Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > DAMA > CDMP > DMF-1220

DMF-1220 Data Management Fundamentals Question and Answers

Question # 4

Data models are critical to effective management of data. They:

A.

Provide a common vocabulary around data

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Serve as a primary communication tool during projects

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Provide the organisation with clear system of the architecture

F.

Make the integration between data management and data analytics possible

Full Access
Question # 5

Select three correct attributes a data governance programme must be:

A.

Embedded

B.

Flexible

C.

Measures

D.

Rigid

E.

Independent responsibility

F.

Sustainable

Full Access
Question # 6

Some document management systems have a module that may support different types of workflows such as:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Full Access
Question # 7

Enterprise Architecture domains include:

A.

Business Architecture

B.

Data Architecture

C.

Data Management Architecture

D.

Systems Architecture

E.

Application Architecture

F.

Technology Architecture

Full Access
Question # 8

The CAP theorem asserts that the distributed system cannot comply with all the parts of the ACID. A distributed system must instead trade-off between the following properties:

A.

Consistency

B.

Utilization

C.

Availability

D.

System development

E.

Partition tolerance

F.

All of the above

Full Access
Question # 9

The purpose for adding redundancy to a data model (denormalisation) is to:

A.

Make it easier for developers to join tables

B.

Avoid the loss of data by storing key values more than once

C.

Improve aggregate database performance across read requests

D.

Fully utilize all the indexes

E.

Ensure surrogate keys are retaining their unique values in all satellite tables

Full Access
Question # 10

Data science depends on:

A.

Information alignment and analysis

B.

Presentation of findings and data insights

C.

Rich data sources

D.

Information delivery

Full Access
Question # 11

In a global organization which must operate under many local jurisdictions, each with their own legislative and compliance laws, which type of Data Governance Operating Model Type would best apply?

A.

Centralized

B.

Globalized

C.

Replicated

D.

Federated

E.

Contemporary

Full Access
Question # 12

Three classic implementation approaches that support Online Analytical Processing include:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Full Access
Question # 13

Achieving security risk reduction in an organisation begins with developing what?

A.

A change management model, prioritising security changes and then updatingthe active directory

B.

An enterprise data model, rolling out data flow diagrams and enbedding securityinto the database

C.

A security model, classifying each organisational role and putting the physicaldata behind a firewall

D.

A classification model, classifying each data concept and locating the physicaldata

E.

A metadata model, locating the data and moving it into the metadata repository

Full Access
Question # 14

There are three basic approaches to implementing a Master Data hub environment, including:

A.

Transaction hub

B.

Distributed hub

C.

Registry

D.

Consolidated approach

E.

Eventual consistency

F.

Transparent hub

Full Access
Question # 15

Three data governance operating models types include:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Full Access
Question # 16

Vulnerability is defined as:

A.

a patch in a system that allows it to be successfully unpatched and compromised.

B.

being highly data risk rated

C.

a strength in a system that allows external stakeholders to view data records.

D.

a weakness or defect in a system that allows it to be successfully attacked and compromised.

Full Access
Question # 17

ECM is an abbreviation for:

A.

Enterprise compliance management

B.

Enterprise compliance manager

C.

Enterprise component management

D.

Enterprise content management

Full Access
Question # 18

The most informal enterprise data model is the most detailed data architecture design document.

A.

TRUE

B.

FALSE

Full Access
Question # 19

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Data Fabric is:

A.

A superior star schema strategy

B.

A form of data lake that automates data acquisition and initial data qualityprocessing

C.

A metadata repository

D.

A way of sewing together different data concepts into a single data warehouse

E.

Just another data warehouse with no distinguishing features

Full Access
Question # 21

A primary business driver of data storage and operations is:

A.

Business data modelling

B.

Business rules

C.

Business continuity

D.

Hardware sales

E.

Business process optimization

Full Access
Question # 22

In the context of big data the Three V’s refer to: Volume, Velocity and Validity

A.

FALSE

B.

TRUE

Full Access
Question # 23

Which of the following is NOT required to effectively track data quality incidents?

A.

An effective service level agreement with defined rewards and penalties

B.

An assignment process to appropriate individuals and teams

C.

A standard vocabulary for classifying data quality issues

D.

A well defined system of escalation based on the impact, duration, or urgency ofan issue

E.

An operational workflow that ensures effective resolution

Full Access
Question # 24

Identify indicative components of a Data Strategy.

A.

Vision, case studies, succession plans, functional requirements

B.

Vision, data invoice, payment receipts, confirmations

C.

Vision, business surveys, employee performance goals

D.

Vision, business case, data models, employee goals

E.

Vision, business case, principles, goals, and measures

Full Access
Question # 25

The implementation of a Data Warehouse should follow guiding principles, including:

A.

Data Efficiency

B.

One size does not fit all

C.

Contracts

D.

Focus on the business goals

E.

Start with the end in mind

F.

Collaborate

Full Access
Question # 26

As an often-overlooked aspects of basic data movement architecture, Process controls include:

A.

Consistency logging

B.

Exception logs

C.

Database activity logs

D.

Alerts

E.

Exception logs

F.

All of the above

Full Access
Question # 27

The business glossary should capture business terms attributes such as:

A.

