Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

DAMA DMF-1220 Data Management Fundamentals Exam Practice Test

Demo: 219 questions
Total 725 questions

Data Management Fundamentals Questions and Answers

Question 1

Enterprise data architecture usually include the following work streams:

Options:

A.

Strategy

B.

Governance

C.

Organization

D.

Results

E.

Working methods

F.

All of the above

Question 2

ECM is an abbreviation for:

Options:

A.

Enterprise compliance management

B.

Enterprise compliance manager

C.

Enterprise component management

D.

Enterprise content management

Question 3

An organization will create an uncover valuable Metadata during the process of developing Data Integration and Interoperability solutions.

Options:

A.

TRUE

B.

FALSE

Question 4

An input in the data architecture context diagram includes data governance.

Options:

A.

TRUE

B.

FALSE

Question 5

What types of data are considered Technical Data?

Options:

A.

Data standards; ETL job details; source-to-target mappings

B.

Valid value constraints; File format schemas; data models; data access rights

C.

Attributes that are only used for status reporting; data quality rules; data usage, database table names

D.

Physical database and column names; ETL job details; recovery and backup rules; data access rights

E.

Physical data models; calculations and algorithms; program and application names

Question 6

In designing and building the database, the DBA should keep the following design principles in mind:

Options:

A.

Assessments

B.

Maintainability

C.

Reusability

D.

Performance and ease of use

E.

Security

F.

Integrity

Question 7

CMA is an abbreviation for Capability Maturity Assessment.

Options:

A.

TRUE

B.

FALSE

Question 8

Different storage volumes include:

Options:

A.

Gigabyte

B.

Petabyte

C.

Perabyte

D.

Exabyte

E.

Tetrabyte

F.

Terabyte

Question 9

Please select the four domains of enterprise architecture:

Options:

A.

Enterprise software architecture

B.

Enterprise technology architecture

C.

Enterprise business architecture

D.

Enterprise data architecture

E.

Enterprise hardware architecture

F.

Enterprise application architecture

Question 10

Issues caused by data entry processes include:

Options:

A.

Training issues

B.

List entry replacement

C.

Software issues

D.

Soft state issues

E.

Change to business processes

F.

Inconsistent business process execution

Question 11

Data models are critical to effective management of data. They:

Options:

A.

Provide a common vocabulary around data

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Serve as a primary communication tool during projects

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Provide the organisation with clear system of the architecture

F.

Make the integration between data management and data analytics possible

Question 12

In a global organization which must operate under many local jurisdictions, each with their own legislative and compliance laws, which type of Data Governance Operating Model Type would best apply?

Options:

A.

Centralized

B.

Globalized

C.

Replicated

D.

Federated

E.

Contemporary

Question 13

Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?

Options:

A.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

B.

Alignment of Business and IT strategies, definition of data standards, implementation of Data Governance and metadata software tools

C.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

D.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

E.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

Question 14

ETL is the basic process which is central to all areas in Data Integration and Interoperability. It is an abbreviation for extract, transition and load.

Options:

A.

TRUE

B.

FALSE

Question 15

Please select valid modelling schemes or notations

Options:

A.

NoSQL

B.

Dimensional

C.

Relational

D.

Object-orientated

E.

Fact-based

F.

Matrix-based

Question 16

The business glossary should capture business terms attributes such as:

Options:

A.

Lineage

B.

Utilization

C.

Common misunderstanding in terms

D.

System development

E.

Algorithms to supporting definitions

F.

All of the above

Question 17

You have completed analysis of a Data Governance issue in your organisation and have presented your findings to the executive management team. However, your findings are not greeted warmly and you find yourself being blamed for the continued existence of the issue. What is the most likely root cause for this?

Options:

A.

You did not secure appropriate budget or resources for the engagement and did not properly define the project charter

B.

You failed to correctly scope the analysis project and did not secure resources to deliver a fully executed solution to address root causes

C.

You failed to communicate to your team the importance of achieving a workable solution to the issues identified

D.

You failed to correctly manage expectations about the roles, responsibilities, and accountabilities for Data Governance in the organisation and are dependent on other areas to execute your recommendations

E.

You adopted an incorrect methodology to your Data Governance and have failed to execute necessary information management tasks

Question 18

High quality data definition exhibit three characteristics:

Options:

A.

Clearness

B.

Clarity

C.

Accuracy

D.

Completeness

Question 19

Metadata management solutions include architectural layers including:

Options:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Question 20

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

Options:

A.

TRUE

B.

FALSE

Question 21

Please select the answers that correctly describes the set of principles that recognizes salient features of data management and guide data management practice.

Options:

A.

Data is an asset with unique properties.

B.

It takes Metadata to manage data.

C.

The most important part of data management is security.

D.

Data management is lifecycle management.

E.

Effective data management requires leadership commitment.

F.

Efficient data management requires a team of IT professionals only.

Question 22

Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.

Options:

A.

TRUE

B.

FALSE

Question 23

Uniqueness, as a dimension of data quality, states no entity exists more than once within the data set.

Options:

A.

TRUE

B.

FALSE

Question 24

Confidentiality classification schemas might include two or more of the five confidentiality classification levels. Three correct classifications levels are:

Options:

A.

Consistency

B.

Internal use only

C.

Restricted confidential

D.

System development

E.

Confidential

F.

None of the above

Question 25

Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:

Options:

A.

Each type of stakeholder may need a different form of interaction, and each process evaluation may lend itself to a different form of information gathering

B.

Data management and Data Governance assessments will have different types of stakeholders

C.

The definition of stakeholder interaction depends on the executive sponsor

D.

Assessment teams may not know what a stakeholder is

E.

Each type of stakeholder may need a different form of data and security

Question 26

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:

Options:

A.

Specific risk management

B.

General risk management

C.

Data ethics

D.

Data security

E.

Publicity

F.

Privacy

Question 27

In the context of big data the Three V’s refer to: Volume, Velocity and Validity

Options:

A.

FALSE

B.

TRUE

Question 28

Examples of the ‘Who’ entity category include: employee; patient; player; and suspect.

