Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > DAMA > CDMP > DMF-1220

DMF-1220 Data Management Fundamentals Question and Answers

Question # 4

Deliverables in the data quality context diagram include:

A.

DQM Procedures

B.

Data architecture

C.

Data governance

D.

DQ Policies and guidelines

E.

Analyses from data profiling

F.

Data quality Service Level Agreements

Full Access
Question # 5

The target of organizational change is expedition.

A.

TRUE

B.

FALSE

Full Access
Question # 6

The process of identifying how different records may relate to a single entity is called:

A.

Meshing

B.

Munging

C.

Mirroring

D.

Matching

E.

Mangling

Full Access
Question # 7

Data architect: A senior analyst responsible for data architecture and data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 8

A control activity in the metadata management environment includes loading statistical analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 9

In a data warehouse, where the classification lists for organisation type are

inconsistent in different source systems, there is an indication that there is a lack of

focus on:

A.

Metadata Management

B.

Data Storage

C.

Data Modelling

D.

Master Data

E.

Reference data

Full Access
Question # 10

Corporate Information Factory (CIF) components include:

A.

Data marts

B.

Objectives

C.

Operational Reports

D.

Reduction of risk

E.

Staging Area

F.

Contributions to business objectives

Full Access
Question # 11

If the target system has more transformation capability than either the source or the intermediary application system, the order of processes may be switched to ELT – Extract Load Tranform.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Please select the correct name for the PDM abbreviation when referring to modelling.

A.

Physical Dimension Model

B.

Photo Data Model

C.

None of the above

D.

Probabilistic Dimension Model

E.

Photo Dimensional Model

F.

Physical Data Model

Full Access
Question # 13

Content refers to the data and information inside a file, document or website.

A.

TRUE

B.

FALSE

Full Access
Question # 14

Which of these is NOT likely in the scope of Data Governance and Stewardship?

A.

Data asset valuation in order to allocate priority to data quality management

B.

Ensure the privacy needs of stakeholders are enforced and audited

C.

To train staff on data governance principles, embedding them in everyday decision making

D.

To adjust the definitions of items in the chart of accounts to improve financial management

E.

Monitor compliance to record management policies

Full Access
Question # 15

If two data stores are able to be inconsistent during normal operations, then the

integration approach is:

A.

Asynchronous

B.

Uncontrolled

C.

Synchronous

D.

Streaming

E.

Faulty

Full Access
Question # 16

Vulnerability is defined as:

A.

a patch in a system that allows it to be successfully unpatched and compromised.

B.

being highly data risk rated

C.

a strength in a system that allows external stakeholders to view data records.

D.

a weakness or defect in a system that allows it to be successfully attacked and compromised.

Full Access
Question # 17

The categories of the Data Model Scorecard with the highest weightings include:

A.

How well does the model capture the requirements?

B.

None of the above

C.

How good are the definitions?

D.

How complete is the model?

E.

How structurally sound is the model?

F.

All of the above

Full Access
Question # 18

Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.

A.

TRUE

B.

FALSE

Full Access
Question # 19

Data replication is useful as it provides:

A.

The ability to spread the workload across multiple databases

B.

Opportunities to secure sensitive data

C.

An alternative to backups

D.

Enables different table structures to be built

E.

Insights into customer retention

Full Access
Question # 20

An organization will create an uncover valuable Metadata during the process of developing Data Integration and Interoperability solutions.

A.

TRUE

B.

FALSE

Full Access
Question # 21

DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.

A.

FALSE

B.

TRUE

Full Access
Question # 22

Data governance requires control mechanisms and procedures for, but not limited to, facilitating subjective discussions where managers’ viewpoints are heard.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Lack of automated monitoring represents serious risks, including:

A.

Administrative and audit duties risk

B.

Risk of compliance

C.

Direction and recovery risk

D.

Risk of reliance on inadequate native

Full Access
Question # 24

The language used in file-based solutions is called MapReduce. This language has three main steps:

A.

Map

B.

Shuffle

C.

Free

D.

Terminate

E.

Integrate

F.

Reduce

Full Access
Question # 25

E-discovery is the process of finding electronic records that might serve as evidence in a legal action.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Three classic implementation approaches that support Online Analytical Processing include:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Full Access
Question # 27

Data profiling examples include:

A.