Lineage

B.

Utilization

C.

Common misunderstanding in terms

D.

System development

E.

Algorithms to supporting definitions

F.

All of the above

Full Access
Question # 28

Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.

A.

TRUE

B.

FALSE

Full Access
Question # 29

Use business rules to support Data Integration and Interoperability at various points, to:

A.

Direct the flow of data in the organization

B.

Monitor the organization’s operational data

C.

Software alerts when events are triggered

D.

Direct when to automatically trigger events and alerts

E.

Consistency in allocation event resources

F.

None of the above

Full Access
Question # 30

Different types of product Master Data solutions include:

A.

People Lifecycle Product Management (PLPM)

B.

Product data in Manufacturing Execution Systems (MES)

C.

None of the above

D.

Product Data in Enterprise Resource Planning (ERP)

E.

Product Lifecycle Management (PLM)

Full Access
Question # 31

A goal of data governance is to enable an organisation to manage its data as a liability.

A.

TRUE

B.

FALSE

Full Access
Question # 32

One of the key differences between operational systems and data warehouses is:

A.

Operational systems focus on data quality: data warehouses focus on datasecurity

B.

Operational systems focus on historical data; data warehouses contain currentdata

C.

Operational systems are available 24x7; data warehouses are available duringbusiness hours

D.

Operational systems focus on current data; data warehouses contain historicaldata

E.

Operational systems focus on business processes: data warehouses focus onbusiness strategies

Full Access
Question # 33

Data modeller: responsible for fata model version control an change control

A.

TRUE

B.

FALSE

Full Access
Question # 34

The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:

A.

What -> The inventory Column

B.

What -> The entity column

C.

When -> The timing column

D.

Why -> The motivation column

E.

Who -> The responsibility column

F.

How -> The process column

Full Access
Question # 35

The goal of Data Governance is to enable an organization to manage data as an asset. To achieve this overall goal, a DG program must be:

A.

Modeled, sanctioned and readable

B.

Eloquent, transformative and explicit

C.

Horizontal, vertical and fluid

D.

Sustainable, embedded and measured

E.

Visionary, vertical and vivid

Full Access
Question # 36

Dimensions of data quality include:

A.

Validity

B.

Privacy

C.

Innovation

D.

Accessibility

E.

Currency

F.

All of the above

Full Access
Question # 37

Examples of technical metadata include:

A.

Access permission

B.

Recovery and backup rules

C.

Colum properties

D.

Data subject properties

Full Access
Question # 38

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Which of the following is NOT a goal of Data Quality?

A.

Identify and advocate for opportunities to improve the quality of data, throughprocess and system improvements

B.

Define standards, requirements, and specifications for data quality controls aspart of thedata lifecycle.

C.

Develop a governed approach to make data fit for purpose based on dataconsumers" requirements

D.

Define and implement processes to measure, monitor, and report on data qualitylevels

E.

Understand and comply with all relevant regulations and policies for privacy.protection, and confidentiality

Full Access
Question # 40

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Full Access
Question # 41

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

A.

TRUE

B.

FALSE

Full Access
Question # 42

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Examples of data enhancement includes:

A.

All of the above

B.

Audit data

C.

Contextual information

D.

Incorporate Enterprise Technology

E.

Reference vocabularies

F.

Select Notation

Full Access
Question # 44

Which statement best describes the relationship between documents and records?

A.

Documents and records are the same thing

B.

Documents are written and records are audio

C.

Documents and records are not related

D.

Records are a sub-set of documents

E.

Documents are a sub-set of records

Full Access
Question # 45

Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.

A.

TRUE

B.

FALSE

Full Access
Question # 46

One of the percentages to measure success of a records management system implantation is the percentage of the identified corporate records declared as such and put under records control.

A.

FALSE

B.

TRUE

Full Access
Question # 47

An authoritative system where data is created/captured, and/or maintained through

a defined set of rules and expectations is called:

A.

A System of Systems

B.

A System of Retirement

C.

A System of Record

D.

A System of Reference

E.

A System of Referential Integrity

Full Access
Question # 48

An application DBA leads the review and administration of procedural database objects.

A.

TRUE

B.

FALSE

Full Access
Question # 49

Data warehouses are often loaded and serviced by a nightly batch window.

A.

FALSE

B.

TRUE

Full Access
Question # 50

A Metadata repository contains information about the data in an organization, including:

A.

Hierarchical

B.

Data structure

C.

Warped

D.

Business rules for managing data

E.

Content

F.

None of the above

Full Access
Question # 51

Different types of metadata include:

A.

Business, Technical and Operational

B.

Business. Quality, and Introspective

C.

Business, Application and Processing

D.

Business, Information, Application and Technology

E.

Fluid, static and viscous

Full Access
Question # 52

Please select valid modelling schemes or notations

A.

NoSQL

B.

Dimensional

C.

Relational

D.

Object-orientated

E.

Fact-based

F.

Matrix-based

Full Access
Question # 53

Category information is one of the types of data that can be modelled.

A.

TRUE

B.

FALSE

Full Access
Question # 54

Types of metadata include:

A.

Strategic

B.

Business

C.