Options:

A.

TRUE

B.

FALSE

Question 29

DBAs exclusively perform all the activities of data storage and operations.

Options:

A.

TRUE

B.

FALSE

Question 30

What is the main purpose of developing a Data Architecture Roadmap?

Options:

A.

To help forward-looking decision making

B.

To help the management of the organization to see the trade-offs

C.

To manage the data dependencies that require active management

D.

To formulate a plan to address architectural problems in the business

E.

To ensure that projects are aligned with business needs and opportunities

Question 31

A DMZ is bordered by 2 firewalls. These are between the DMZ and the:

Options:

A.

Internet, for added security

B.

Korean peninsula

C.

Internet and internal systems

D.

Internet and intranet

E.

Internet and extranet

Question 32

Reference and Master Data Management follow these guiding principles:

Options:

A.

Obtaining buy-in from all stakeholders

B.

Stewardship

C.

Monitoring the resistance

D.

Ownership

E.

Addressing all queries

F.

Controlled change

Question 33

A change management program supporting formal data governance should focus communication on:

Obtaining buy-in from all stakeholders

Options:

A.

Implementing data management training

B.

Monitoring the resistance

C.

Promoting the value of data assets

D.

Addressing all queries

E.

Implementing new metric and KPIs

Question 34

To build models, data modellers heavily rely on previous analysis and modelling work.

Options:

A.

FALSE

B.

TRUE

Question 35

Please select the transition phases in Bridges’ Transition process:

Options:

A.

The neutral zone

B.

The new beginning

C.

The ending

D.

The transition

E.

The translation

F.

The game

Question 36

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

Options:

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Question 37

Taxonomies can have different structures, including:

Options:

A.

Polyhierarchy

B.

Application

C.

Facet taxonomy

D.

Network taxonomy

E.

Flat taxonomy

F.

All of the above

Question 38

Two risks with the Matching process are:

Options:

A.

False positives

B.

False Certainties

C.

False Negatives

D.

False Uncertainties

Question 39

The neutral zone is one of the phases in the Bridges’ transition phases.

Options:

A.

TRUE

B.

FALSE

Question 40

Integrating data security with document and content management knowledge areas.

guides the implementation of:

Options:

A.

Appropriate access and authorization to unstructured data

B.

Fitness for purpose metrics for unstructured data

C.

Appropriate privacy controls on data marts

D.

Appropriate access and authorization to structured data

E.

Straight-through processing for NoSQL queries

Question 41

The goals of implementing best practices around document and content management include:

Options:

A.

Ensuring effective and efficient retrieval and use of data and information in unstructured formats

B.

Ensuring integration capabilities between structured and unstructured data

C.

Complying with legal obligations and customer expectations

D.

Enduring integration competencies between semi-structured systems

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Question 42

Inputs in the data storage and operations context diagram include:

Options:

A.

Data requirements

B.

Service level agreements

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Data models

Question 43

A database uses foreign keys from code tables for column values. This is a way of

implementing:

Options:

A.

Event data

B.

Temporal data

C.

Reference data

D.

Master data

E.

Star schema data

Question 44

Business rules describe why business should operate internally, in order to be successful and compliant with the outside world.

Options:

A.

FALSE

B.

TRUE

Question 45

The most common drivers for initiating a Mater Data Management Program are:

Options:

A.

Metadata insecurity

B.

Managing data quality

C.

Reducing risk

D.

Managing the costs of data integration

E.

Meeting organizational data requirements

F.

Reducing latency

Question 46

The advantage of a decentralized data governance model over a centralized model is:

Options:

A.

The common metadata repository configurations

B.

Having a common approach to resolving data governance issues

C.

The easier implementation of industry data models

D.

An increased level of ownership from local decision making groups

E.

The cheaper execution of data governance operations

Question 47

Domains can be identified in different ways including: data type; data format; list; range; and rule-based.

Options:

A.

TRUE

B.

FALSE

Question 48

Data management organizational constructs include the following type of model.

Options:

A.

Network operating model

B.

Decentralized operating model

C.

Centralized operating model

D.

Federation operating model

E.

Hybrid operating model

F.

Integrated operating model

Question 49

Data flows map and document relationships between data and:

Options:

A.

Locations where local differences occur

B.

Situations where local differences occur

C.

Network segments

D.

Applications within a business process

E.

None of the above

F.

All of the above

Question 50

The goal of Data Governance is to enable an organization to manage data as an asset. To achieve this overall goal, a DG program must be:

Options:

A.

Modeled, sanctioned and readable

B.

Eloquent, transformative and explicit

C.

Horizontal, vertical and fluid

D.

Sustainable, embedded and measured

E.

Visionary, vertical and vivid

Question 51

Service accounts are convenient because they can tailor enhanced access for the processes that use them.

Options:

A.

TRUE

B.

FALSE

Question 52

A data lineage tool enables a user to:

Options:

A.

Track the data from source system to a target database; understanding itstransformations

B.

Track the historical changes to a data value

C.

Visualize how the data gets to the data lake

D.

Enables rapid development of dashboard reporting

E.

Line up the data to support sophisticated glossary management

Question 53

One of the first steps in a master data management program is to:

Options:

A.

Decommission similar data collection systems

B.

Review data security protocols

C.

Secure funding for 20 years of operations

D.

Build multiple data marts

E.

Evaluate and assess data sources

Question 54

Control activities to manage metadata stores include:

Options:

A.

Roadmap extrapolation

B.

Load statistical analysis

C.

Lineage

D.

Missing metadata reports

E.

Definitions resolutions improvement

F.

Job scheduling and monitoring

Question 55

A minimal super key is:

Options:

A.

Also known as a candidate key, it is a superkey without duplicated attributes. I.e., any set of attributes without duplicates that uniquely identify an entity instance

B.

A synonym for a surrogate key

C.

An artificial key, made up of several meaningful components to help the reader understand the nature of the entity from the key alone

D.

Any set of attributes where each attribute that makes up the key is a foreign key in its own right

E.

