Options:

A.

Error logs

B.

Schedule anomalies

C.

Purge criteria

D.

Failure logs

Buy Now
Questions 213

The goals of data security include:

Options:

A.

Managing performance of data assets

B.

Enable appropriate access to enterprise data assets

C.

Managing the availability of data throughout the data lifecycle

D.

Understand and comply with all relevant regulations and policies for privacy and confidentiality

E.

Managing the performance of data transactions

F.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Buy Now
Questions 214

The accuracy dimension of data quality refers to the degree that data correctly respresents ‘real-life’ entities.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 215

A change management program supporting formal data governance should focus communication on:

Obtaining buy-in from all stakeholders

Options:

A.

Implementing data management training

B.

Monitoring the resistance

C.

Promoting the value of data assets

D.

Addressing all queries

E.

Implementing new metric and KPIs

Buy Now
Questions 216

A synonym for transformation in ETL is mapping. Mapping is the process of developing the lookup matrix from source to target structures, but not the result of the process.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 217

The Data Model Scorecard provides 10 data model quality metrics

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 218

OCR is the abbreviation for Optical Character Recognition.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 219

What are the three characteristics of effective Data Governance communication?

Options:

A.

It must be clear, unambiguous, and consistent

B.

It must be consistent, unambiguous, engaging

C.

It must be viral, vital, and have volume

D.

It must be colorful, engaging, using multi-media

E.

It must be clear, structured, repetitive

Buy Now
Exam Code: DMF-1220
Exam Name: Data Management Fundamentals
Last Update: Aug 1, 2025
Questions: 725
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now DMF-1220