Column-orientated

D.

Operational

E.

Graph

F.

Technical

Full Access
Question # 55

Data replication is useful as it provides:

A.

The ability to spread the workload across multiple databases

B.

Opportunities to secure sensitive data

C.

An alternative to backups

D.

Enables different table structures to be built

E.

Insights into customer retention

Full Access
Question # 56

A content strategy should end with an inventory of current state and a gap assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 57

High quality data definition exhibit three characteristics:

A.

Clearness

B.

Clarity

C.

Accuracy

D.

Completeness

Full Access
Question # 58

Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:

A.

Consistency

B.

Rich data sources

C.

Information alignment and analysis

D.

Information delivery

E.

Presentation of findings and data insights

F.

All of the above

Full Access
Question # 59

Principles for data asset accounting include:

A.

Accounting Principle

B.

Due Diligence Principle

C.

Asset Principle

D.

Audit Principle

E.

Going Concern Principle

F.

All of the above

Full Access
Question # 60

Class operations can be:

A.

General: Hidden

B.

Public: Externally visible

C.

Internally visible: Visible to children objects

D.

Private: Hidden

Full Access
Question # 61

ETL is the basic process which is central to all areas in Data Integration and Interoperability. It is an abbreviation for extract, transition and load.

A.

TRUE

B.

FALSE

Full Access
Question # 62

Data Governance is at the centre if the data management activities, since governance is required for consistency within and balance between functions.

A.

FALSE

B.

TRUE

Full Access
Question # 63

When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?

A.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

B.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

C.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

D.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

E.

Alignment of Business and Technology strategies, definition of data standards, implementation of supporting metadata and process tools, management of responsibility

Full Access
Question # 64

The deliverables in the data architecture context diagram include:

A.

Data flows

B.

Enterprise data

C.

Implementation roadmap

D.

Data Value Chains

E.

None of the above

F.

All of the above

Full Access
Question # 65

If the target system has more transformation capability than either the source or the intermediary application system, the order of processes may be switched to ELT – Extract Load Tranform.

A.

TRUE

B.

FALSE

Full Access
Question # 66

Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.

A.

TRUE

B.

FALSE

Full Access
Question # 67

A deliverable in the data modelling and design context diagram is the logical data model.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Communications are essential to the success of a DMM or Data Governance assessment. Communications are important because:

A.

Communications can influence the socialization and acceptance of the results and implementation of a data management or Data Governance program

B.

Many organizations will overlook the communications aspect of a data management or Data Governance assessment

C.

Findings may affect stakeholder's positions and roles

D.

Each organization will approach data management and Data Governance communications differently

E.

Data management and Data Governance communications are different from each other

Full Access
Question # 69

The data in Data warehouses and marts differ. Data is organized by subject rather than function

A.

TRUE

B.

FALSE

Full Access
Question # 70

Business glossary is not merely a list of terms. Each term will be associated with other valuable metadata such as synonyms, metrics, lineage, or:

A.

Sanctioned rules

B.

Archive Rules

C.

Business Rules

D.

Database Type

E.

Data Length

Full Access
Question # 71

When it comes to Data Governance, what does the Operations Plan include?

A.

The list of events required to implement and operate Data Governance activities

B.

A risk assessment for the enterprise

C.

The types of enterprise operations that need Data Governance

D.

The metrics needed for each department within the organization

E.

The list of activities the Data Stewards will follow to define the data

Full Access
Question # 72

The acronym CMDB stands for:

A.

Customization management tools or databases

B.

Classic management technologies or databases

C.

Cached management technologies or databases

D.

Configuration management tools or databases

E.

Cached management tools or databases

F.

Classic monitoring technologies or databases

Full Access
Question # 73

A security mechanism that searches for customer bank account details in outgoing

emails is achieving the goal of:

A.

Ensuring stakeholder requirements for concise definitions and usage are met

B.

Ensuring stakeholder requirements for confidentiality and privacy are met

C.

Ensuring stakeholder requirements for openness and transparency are met

D.

Ensuring stakeholder requirements for response time and availability levels aremet

E.

Ensuring stakeholder requirements for service design and experience are met

Full Access
Question # 74

Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity

A.

FALSE

B.

TRUE

Full Access
Question # 75

Inputs in the data storage and operations context diagram include:

A.

Data requirements

B.

Service level agreements

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Data models

Full Access
Question # 76

A Business Glossary forces a business to adopt a single definition of a business term.

A.

FALSE

B.

TRUE

Full Access
Question # 77

Metrics tied to Reference and Master Data Quality include:

A.

Addressing all queries

B.

Data steward coverage

C.

Implementing data management training

D.

Data sharing volume and usage

E.

Data ingestion and consumption

F.

Service level agreements

Full Access
Question # 78

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

A.

FALSE

B.

TRUE

Full Access
Question # 79

Field overloading: Unnecessary data duplication is often a result of poor data management.

A.

TRUE

B.

FALSE

Full Access
Question # 80

Inputs in the data quality context diagram include:

A.

Data stores

B.

Data lakes

C.

Business requirements

D.

Data quality expectations

Full Access
Question # 81

A ‘Golden Record’ means that it is always a 100% complete and accurate representation of all entities within the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 82

Lack of automated monitoring represents serious risks, including compliance risk.