A type of advanced index key structure, in the same family as Hash, Heap, B-Tree, and Inverted

Question 56

With respect to health data, what is the difference between the privacy and the security of the data?

Options:

A.

Privacy is defined as the right for an individual to keep his individual health information from being disclosed. Security is defined as the mechanism used to protect privacy of information

B.

Privacy is defined as the right for an doctor to share health data with other doctors and insurance companies. Security is defined as keeping the data where it was recorded

C.

Privacy is defined as the right of the individual to see their own medical records. Security is defined as the laws that protect a person's privacy

D.

Privacy is only possible if a person signs an affidavit requesting privacy. Security is the placing of the document in a safe place

E.

Privacy means only an individual can give access to their medical records to another person. Security means their records are secure and will not be shared

Question 57

Which of the following is NOT an objective of a business (data) glossary?

Options:

A.

Provide standard definitions for data and metadata

B.

Maximize search capability and enable access to documented institutional knowledge

C.

Improve the linkage between physical data assets and the business

D.

Reduce data misuse risk due to inconsistent management of a business concept

E.

Define business units, software, and other important glossary items

Question 58

Data Governance requires which of the following?

Options:

A.

Culture Change

B.

Data Reference Model

C.

Data Governance Tools

D.

Master Data Management

E.

Data Dictionary

Question 59

There are three basic approaches to implementing a Master Data hub environment, including:

Options:

A.

Compliance hub

B.

Transaction hub

C.

Consolidated hub

D.

Emotions hub

E.

Location hub

F.

Registry

Question 60

Lack of automated monitoring represents serious risks, including compliance risk.

Options:

A.

TRUE

B.

FALSE

Question 61

Examples of interaction models include:

Options:

A.

Hub-and-spoke

B.

Publish - subscribe

C.

Point-to-point

D.

Wheel-and-spike

Question 62

Gathering and interpreting results from a DMM or Data Governance assessment are important because:

Options:

A.

Lack of results gathered can indicate a lack of assessment performance

B.

The assessments are done by different teams within the organization and may have different results

C.

Interpreting these results is difficult

D.

Data Management and Data Governance results are gathered and interpreted differently, depending on the organization being evaluated

E.

Performing these activities objectively can ensure the success of the assessment and affect the acceptance and implementation of the data management and/or Data Governance program

Question 63

Data governance and IT governance are the same thing.

Options:

A.

TRUE

B.

FALSE

Question 64

Key processing steps for MDM include:

Options:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Question 65

Examples of technical metadata include:

Options:

A.

Column Properties

B.

Access permissions

C.

Internal

D.

Conceptual

E.

ETL job details

Question 66

To become data-centric, organizations need to think differently. They need to recognize:

Options:

A.

That managing data is the same as delivering reporting

B.

That managing data is different from managing IT

C.

That managing data is the same as making better business decisions

D.

That managing data is the same as managing finance

E.

That managing data is the same as managing IT

Question 67

Security Risks include elements that can compromise a network and/or database.

Options:

A.

TRUE

B.

FALSE

Question 68

BI tool types include:

Options:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

Question 69

Wat data architecture designs represent should be clearly documented. Examples include:

Options:

A.

Priority

B.

Retirement

C.

Preferred

D.

All of the above

E.

Current

F.

Emerging

Question 70

Common OLAP operations include:

Options:

A.

Drill down/up

B.

Roll-up

C.

Slice

D.

Dice

E.

All of the above

F.

Cut

Question 71

Data security issues, breaches and unwarranted restrictions on employee access to data cannot directly impact operational success.

Options:

A.

TRUE

B.

FALSE

Question 72

Data Integration and Interoperability is dependent on these other areas of data management:

Options:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Question 73

Data flows map and document relationships between data and locations where global differences occur.

Options:

A.

TRUE

B.

FALSE

Question 74

What are the primary drivers of data security activities?

Options:

A.

Risk reduction

B.

Risk alleviation

C.

Business growth

D.

Business compliance

Question 75

When constructing models and diagrams during formalisation of data architecture there are certain characteristics that minimise distractions and maximize useful information. Characteristics include:

Options:

A.

Linear symmetry

B.

A match between all diagram objects and the legend

C.

A clear and consistent legend

D.

A consistent line across display methods

E.

Consistent object attributes

F.

A clear and consistent line direction

Question 76

The best way to validate that a database backup is working, is to:

Options:

A.

Periodically recover from the backup file

B.

Appoint a special DBA in charge of backups

C.

Check the size of the backup file

D.

Check the backup logs every day

E.

Check for the automatic email notification of backup success

Question 77

The accepted tenets of bioethics provide a starting point for the principles of data ethics. Which of the following tenets of bioethics is NOT included in the DMBOK2 Chapter on Data Handling Ethics?

Options:

A.

Non-Maleficence Principle implies that the harm should not outweigh the benefit

B.

None of these

C.

The Justice Principle considers the fair and equitable treatment of people

D.

The Respect for Persons Principle reflects the fundamental ethical requirement that people be treated in a way that respects their dignity and autonomy as human individuals

E.

The Beneficence Principle has two elements: first, do no harm; second, maximize possible benefits and minimize possible harms

Question 78

JSON is an open, lightweight standard format for data interchange.

Options:

A.

FALSE

B.

TRUE

Question 79

Several global regulations have significant implications on data management practices. Examples include:

Options:

A.

BCBS 239

B.

Data Standards

C.

Privacy laws

D.

Effectiveness of education Standards

E.

SPCA

F.

PCI-DSS

Question 80

Business Intelligence, among other things, refer to the technology that supports this kind of analysis.

Options:

A.

FALSE

B.

TRUE

Question 81

Device security standard include:

Options:

A.

Installation of anti-malware and encryption software

B.

Relational security policies

C.

Access policies regarding connections using mobile devices

D.

Regulation compliance standards

E.

None of the above

F.

Awareness of security vulnerabilities

Question 82

The best preventative action to prevent poor quality data from entering an organisation include:

Options:

A.

Institute a formal change control

B.

Define and enforce rules

C.

Implement data governance and stewardship

D.

None of the above

E.