A.

TRUE

B.

FALSE

Full Access
Question # 83

The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.

A.

FALSE

B.

TRUE

Full Access
Question # 84

Data professional should not balance the short-term versus long-term business interests.

A.

TRUE

B.

FALSE

Full Access
Question # 85

Issue management is the process for identifying, quantifying, prioritizing, and resolving Data Governance issues. Which of the following are areas where that issues might arise:

A.

Contract negotiations regarding data sharing & resolution of data quality issues

B.

Documenting accounting procedures

C.

Documenting physical assets

D.

Authority and decision rights Change management escalations Meeting Compliance requirements

E.

Conformance issues related to policies, standards and principles

Full Access
Question # 86

Implementing a BI portfolio is about identifying the right tools for the right user communities within or across business units.

A.

TRUE

B.

FALSE

Full Access
Question # 87

The key architecture domains include:

A.

Business, data, infrastructure and technology architectures

B.

Process, database, software and technology architectures

C.

Zachmann, TOGAF, Cobit, and Heath architectures

D.

Business, data, application and technology architectures

E.

Business, strategy, application and technology architectures

Full Access
Question # 88

The best way to validate that a database backup is working, is to:

A.

Periodically recover from the backup file

B.

Appoint a special DBA in charge of backups

C.

Check the size of the backup file

D.

Check the backup logs every day

E.

Check for the automatic email notification of backup success

Full Access
Question # 89

E-discovery is the process of finding electronic records that might serve as evidence in a legal action.

A.

TRUE

B.

FALSE

Full Access
Question # 90

Please select the correct name for the LDM abbreviation

A.

Logical Data Model

B.

Logical Dimensional Model

C.

Lifecycle Data Model

D.

Lifecycle Dimensional Model

Full Access
Question # 91

Data governance requires control mechanisms and procedures for, but not limited to, identifying, capturing, logging and updating actions.

A.

FALSE

B.

TRUE

Full Access
Question # 92

What key components must be included in the Implementation Roadmap?

A.

Timeframes and resources for data quality requirements, policies and directives and testing standards

B.

Data metrics, physical data structures, and data model designs

C.

Timeframes and resources for Policies and Directives, a Business Glossary Architecture, Business and IT processes and role descriptions

D.

Testing requirements, risk assessment, data security and privacy policies and database design

E.

Timeframes and resources for policies and directives Architecture, Tools and Control Metrics

Full Access
Question # 93

The advantage of a decentralized data governance model over a centralized model is:

A.

The common metadata repository configurations

B.

Having a common approach to resolving data governance issues

C.

The easier implementation of industry data models

D.

An increased level of ownership from local decision making groups

E.

The cheaper execution of data governance operations

Full Access
Question # 94

Common OLAP operations include:

A.

Drill down/up

B.

Roll-up

C.

Slice

D.

Dice

E.

All of the above

F.

Cut

Full Access
Question # 95

Metadata is essential to the management of unstructured data as it id to the management of structured data.

A.

TRUE

B.

FALSE

Full Access
Question # 96

Value is the difference between the cost of a thing and the benefit derived from that thing.

A.

TRUE

B.

FALSE

Full Access
Question # 97

A goal of metadata management is to manage data related business terminology in

order toc

A.

Successfully size the database

B.

Ensure accurate data requirements are gathered for reporting

C.

Ensure people understand data content and can use data consistently

D.

Ensure people understand data definition in Bl systems

E.

Ensure the business processes align to the data model

Full Access
Question # 98

The purpose of data governance is to ensure that data is managed properly, according to policies and best practices. Data governance is focused on how decisions are made about data and how people and processes are expected to behave in relation to data.

A.

TRUE

B.

FALSE

Full Access
Question # 99

The implementation of a Data Warehouse should follow these guiding principles:

A.

Managing performance of data assets

B.

Focus on the business goals

C.

Managing the availability of data throughout the data lifecycle

D.

Start with the end in mind

E.

Managing the performance of data transactions

F.

Collaborate

Full Access
Question # 100

Reference and Master data definition: Managing shared data to meet organizational goals, reduce risks associated with data redundancy, ensure higher quality, and reduce the costs of data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 101

Data architect: A senior analyst responsible for data architecture and data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 102

On example of a transformation process in ETL is:

A.

Re-ordering

B.

Recording

C.

Duping

D.

Servicing

Full Access
Question # 103

The roles associated with enterprise data architecture are data architect, data modellers and data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 104

Data science merges data mining, statistical analysis, and machine learning with the integration and data modelling capabilities, to build predictive models that explore data content patterns.

A.

FALSE

B.

TRUE

Full Access
Question # 105

Data and text mining use a range of techniques, including:

A.

Profiling

B.

Application reduction

C.

Association

D.

Data reduction

E.

Clustering

F.

All of the above

Full Access
Question # 106

The target of organizational change is expedition.

A.

TRUE

B.

FALSE

Full Access
Question # 107

What types of data are considered Technical Data?

A.

Data standards; ETL job details; source-to-target mappings

B.

Valid value constraints; File format schemas; data models; data access rights

C.

Attributes that are only used for status reporting; data quality rules; data usage, database table names

D.

Physical database and column names; ETL job details; recovery and backup rules; data access rights

E.

Physical data models; calculations and algorithms; program and application names

Full Access
Question # 108

Data integrity is the state of being partitioned – protected from being whole.

A.

TRUE

B.

FALSE

Full Access
Question # 109

A control activity in the metadata management environment includes loading statistical analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 110

Data Governance Office (DGO) focuses on enterprise-level data definitions and data management standards across all DAMA-DMBOK knowledge areas. Consists of coordinating data management roles.

A.

TRUE

B.

FALSE

Full Access
Question # 111

Factors that have shown to play a key role in the success in the success of effective data management organizations does not include:

A.

Clear vision

B.

Orientation and training

C.

Leadership alignment

D.

IT sponsorship

Full Access
Question # 112

Please select the 3 visuals that depict DAMA’s Data Management Framework.

A.

The DAMA Octagon

B.

The Knowledge Area Context Diagram

C.

The Data Quality Function Context Diagram

D.

The DAMA Wheel

E.

The Environmental Factors hexagon

Full Access
Question # 113

A change management program supporting Data Governance should focus communication on what?

A.

Promoting the value of its data assets, monitor and act on feedback about Data Governance activities & implement data management training programs.

B.

Promote the value of its data assets

C.

Show the value of data stewardship & implement data management training program

D.

How many errors are in each of the various department's data

E.

Implement a data management training program and create a data dictionary

Full Access
Question # 114

A goal of a Reference and Master Data Management program include enabling master and reference data to be shared across enterprise functions and applications.

A.

FALSE

B.

TRUE

Full Access
Question # 115

Poorly managed metadata leads to:

A.

Row-orientated metadata

B.

Graph metadata issues

C.

Redundant data and data management processes

D.

Doubt about the reliability of metadata and data

E.

Redundant master data

F.

Document inefficiencies

Full Access
Question # 116

Data governance can be understood in terms of political governance. It includes the following three function types:

A.

Legislative-like functions

B.

Judicial-like functions

C.

Ethical-like functions

D.

Executive functions

E.

Data-like functions

F.

Morality-like functions

Full Access
Question # 117

Gathering and interpreting results from a DMM or Data Governance assessment are important because:

A.

Lack of results gathered can indicate a lack of assessment performance

B.

The assessments are done by different teams within the organization and may have different results

C.

Interpreting these results is difficult

D.

Data Management and Data Governance results are gathered and interpreted differently, depending on the organization being evaluated

E.

Performing these activities objectively can ensure the success of the assessment and affect the acceptance and implementation of the data management and/or Data Governance program

Full Access
Question # 118

Many people assume that most data quality issues are caused by data entry errors. A more sophisticated understanding recognizes that gaps in or execution of business and technical processes cause many more problems that mis-keying.

A.

TRUE

B.

FALSE

Full Access
Question # 119

If data is not integrated with care it presents risk for unethical data handling. These ethical risks intersect with fundamental problems in data management including: Limited knowledge of data’s origin and lineage; Data of poor quality; Unreliable Metadata; and Documentation of error remediation.

A.

TRUE

B.

FALSE

Full Access
Question # 120

Architecture is the fundamental organization of a system, embodied in its components, their relationships to each other and the environment and the principles governing its design and evolution.

A.

TRUE

B.

FALSE

Full Access
Question # 121

A controlled vocabulary is a defined list of explicitly allowed terms used to index, categorize, tag, sort and retrieve content through browsing and searching.

A.

TRUE

B.

FALSE

Full Access
Question # 122

Which Data Architecture artefact contains the names of key business entities, their

relationships, critical guiding business rules and critical attributes?

A.

Enterprise Data Standards

B.

Enterprise Business Glossary

C.

Enterprise Semantic Model

D.

Enterprise Data Model

E.

Enterprise Data Flows

Full Access
Question # 123

The Data Warehouse (DW) is a combination of three primary components: An integrated decision support database, related software programs and business intelligence reports.

A.

FALSE

B.

TRUE

Full Access
Question # 124

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.

A.

TRUE

B.

FALSE

Full Access
Question # 125

What are some of the business drivers for the ethical handling of data that Data Governance should satisfy?

A.

Develop Employee Awareness of the organizational risks on unethical data handling

B.

All of these

C.

Define what ethical handling of data means to the organization

D.

Achieve the preferred culture and actions in handling data

E.

Monitor, Measure and adjust the organizations approach to data ethics

Full Access
Question # 126

Data quality issues cannot emerge at any point in the data lifecycle.

A.

FALSE

B.

TRUE

Full Access
Question # 127

Data flows map and document relationships between data and locations where global differences occur.

A.

TRUE

B.

FALSE

Full Access
Question # 128

SOA stand for Service Orchestrated Architecture

A.

TRUE

B.

FALSE

Full Access
Question # 129

Those responsible for the data-sharing environment have an obligation to downstream data consumers to provide high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 130

Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.

A.

Purpose Limitation

B.

Data Minimisation

C.

Accuracy

D.

Storage Limitation

E.

Accountability

F.