Train data procedures

F.

Establish data entry controls

Question 83

Data lineage is useful to the development of the data governance strategy.

Options:

A.

TRUE

B.

FALSE

Question 84

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.

Options:

A.

TRUE

B.

FALSE

Question 85

How do data management professionals maintain commitment of key stakeholders to the data management initiative?

Options:

A.

Talking to a stakeholder when passing them in the passage

B.

Weekly email reports showing metrics on data management progress/lack thereof

C.

Rely on the stakeholder group to be self-sustaining

D.

This is not necessary, stakeholders signed up at the beginning of the program

E.

Continuous communication identifying and promoting the value of data and information assets to the organization

Question 86

Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?

Options:

A.

Each division of an enterprise may have its own way to describe its business and associated metrics

B.

There is disagreement among divisions on the meaning of key metrics

C.

There is typically significant waste in an enterprise through duplication of reports and metrics

D.

Increasing regulation in industry can impose real penalties in terms of substantial fines or jail terms for non-compliance to properly managed data (e.g. accurate reporting/accounting)

E.

I've been to a conference and found that lots of our competitors are doing it

Question 87

The library of Alexandria was one of the largest collection of books in the ancient

world. Which DMBoK knowledge area is most aligned with managing the collection?

Options:

A.

Data Integration and Interoperability

B.

Reference and Master Data

C.

Data Security

D.

Document and Content Management

E.

Data Govemance

Question 88

Please select the correct General Accepted Information Principles:

Options:

A.

Asset Principle

B.

Audit Principle

C.

Due Diligence Principle

D.

Going Concern Principle

E.

Ethical Principle

F.

All of the above

Question 89

Structural Metadata describe srealtionships within and among resource and enables identification and retrieval.

Options:

A.

FALSE

B.

TRUE

Question 90

Select three correct attributes a data governance programme must be:

Options:

A.

Embedded

B.

Flexible

C.

Measures

D.

Rigid

E.

Independent responsibility

F.

Sustainable

Question 91

Real-time data integration is usually triggered by batch processing, such as historic data.

Options:

A.

TRUE

B.

FALSE

Question 92

Enterprise data architects in an application migration project are primarily concerned with:

Options:

A.

Mapping of data to business processes

B.

Changes to business processes

C.

Resolving data complexity

D.

Data mapping specifications

E.

Mapping outliers

Question 93

Because Data Governance activities require coordination across functional areas, the DG program must establish an ___________ that defines accountabilities and intersections.

Options:

A.

Alliance

B.

Operating framework

C.

Organization

D.

Enterprise-wide coalition

E.

Architecture framework

Question 94

A data model that consists of a single fact table linked to important concepts of the

business is a:

Options:

A.

elational Model

B.

Dimensional Model

C.

Transition State Model

D.

Process Model

E.

Machine Leaming Model

Question 95

Repositories facilitate the collection, publishing and distribution of data in a centralized and possibly standardized way. Data is most often used to:

Options:

A.

Make sure the DBAs are not creating new tables and columns

B.

Document and organize the provided data

C.

To support the business users not the technical users

D.

Give developers all the data they will need for programming

E.

Find new initiatives for the business to pursue

Question 96

Most people who work with data know that it is possible to use data to misrepresent facts. Which of the following is NOT a way in which data is used to misrepresent facts?

Options:

A.

Data collected with bias to prove a pre-conceived idea is correct

B.

Leaving out required context in a report resulting in ambiguity and assumptions being made about the data points

C.

Omission or inclusion of certain data points in a report or activity based on timing

D.

Providing transparency on the sources, uses, and intent of the data used in a report

E.

Leaving out the relationship between data points in a chart

Question 97

In an information management context, the short-term wins and goals often arise from the resolution of an identified problem.

Options:

A.

TRUE

B.

FALSE

Question 98

Examples of concepts that can be standardized within the data architecture knowledge area include:

Options:

A.

Enterprise data models

B.

System naming conventions

C.

None of the above

D.

Data security standards

E.

Data quality rules

F.

Tool standards

Question 99

According to the DMBoK, Data Governance is central to Data Management. In practical terms, what other functions of Data Management are required to ensure that your Data Governance programme is successful?

Options:

A.

Master Data, Data Quality, and Data Development

B.

Data Quality, Content and Document Management, and Data Development

C.

Data Modelling, Data Architecture and Master Data Management

D.

Data Quality, Data Architecture, and Metadata Management

E.

Data Architecture, Data Security, and Metadata Management

Question 100

Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.

Options:

A.

Purpose Limitation

B.

Data Minimisation

C.

Accuracy

D.

Storage Limitation

E.

Accountability

F.

All of the above

Question 101

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

Options:

A.

Streaming

B.

Messaging

C.

DAAS

D.

Trickle Feeds

Question 102

Content refers to the data and information inside a file, document or website.

Options:

A.

TRUE

B.

FALSE

Question 103

Machine learning explores the construction and study of learning algorithms.

Options:

A.

TRUE

B.

FALSE

Question 104

Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.

Options:

A.

TRUE

B.

FALSE

Question 105

A data warehouse deployment with multiple ETL, storage and querying tools often

suffers due to the lack of:

Options:

A.

Integration of the dictionaries to achieve common understanding

B.

Conflict between software vendors

C.

Disk space on the big data platform

D.

Quality data modelers

E.

Common data types in the source datasets

Question 106

The repeated implementation of different CRM technologies with different data

structures is mostly a failure of:

Options:

A.

Data security

B.

Data modelling

C.

Data architecture

D.

Data warehousing

E.

Data quality

Question 107

Latency can be:

Options:

A.

Batch

B.

Event-driven

C.

Distributed

D.

Real-time synchronous

Question 108

While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.

Options:

A.

TRUE

B.

FALSE

Question 109

A Business Glossary forces a business to adopt a single definition of a business term.

Options:

A.

FALSE

B.

TRUE

Question 110

Improving an organization’s ethical behaviour requires an informal Organizational Change Management (OCM) process.

Options:

A.

TRUE

B.