All of the above

Full Access
Question # 131

All assessments should include a roadmap for phased implementation of the recommendations. This is important because:

A.

The roadmap shows how to implement the important assessment results, and when to do so

B.

A roadmap will highlight items in an implementation sequence and on other considerations (budget, resources, other programs, etc.)

C.

A roadmap is just another way of saying you should have a plan

D.

A roadmap is the only way for the organization to understand the results of the assessment

E.

A roadmap includes a project plan, which gives the stakeholders information on how each recommendation will be implemented

Full Access
Question # 132

RACI is an acronym that is made up of the following terms.

A.

Control

B.

Responsible

C.

Accountable

D.

Informed

E.

Reliable

F.

Consulted

Full Access
Question # 133

In gathering requirements for DW/BI projects, begin with the data goals and strategies first.

A.

TRUE

B.

FALSE

Full Access
Question # 134

The most common drivers for initiating a Mater Data Management Program are:

A.

Metadata insecurity

B.

Managing data quality

C.

Reducing risk

D.

Managing the costs of data integration

E.

Meeting organizational data requirements

F.

Reducing latency

Full Access
Question # 135

A metadata repository is essential to assure the integrity and consistent use of an enterprise data model across business processes.

A.

TRUE

B.

FALSE

Full Access
Question # 136

The goal of data architecture is to:

A.

Serve as a platform to enable data governance and management

B.

Bridge between business strategy and technology execution

C.

Provide the organisation with clear system of the architecture

D.

Make the integration between data management and data analytics possible

Full Access
Question # 137

It is recommended that organizations not print their business data glossaries for general use, why would you not want to print the glossary?

A.

Because there is so much data in an organization's glossary that the report would be too big to handle

B.

Because the glossary contains trade 'secrets' that the organization wants to protect

C.

Because industry rules and regulation should not be printed because they vary by State

D.

Because the data is not static but is being updated by stewards as they add new fields and definitions

E.

Because the data is confidential and should not be given out in printed form

Full Access
Question # 138

SOA stands for:

A.

Service orchestrated architecture

B.

Service orientated access

C.

Service orientated architecture

D.

Service overall architecture

Full Access
Question # 139

The language used in file-based solutions is called MapReduce. This language has three main steps:

A.

Map

B.

Shuffle

C.

Free

D.

Terminate

E.

Integrate

F.

Reduce

Full Access
Question # 140

In data integration, the goal of data discovery is toc

A.

Identify potential sources and assure data recovery processes are compliant

B.

Identify key users and perform high level assessment of data quality

C.

Assign data glossary terms and data formats

D.

Identify potential sources and perform high-level assessment of data quality

E.

Assien data plossary terms and canonical models

Full Access
Question # 141

A sandbox environment can either be a sub-set of the production system, walled off from production processing or a completely separate environment.

A.

TRUE

B.

FALSE

Full Access
Question # 142

Accomplish repository scanning in two distinct approaches, including:

A.

Semi- proprietary integration

B.

Proprietary interface

C.

Semi-proprietary interface

D.

Proprietary integration

Full Access
Question # 143

Self-service is a fundamental delivery channel in the BI portfolio.

A.

TRUE

B.

FALSE

Full Access
Question # 144

The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:

A.

Level 2 In Development

B.

Level 4 Proactive

C.

Level 2 Sub-standard

D.

Level 4 Proactive

E.

Level 3 Transformational

F.

Level 3 Essential

Full Access
Question # 145

Common understanding of the core business concepts and terminology is the objective of which deliverable?

A.

Security Framework

B.

Data Dictionary

C.

Data Warehouse Architecture

D.

Business Glossary

E.

Metadata Repositories

Full Access
Question # 146

Emergency contact phone number would be found in which master data

management program?

A.

Location

B.

Asset

C.

Service

D.

Employee

E.

Product

Full Access
Question # 147

Two risks with the Matching process are:

A.

False positives

B.

False Certainties

C.

False Negatives

D.

False Uncertainties

Full Access
Question # 148

A business driver for Master Data Management program is managing data quality.

A.

TRUE

B.

FALSE

Full Access
Question # 149

The categories of the Data Model Scorecard with the highest weightings include:

A.

How well does the model capture the requirements?

B.

None of the above

C.

How good are the definitions?

D.

How complete is the model?

E.

How structurally sound is the model?

F.

All of the above

Full Access
Question # 150

Which of the following is not a step in the 'document and content management

lifecycle'?

A.

Capture records and content

B.

Manage versions and control

C.

Audit documents and records

D.

Create a content strategy

E.

Manage retention and disposal

Full Access
Question # 151

How can the Data Governance process best support Regulatory reporting requirements?

A.

By providing a look up service for definitions

B.

By ensuring that data is properly owned, understood, defined, documented and controlled

C.

By performing a data audit

D.

By creating a map of the enterprise data stores where copies of information may be found

E.

By highlighting challenges of multiple definitions within the enterprise

Full Access
Question # 152

An organization can enhance its Data Governance program and thereby improve its approach to enterprise data management. This is important for the following reason:

A.

Since most organizations start Data Governance in silos and not at the enterprise level, it is important to be able to assess current state and determine desired targeted state that supports the overall vision

B.