FALSE

Question 111

Developing complex event processing solutions require:

Options:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Question 112

A goal of Data warehouse and business intelligence is to support and enable ineffective business analysis and decision making by knowledge workers.

Options:

A.

TRUE

B.

FALSE

Question 113

Examples of data enhancement includes:

Options:

A.

All of the above

B.

Audit data

C.

Contextual information

D.

Incorporate Enterprise Technology

E.

Reference vocabularies

F.

Select Notation

Question 114

Analytics models are associated with different depths of analysis, including:

Options:

A.

Quality testing

B.

Explanatory modeling

C.

Descriptive modeling

D.

Performance modeling

E.

All of the above

F.

None of the above

Question 115

All organizations have the same Master Data Management Drivers and obstacles.

Options:

A.

TRUE

B.

FALSE

Question 116

Please select the option that correctly orders the models in decreasing level of detail:

Options:

A.

None of the above

B.

Conceptual model, Subject Area model, Logical model, Logical & Physical models for a project.

C.

Logical model, Conceptual model, Subject Area model, Logical & Physical models for a project.

D.

Conceptual model, Logical model, Subject Area model, Logical & Physical models for a project.

E.

Subject Area model, Conceptual model, Logical model, Logical & Physical models for a project.

Question 117

A lineage data tool provides:

Options:

A.

Scope for reporting requirements

B.

A temporal distortion of data values across systems

C.

The capture and maintenance of source structures for each attribute on the datamodel

D.

Ancestral origin of data DNA

E.

A clean line between columns in the same entity

Question 118

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

Options:

A.

FALSE

B.

TRUE

Question 119

SLA Stands for:

Options:

A.

Service Level Agreement

B.

System Lifecycle Audit

C.

System Latitude Audit

D.

Service Lifecycle Audit

Question 120

Some document management systems have a module that may support different types of workflows such as:

Options:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Question 121

Field overloading: Unnecessary data duplication is often a result of poor data management.

Options:

A.

TRUE

B.

FALSE

Question 122

Resource Description Framework (RDF), a common framework used to describe information about any Web resource, is a standard model for data interchange in the Web.

Options:

A.

FALSE

B.

TRUE

Question 123

All assessments should include a roadmap for phased implementation of the recommendations. This is important because:

Options:

A.

The roadmap shows how to implement the important assessment results, and when to do so

B.

A roadmap will highlight items in an implementation sequence and on other considerations (budget, resources, other programs, etc.)

C.

A roadmap is just another way of saying you should have a plan

D.

A roadmap is the only way for the organization to understand the results of the assessment

E.

A roadmap includes a project plan, which gives the stakeholders information on how each recommendation will be implemented

Question 124

Triplestores can be classified into these categories:

Options:

A.

Native triplestores

B.

All of the above

C.

None of the above

D.

RDMS-backed triplestores

E.

NoSQL triplestores

F.

MapReduce triplestores

Question 125

A goal of a Reference and Master Data Management program include enabling master and reference data to be shared across enterprise functions and applications.

Options:

A.

FALSE

B.

TRUE

Question 126

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

Options:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Question 127

Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.

Options:

A.

TRUE

B.

FALSE

Question 128

Data quality rules and standards are a critical form of Metadata. Ti be effective they need to be managed as Metadata. Rules include:

Options:

A.

None of the above

B.

Tied to business impact

C.

Document consistency

D.

Accessible to all data customers

E.

Hierarchical consistency

F.

Confirmed by SMEs

Question 129

Match rules for different scenarios require different workflows, including:

Options:

A.

Consistency rules

B.

Duplicate identification match rules

C.

Match-merge rules

D.

Match-split rules

E.

Match-link rules

F.

All of the above

Question 130

Effective document management requires clear policies and procedures, especially regarding retention and disposal of records.

Options:

A.

FALSE

B.

TRUE

Question 131

Normalisation is the process of applying rules in order to organise business complexity into stable data structures.

Options:

A.

TRUE

B.

FALSE

Question 132

Which of the following is not a step in the 'document and content management

lifecycle'?

Options:

A.

Capture records and content

B.

Manage versions and control

C.

Audit documents and records

D.

Create a content strategy

E.

Manage retention and disposal

Question 133

An organization can enhance its Data Governance program and thereby improve its approach to enterprise data management. This is important for the following reason:

Options:

A.

Since most organizations start Data Governance in silos and not at the enterprise level, it is important to be able to assess current state and determine desired targeted state that supports the overall vision

B.

Often organizations have a data repository or dictionary that is just as good as Data Governance

C.

Data Governance programs are rarely enhanced once they are launched

D.

Assessing current state for Data Governance may not tell the organization the current state of other components

E.

Starting a Data Governance program does not require that the organization start a data management program

Question 134

Effective data management involves a set of complex, interrelated processes that disable an organization to use its data to achieve strategic goals.

Options:

A.

FALSE

B.

TRUE

Question 135

Data replication can be active or passive.

Options:

A.

TRUE

B.

FALSE

Question 136

Data professional should not balance the short-term versus long-term business interests.

Options:

A.

TRUE

B.

FALSE

Question 137

Big data management requires:

Options:

A.

No discipline at all

B.

Less discipline than relational data management

C.

More discipline than relational data management

D.

Big ideas with big budgets

E.

A certification in data science

Question 138

What is the best reason for capturing synonyms in a data repository?

Options:

A.

Synonyms are good for indexing or for uncontrolled vocabularies

B.

You should capture all synonyms in one place so that Data Governance can decide on the best name for an element

C.

Synonyms are useful in discovering relationships between data elements

D.

Not all parts of an organization may name a field exactly the same, and the synonym will aid in data searches

E.

Without synonyms, you may not realize that two fields are the same

Question 139

Oversight for the DMMA process belongs to the Data Quality team.

Options:

A.

TRUE

B.

FALSE

Question 140

Practitioners identify development of staff capability to be a primary concern of Data Governance. Why would this be a main concern?

Options:

A.

Because we need to develop the next generation of Chief Data Officers

B.

Because it is important to have senior people, in order to dictate that the policy will be followed

C.

Because organizations expect quick results

D.

Because it is important to train staff to ensure application of appropriate methods

E.

Because it is a recognized benchmark standard

Question 141

Which artifact is the highest level of abstraction in the Enterprise Data Model?

Options:

A.

Data Ownership Model

B.

Top-level Process Model

C.

Subject Area Model

D.

Conceptual Model

E.

Systems Portfolio Model

Question 142

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

Options:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Question 143

'Planning, implementation and control activities for lifecycle management of data and

information, found in any form or medium', pertains to which knowledge area?

Options:

A.

Document and Content Management

B.

Metadata Management

C.

Data Warehousing and Business Intelligence

D.

Data Storage and Operations

E.

Data Integration and Interoperability

Question 144

Factors that have shown to play a key role in the success in the success of effective data management organizations does not include:

Options:

A.

Clear vision

B.

Orientation and training

C.

Leadership alignment

D.

IT sponsorship

Question 145

Tools required to manage and communicate changes in data governance programs include

Options:

A.

Ongoing business case for data governance

B.

Obtaining buy-in from all stakeholders

C.

Data governance roadmap

D.

Monitoring the resistance

E.

Business/Data Governance strategy map

F.

Data governance metrics

Question 146

The Data Warehouse encompasses all components in the data staging and data presentation areas, including:

Options:

A.

Data Access Tool

B.

Application Tool

C.

Operational source systems

D.

Data staging area

E.

Data presentation area

F.

All of the above

Question 147

The best way to validate that a database backup is working is to:

Options:

A.

Check for the automatic email notification of backup success

B.

Check the size of the backup file

C.

Periodically recover from the backup file

D.

Appoint a special DBA in charge of backups

E.

Check the backup logs every day

Question 148

The process of building architectural activities into projects also differ between methodologies. They include:

Options:

A.

Waterfall methods

B.

Incremental methods

C.

Kanban method

D.

Agile iterative method

E.

Duck and dive method

F.

Pump and dump method

Question 149

A key feature of Bill Inmon’s approach to data warehousing is:

Options:

A.

A tight management of data dimensions

B.

An exclusive focus on star schemas and cubes

C.

A normalized relational model to store and manage data

D.

A preference for supporting operational reporting

E.

Its ability to operate on open-source platforms

Question 150

Business continuity is an aspect of Governance. What should a business continuity plan include?

Options:

A.

Provides explanation to customers during an unplanned disruption in service

B.

Precedes business rules

C.

Explains to external stakeholders why performance expectations are not being met

D.

Outlines how a business will continue operating during an unplanned disruption in service

E.

Defines unplanned disruptions that may occur

Question 151

A primary business driver of data storage and operations is:

Options:

A.

Business data modelling

B.

Business rules

C.

Business continuity

D.

Hardware sales

E.

Business process optimization

Question 152

One of the deliverables in the Data Integration and Interoperability context diagram is:

Options:

A.

Data Integration and Interoperability Strategy

B.

Data hogging

C.

Data access agreements

D.

Data security plan

Question 153

In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.

Options:

A.

FALSE

B.

TRUE

Question 154

Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as

Options:

A.

TRUE

B.

FALSE

Question 155

Some common data quality business rule types are:

Options:

A.

Definitional conformance

B.

Format compliance

C.

Range conformance

D.

Mapping conformance

Question 156

Changes to reference data do not need to be management, only metadata should be managed.

Options:

A.

TRUE

B.

FALSE

Question 157

Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity

Options:

A.

FALSE

B.

TRUE

Question 158

Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.

Options:

A.

TRUE

B.

FALSE

Question 159

Reference and master data require governance processes, including:

Options:

A.

The data sources to be integrated

B.

Emotions matrix

C.

Compliance framework

D.

The priority and response levels of data stewardship efforts

E.

The conditions of use rules to be followed

F.

None of the above

Question 160

Creating the CDM involves the following steps:

Options:

A.

Select Scheme

B.

Obtain Sign-off

C.

Complete Initial CDM

D.

Select Notation

E.

Incorporate Enterprise Technology

F.

All of the above

Question 161

Data Governance Office (DGO) focuses on enterprise-level data definitions and data management standards across all DAMA-DMBOK knowledge areas. Consists of coordinating data management roles.

Options:

A.

TRUE

B.

FALSE

Question 162

The acronym ETL most commonly stands for:

Options:

A.

Extract Transpose Leverage

B.

Export Transform Log

C.

Extend Trim Load

D.

Extract Transform Load

E.

Efficient Trace Logging

Question 163

The European Commission Article 29 Data Protection Working Party provides a set of criteria to evaluate anonymization methods. What do they recommend?

Options:

A.

It is useful to use small groups because it is not possible to discover the identity of an individual from a small group of individuals.

B.

Datasets that includes individuals occupations as well as demographic information could never be linked to publicly available profiles.

C.

Delete particular types of data to prevent identification of an individual. This is better than masking data.

D.

Anonymity is protected when it is only possible to analyse sizable 'clusters' of individuals who cannot be distinguished from one another based on their attributes.

E.

Use Social Media data because people have already shared their information and do not care about anonymity.

Question 164

Sustainable Data Governance depends on:

Options:

A.

Rapid response to critical data issues

B.

The maturity level of the organization

C.

Business leadership, sponsorship, and ownership

D.

Well-documented policies

E.

Definition of 10-11 principles

Question 165

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

Options:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Question 166

When assessing tools to implement master data management solutions, functionality

must include:

Options:

A.

Auto-normalization features

B.

Backup and recovery utilities

C.

Document and content management

D.

Sophisticated integration capability

E.

Advanced analytics capabilities

Question 167

Business people must be fully engaged in order to realize benefits from the advanced analytics.

Options:

A.

TRUE

B.

FALSE

Question 168

Business Intelligence tool types include:

Options:

A.

Technology reporting

B.

Operational reporting

C.

Descriptive, self-service analytics

D.

Operations performance management (OPM)

E.

Business performance management (BPM)

F.