Often organizations have a data repository or dictionary that is just as good as Data Governance

C.

Data Governance programs are rarely enhanced once they are launched

D.

Assessing current state for Data Governance may not tell the organization the current state of other components

E.

Starting a Data Governance program does not require that the organization start a data management program

Full Access
Question # 153

The Shewhart chart contains the following elements:

A.

Plan

B.

Utilization

C.

Do

D.

Check

E.

Act

F.

All of the above

Full Access
Question # 154

Effective data management involves a set of complex, interrelated processes that disable an organization to use its data to achieve strategic goals.

A.

FALSE

B.

TRUE

Full Access
Question # 155

Within each area of consideration mentioned in question 13, they should address morale adversity as per Ethical Risk Model for Sampling Projects.

A.

FALSE

B.

TRUE

Full Access
Question # 156

Databases are categorized in three general ways:

A.

Warped

B.

Non-relational

C.

Relational

D.

Accessible

E.

None of the above

F.

Hierarchical

Full Access
Question # 157

OCR is the abbreviation for Optical Character Recognition.

A.

TRUE

B.

FALSE

Full Access
Question # 158

A DMZ is bordered by 2 firewalls. These are between the DMZ and the:

A.

Internet, for added security

B.

Korean peninsula

C.

Internet and internal systems

D.

Internet and intranet

E.

Internet and extranet

Full Access
Question # 159

Please select the answer that best fits the following description: Contains only real-time data.

A.

Batch layer

B.

Speed layer

C.

Serving layer

D.

Real-time layer

Full Access
Question # 160

The data warehouse and marts differ from that in applications as the data is organized by subject rather than function.

A.

TRUE

B.

FALSE

Full Access
Question # 161

Customer value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as well we managing risk related to usage. Which of these is not a way to measure value?

A.

Market value

B.

Identified opportunities

C.

Risk cost

D.

User perspective

E.

Replacement cost

Full Access
Question # 162

SOA is an abbreviation for service orientated architecture.

A.

FALSE

B.

TRUE

Full Access
Question # 163

Oversight for the appropriate handling of data falls under both Data Governance and Legal Counsel. What are they NOT required to do?

A.

Data Governance and Legal Counsel are required to reduce the risk of ethical impropriety by making sure employees know of their obligations

B.

Data Governance must set standards and policies for and provide insight of data handling practices

C.

Data Governance is required to review plans and decisions proposed by Business Intelligence, Analytics, and Data Science studies

D.

Data Governance and Legal Counsel are required to keep up-to-date on legal changes

E.

Legal Counsel is required to audit their organizations on ethical compliance

Full Access
Question # 164

When doing reference data management, there many organizations that have standardized data sets that are incredibly valuable and should be subscribed to. Which of these organizations would be least useful?

A.

The company registration organization

B.

Wikipedia

C.

ISO

D.

IEEE

E.

The national post office

Full Access
Question # 165

Data Storage and Operations: The design, implementation and support of stored data to maximize its value.

A.

TRUE

B.

FALSE

Full Access
Question # 166

Business requirements is an input in the Data Warehouse and Business Intelligence context diagram.

A.

TRUE

B.

FALSE

Full Access
Question # 167

A hacker is a person who finds unknown operations and pathways within complex computer system. Hackers are only bad.

A.

TRUE

B.

FALSE

Full Access
Question # 168

The Data Warehouse has a set of storage areas, including:

A.

Staging areas

B.

Data marts

C.

Cubes

D.

Kubernetes

Full Access
Question # 169

To mitigate risks, implement a network-based audit appliance, which can address most of the weaknesses associated with the native audit tools. This kind of appliance has the following benefits:

A.

Granular transaction tracking

B.

High performance

C.

Transaction time

D.

Separation of duties

Full Access
Question # 170

Consistent input data reduces the chance of errors in associating records. Preparation processes include:

A.

Standardization

B.

EnrichmentC Validation

C.

Database management

Full Access
Question # 171

A completely distributed architecture maintains a single access point. The metadata retrieval engine responds to user requests by retrieving data from source systems in real time.

A.

FALSE

B.

TRUE

Full Access
Question # 172

How can the Data Governance process in an organisation best support the requirements of various Regulatory reporting needs?

A.

By creating a map of where the enterprise data is located in IT systems.

B.

By providing a Business Glossary based look up facility for data definitions.

C.

By ensuring that data is properly categorized, owned, understood, defined, documented and controlled

D.

By highlighting the challenges of multiple data definitions within the enterprise

E.

By performing an as-is data audit

Full Access
Question # 173

Which of the following is an activity for defining a Data Governance strategy?

A.

Develop a Business Glossary

B.

Perform Readiness Assessment

C.

Develop Goals, Principles, and Policies

D.

Charter Data Governance Council

E.

Deliver a plan for mapping metadata

Full Access
Question # 174

Examples of business metadata include:

A.

Data models

B.

Data quality rules

C.

Data usage notes

D.

Data Standards

Full Access
Question # 175

Which of the following are must-do for any successful Data Governance programme?

A.

Create a communications plan to inform to all stakeholders what you are doing.

B.

Ensure there is a Data Governance Policy with which everyone in the organization is required to comply.

C.

Create a training programme for all for data owners and data stewards.

D.

Set up a wiki for incorrect data definitions.

E.

Allocate Data Ownership responsibilities according to their role in the organization.

Full Access
Question # 176

Top down' and "bottom up' data analysis and profiling is best done in concert

because:

A.

It gets everyone involved

B.

It balances business relevance and the actual state of the data

C.

Data quality tools are more productive when they are effectively configured

D.

It gives something for the architects to do while the profilers get on with thework

E.

It allows the profiler to show the business the true state of the data

Full Access
Question # 177

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Full Access
Question # 178

Data Governance focuses exclusively on:

A.

The management of data assets and of data as an asset

B.

Alignment of IT strategies and investments with enterprise goals and strategies

C.

Decisions about IT investments

D.

Rules and regulations including GDPR

E.

The COBIT (Control Objectives for Information and Related Technology) framework

Full Access
Question # 179

Please select the two classifications of database types:

A.

Centralized

B.

Generic

C.

Distributed

D.

MapReduce

Full Access
Question # 180

Data replication has two dimensions of scaling: diagonal and lateral

A.

FALSE

B.

TRUE

Full Access
Question # 181

There are three basic approaches to implementing a Master Data hub environment, including:

A.

Compliance hub

B.

Transaction hub

C.

Consolidated hub

D.

Emotions hub

E.

Location hub

F.

Registry

Full Access
Question # 182

Basic profiling of data involves analysis of:

A.

Data sources, data visualisations, data latency and ownership

B.

Data clusters, data clouds, data repositories and metadata libraries

C.

Data lakes, data warehouses and operational data stores

D.

Data formats, data values, patterns and relationships

E.

Data criteria, data acquisition, data policy and procedures inside dataGovernance

Full Access
Question # 183

In the Abate Information Triangle the past moves through the following echelons befor it comes insight:

A.

Data

B.

Information

C.

Transactions

D.

Knowledge

E.

Big data

F.

Time

Full Access
Question # 184

Snowflaking is the term given to normalizing the flat, single-table, dimensional structure in a star schema into the respective component hierarchical or network structures.

A.

TRUE

B.

FALSE

Full Access
Question # 185

Some ways to measure value of data include:

A.

Replacement cost

B.

Market value

C.

Selling Data

D.

Risk cost

E.

Identified opportunities

F.

All of the above

Full Access
Question # 186

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Full Access
Question # 187

Governance ensures data is managed, but is not include the actual act of managing data.

A.

TRUE

B.

FALSE

Full Access
Question # 188

Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?

A.

Each division of an enterprise may have its own way to describe its business and associated metrics

B.

There is disagreement among divisions on the meaning of key metrics

C.

There is typically significant waste in an enterprise through duplication of reports and metrics

D.

Increasing regulation in industry can impose real penalties in terms of substantial fines or jail terms for non-compliance to properly managed data (e.g. accurate reporting/accounting)

E.

I've been to a conference and found that lots of our competitors are doing it

Full Access
Question # 189

Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.

A.

FALSE

B.

TRUE

Full Access
Question # 190

Issue management is the process for identifying, quantifying, prioritizing and resolving data governance related issues, including:

A.

Contracts

B.

Authority

C.

Compliance

D.

All of the above

E.

Conflicts

F.

Data Efficiency

Full Access
Question # 191

Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.

A.

Principle of integrity

B.

Principle of availability

C.

Principle of retention

D.

Principle of accountability

Full Access
Question # 192

The repeated implementation of different CRM technologies with different data

structures is mostly a failure of:

A.

Data security

B.

Data modelling

C.

Data architecture

D.

Data warehousing

E.

Data quality

Full Access
Question # 193

The load step of the ETL is physically storing or presenting the results of the transformation into the source system.

A.

TRUE

B.

FALSE

Full Access
Question # 194

Characteristics that minimise distractions and maximise useful information include, but not limited to, consistent object attributes

A.

TRUE

B.

FALSE

Full Access
Question # 195

A complexity in documenting data lineage is:

A.

Establishing data quality metrics

B.

Conflicting application requirements from data owners

C.

Choosing which content management software to use

D.

Identifying source databases

E.

Different data element names and formats

Full Access
Question # 196

A critical step in data management organization design is identifying the best-fit operating model for the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 197

What areas should you consider when constructing an organization's Data Governance operating model?

A.

Cultural factors. Governance strategy will need to advocate for an operating model that fits with organizational culture, while still progressing change

B.

What is their Business Model (decentralized vs. centralized, local vs. international, etc.)

C.

Impact of regulation. Highly regulated organizations will have a different mindset and operating model of Data Governance than those less regulated

D.

All of these

E.

Value of the data to the organization. Is their Data a crucial commodity (do they sell the data)

Full Access
Question # 198

Traditional tool sin data visualtization have both a data and a graphical component. Advanced visualization and discovery tools use in-memory architecture to allow users to interact with the data.

A.

TRUE

B.

FALSE

Full Access
Question # 199

Improving an organization’s ethical behaviour requires an informal Organizational Change Management (OCM) process.

A.

TRUE

B.

FALSE

Full Access