Predictive, self-service analytics

Question 169

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

Options:

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Question 170

Within projects, conceptual data modelling and logical data modelling are part of requirements planning and analysis activities, while physical data modelling is a design activity.

Options:

A.

TRUE

B.

FALSE

Question 171

Business glossary is not merely a list of terms. Each term will be associated with other valuable metadata such as synonyms, metrics, lineage, or:

Options:

A.

Sanctioned rules

B.

Archive Rules

C.

Business Rules

D.

Database Type

E.

Data Length

Question 172

A database uses foreign keys from code tables for column values. This is a way of implementing:

Options:

A.

Master data

B.

Event data

C.

Reference data

D.

Star schema data

E.

Temporal data

Question 173

Please select the answer that does not represent a machine learning algorithm:

Options:

A.

Reinforcement learning

B.

Supervised learning

C.

Artificial learning

D.

Unsupervised learning

Question 174

It is unwise to implement data quality checks to ensure that the copies of the attributes are correctly stored.

Options:

A.

FALSE

B.

TRUE

Question 175

Test environments serve many uses:

Options:

A.

Quality Assurance Testing (QA)

B.

Integration Testing

C.

User Acceptance Testing (UAT)

D.

Performance Testing

E.

All of the above

F.

None of the above

Question 176

Data Quality rules and standards are a form of data. To be effective, they need to be managed, as data and rules should be:

Options:

A.

Managed outside of the repository and only the results of data quality assessments stored as rules metadata

B.

Documented consistently, tied to business impact, backed by data analysis, and accessible to all data consumers

C.

Organized with metrics so the data stewards can review the data and see what rules apply

D.

Focused on rules that can be integrated into application services

E.

Focused on managing relationships that have gone wrong in the past and may go wrong in the future

Question 177

People often incorrectly combine the concepts of data management and information technology into one. Which of the following is NOT an example of this?

Options:

A.

A significant focus on identity in the call centre has reduced duplication by 50%

B.

The rollout of reporting corrections has been delayed by the Big Data Project

C.

The migration of customer data to a new platform failed to reduce the amount of returned mail

D.

Collaboration will be improved by the new document management system

E.

The delivery of the DG portal is critical to achieving any benefits of Data Governance

Question 178

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.

Options:

A.

TRUE

B.

FALSE

Question 179

Many people assume that most data quality issues are caused by data entry errors. A more sophisticated understanding recognizes that gaps in or execution of business and technical processes cause many more problems that mis-keying.

Options:

A.

TRUE

B.

FALSE

Question 180

What is the final step in the development of a business-data-driven roadmap?

Options:

A.

Describe the Data Value Chain that supports the Business Capabilities

B.

Finalize the Data flow between business capabilities

C.

Establish the sequence of projects that will be used to establish the data value chain

D.

Resequencing of some of the business capabilities to resolve data dependencies

E.

Resolve Data Dependency challenges

Question 181

The goals of Metadata management include:

Options:

A.

Managing performance of data assets

B.

Ensure metadata quality, consistency, currency and security

C.

Managing the availability of data throughout the data lifecycle

D.

Provide standard ways to make metadata accessible to metadata consumers

E.

Managing the performance of data transactions

F.

Establish or enforce the use of technical Metadata standards to enable data exchange

Question 182

Content management includes the systems for organizing information resources so that they can specially be stored.

Options:

A.

TRUE

B.

FALSE

Question 183

The difference between warehouses and operational systems do not include the following element:

Options:

A.

Time variant

B.

Database

C.

Subject-orientated

D.

Historical

Question 184

The goals of Data Integration and Interoperability include:

Options:

A.

Provide data securely, with regulatory compliance, in the format and timeframe needed.

B.

Lower cost and complexity of managing solutions by developing shared models and interfaces.

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Identify meaningful events and automatically trigger alerts and actions.

F.

Support business intelligence, analytics, master data management and operational efficiency efforts.

Question 185

A node is a group of computers hosting either processing or data as part of a distributed database.

Options:

A.

TRUE

B.

FALSE

Question 186

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

Options:

A.

TRUE

B.

FALSE

Question 187

What result(s) is/are Data Handling Ethics trying to avoid?

Options:

A.

Loss of reputation for the organization and loss of customers

B.

Unethical use of information by staff to achieve business outcomes; customers trust so they are willing to pay more

C.

Increased Risk for people whose data is exposed and criminal proceedings

D.

Ensure that Data Governance is in line with Corporate Governance and ethic business statements

E.

Ensure that organizations are adhering to ethical standards set by industry and bodies such as the World Economic Forum

Question 188

The list of V’s include:

Options:

A.

Volatility

B.

Volume

C.

Veracity

D.

Viscosity

E.

Variety

F.

Validity

Question 189

Data governance requires control mechanisms and procedures for, but not limited to, escalating issues to higher level of authority.

Options:

A.

FALSE

B.

TRUE

Question 190

SDLC stands for:

Options:

A.

System development leverage cycle

B.

System design lifecycle

C.

System and design long cycle

D.

System development lifecycle

Question 191

An Operational Data Mart is a data mart focused on tactical decision support.

Options:

A.

TRUE

B.

FALSE

Question 192

Examples of transformation include:

Options:

A.

Format changes, structure changes, replication conversion, re-duplication anddata ordering

B.

Application changes, infrastructure changes, software conversion, de-duplicationand re-ordering

C.

Data modelling changes, structure changes, metric conversion, de-duplicationand reordering

D.

Format changes, structure changes, semantic conversion, de-duplication and re-ordering

E.

Organisation changes, location changes, business strategy conversion, down-sizing and outsourcing

Question 193

Issues caused by data entry processes include:

Options:

A.

Data entry interface issues

B.

List entry placement

C.

Field overloading

D.

None of the above

E.

Training issues

F.

Changes to business processes

Question 194

Data Fabric is:

Options:

A.

A way of sewing together different data concepts into a single data warehouse

B.

A metadata repository

C.

A form of data lake that automates data acquisition and initial data quality processing

D.

A superior star schema strategy

E.

Just another data warehouse with no distinguishing features

Question 195

Which answer is considered to be the best definition of data security?

Options:

A.

Data security occurs when all metadata is tagged as either Confidential, Public or Sensitive

B.

Data security is only possible after Data Governance and Risk Management have looked at all the data, verified, definitions and conducted a impact analysis

C.

Data security can be described as having all of an organization's data in a repository along with a policy of limited access to only those employees managing the data

D.

Data security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization's data

E.

Data security is the ability to track who in the organization has access to metadata

Question 196

When recovering from multiple system failures, what is the biggest difficulty faced

by a DBA?

Options:

A.

Determining where the corrupt pages exist in the database file system

B.

Determining what point to recover to using backups taken at different points intime

C.

Reseting active directory to reapply the security policies

D.

Organising for the tapes to be delivered to the main data center

E.

Determining what version of the DBMS to recover - considering incrementalPatches

Question 197

A deliverable in the data modelling and design context diagram is the logical data model.

Options:

A.

TRUE

B.

FALSE

Question 198

Select the areas to consider when constructing an organization’s operating model:

Options:

A.

Cultural Factors

B.

Business model

C.

Impact of the regulation

D.

None of the above

E.

Value of the data to the organisation

F.

All of the above

Question 199

Barriers to effective management of data quality include:

Options:

A.

Inappropriate or ineffective instruments to measure value

B.

Lack of awareness on the part of leadership and staff

C.

Lack of leadership and management

D.

Lack of business governance

E.

None of the above

F.

Difficulty in justification of improvements

Question 200

If the target system has more transformation capability than either the source or the intermediary application system, the order of processes may be switched to ELT – Extract Load Tranform.

Options:

A.

TRUE

B.

FALSE

Question 201

Over a decade an organisation has rationalised implementation of party concepts

from 48 systems to 3. This is a result of good:

Options:

A.

Data quality and data governance

B.

Data architecture and data warehousing

C.

Data operations and system rationalization

D.

System rationalization and metadata management

E.

Data architecture and data governance

Question 202

Metrics tied to Reference and Master Data Quality include:

Options:

A.

Addressing all queries

B.

Data steward coverage

C.

Implementing data management training

D.

Data sharing volume and usage

E.

Data ingestion and consumption

F.

Service level agreements

Question 203

A goal of reference and master data management is for data to ensure shared data is:

Options:

A.

Continuous, consistent, current and private

B.

Complete, consistent, current and authoritative

C.

Secure, auditable, publicly available and free

D.

Complete, consistent, content and relevant

E.

Secure, auditable. complete and relevant

Question 204

What are the components of a Data Governance Readiness Assessment?

Options:

A.

Assess best practices, data metrics, and data quality

B.

Compliance to internal standards, Data Security, Data Privacy rules

C.

Data Management Maturity, Capacity to Change, Collaborative Readiness and Business Alignment

D.

Capacity to change, Establish standards. Data Quality skills, Data Stewardship productivity

E.

Capacity to change, Establish Stewardship, Business Alignment and Metadata Repository

Question 205

The acroymn ACID stands for.

Options:

A.

Atomicity, completeness, independence and durability

B.

Actual, created, identifled and deleted

C.

Avallable, completeness, isolation and dangerous

D.

Atomicity, consistency, isolation and durability

E.

Available, corrupt, isolation and durable

Question 206

Big data is often defined by three characteristics. They are:

Options:

A.

Size, Speed and Sensitivity

B.

Volume, Variety and Velocity

C.

Direction, Depth and Details

D.

Expansive, Engaged and Enormous

E.

Complexity, Compliance and Completeness

Question 207

SSD is the abbreviation for Solid State Dimension.

Options:

A.

TRUE

B.

FALSE

Question 208

Which of the following activities is most likely to maintain bias in data analysis?

Options:

A.

Re-baselining the data set after each period of analysis to remove assumptions

B.

Working with external stakeholders to assess data quality

C.

Using more data sets with same data

D.

Remove sources of likely bias from data sets before analysis

E.

Using more data sets with diverse data sources

Question 209

Data quality issues cannot emerge at any point in the data lifecycle.

Options:

A.

FALSE

B.

TRUE

Question 210

Product Master data can only focus on an organization’s internal product and services.

Options:

A.

TRUE

B.

FALSE

Question 211

Data Management maturity has many goals for accomplishment including having a positive effect on culture. This is important to a Data Governance program for the following reason:

Options:

A.

It is important to be able to assess the level of current state for each component against the Data Governance best practices to determine how readily the culture has accepted Data Governance

B.

Data Governance does not affect the culture of the organization directly

C.

It is important to have many goals so that you can show progress on some of the goals even if you can't meet all of them

D.

Data management maturity only has one goal

E.

Best practices for data management are not the same as best practices for Data Governance

Question 212

Data profiling also includes cross-column analysis, which can identify overlapping or duplicate columns and expose embedded value dependencies.

Options:

A.

TRUE

B.

FALSE

Question 213

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

Options:

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Question 214

Location Master Data includes business party addresses and business party location, as well as facility addresses for locations owned by organizations.

Options:

A.

TRUE

B.

FALSE

Question 215

Critical Data is most often used in

Options:

A.

Regulatory, financial, or management reporting

B.

Business operational needs

C.

Measuring product quality and customer satisfaction

D.

Business strategy, especially efforts at competitive differentiation.

E.

All of these

Question 216

A System of Reference is an authoritative system where data consumers can obtain reliable data to support transactions and analysis, even if the information did not originate in the system reference.

Options:

A.

TRUE

B.

FALSE

Question 217

A goal of reference and master data is to provide authoritative source of reconciled and quality-assessed master and reference data.

Options:

A.

TRUE

B.

FALSE

Question 218

Three classic implementation approaches that support Online Analytical Processing include:

Options:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Question 219

Which of these is NOT a component of an enterprise wide data strategy?

Options:

A.

A business Case for better data management

B.

A description of data management roles & organizations

C.

An outline of 'as is' and 'to be' technical architectures

D.

A data management roadmap, highlighting major activities

E.

A vision statement for data management

Demo: 219 questions
Total 725 questions