Counts of null

B.

Max/Min value

C.

Max/Min length

D.

Frequency distribution

E.

Data type and format

F.

None of the above

Full Access
Question # 28

The business glossary should capture business terms attributes such as:

A.

Lineage

B.

Utilization

C.

Common misunderstanding in terms

D.

System development

E.

Algorithms to supporting definitions

F.

All of the above

Full Access
Question # 29

Which model has one Data Governance organization coordinate with multiple Business Units to maintain consistent definitions and standards?

A.

Federated Data Governance Model

B.

Central Data Governance Model

C.

Cognitive Data Governance Model

D.

Replicated Data Governance Model

E.

Associative Data Governance Model

Full Access
Question # 30

All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 31

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

A.

TRUE

B.

FALSE

Full Access
Question # 32

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Full Access
Question # 33

Big data is often defined by three characteristics. They are:

A.

Size, Speed and Sensitivity

B.

Volume, Variety and Velocity

C.

Direction, Depth and Details

D.

Expansive, Engaged and Enormous

E.

Complexity, Compliance and Completeness

Full Access
Question # 34

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Uniqueness, as a dimension of data quality, states no entity exists more than once within the data set.

A.

TRUE

B.

FALSE

Full Access
Question # 36

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Full Access
Question # 37

Achieving near-real-time data replication, using a source accumulation technique,

triggers on:

A.

Posting of messages on the enterprise bus

B.

Arrival of streaming data

C.

Daily batch loads

D.

Reaching a threshold or frequency schedule

E.

Request from a target system to pull data

Full Access
Question # 38

Different types of metadata include:

A.

Business, Technical and Operational

B.

Business. Quality, and Introspective

C.

Business, Application and Processing

D.

Business, Information, Application and Technology

E.

Fluid, static and viscous

Full Access
Question # 39

XML provides a language for representing both structures and unstructured data and information.

A.

TRUE

B.

FALSE

Full Access
Question # 40

When recovering from multiple system failures, what is the biggest difficulty faced

by a DBA?

A.

Determining where the corrupt pages exist in the database file system

B.

Determining what point to recover to using backups taken at different points intime

C.

Reseting active directory to reapply the security policies

D.

Organising for the tapes to be delivered to the main data center

E.

Determining what version of the DBMS to recover - considering incrementalPatches

Full Access
Question # 41

ECM is an abbreviation for:

A.

Enterprise compliance management

B.

Enterprise compliance manager

C.

Enterprise component management

D.

Enterprise content management

Full Access
Question # 42

An implemented warehouse and its customer-facing BI tools is a technology product.

A.

TRUE

B.

FALSE

Full Access
Question # 43

As an often-overlooked aspects of basic data movement architecture, Process controls include:

A.

Consistency logging

B.

Exception logs

C.

Database activity logs

D.

Alerts

E.

Exception logs

F.

All of the above

Full Access
Question # 44

A project scope requires the collection, exchange, and reporting of data from multiple in-house custom systems. Documents gathered include business concepts, existing database schemas, XSDs, and reporting layouts. How many models of each layer of abstraction can be expected?

A.

More XSDs than reporting layouts

B.

The same number of each of the model types

C.

More physical data models than logical data models, and more logical data models than conceptual data models

D.

Only 1 conceptual data model, 1 logical data model, and 1 physical data model

E.

More conceptual data models than physical data models

Full Access
Question # 45

Please select the incorrect item that does not represent a dimension in the Data Values category in Data Quality for the Information age.

A.

Currency

B.

Timeliness

C.

Consistency

D.

Completeness

Full Access
Question # 46

Data security issues, breaches and unwarranted restrictions on employee access to data cannot directly impact operational success.

A.

TRUE

B.

FALSE

Full Access
Question # 47

A data warehouse deployment with multiple ETL, storage and querying tools often

suffers due to the lack of:

A.

Integration of the dictionaries to achieve common understanding

B.

Conflict between software vendors

C.

Disk space on the big data platform

D.

Quality data modelers

E.

Common data types in the source datasets

Full Access
Question # 48

Examples of transformation in the ETL process onclude:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Full Access
Question # 49

Repositories facilitate the collection, publishing and distribution of data in a centralized and possibly standardized way. Data is most often used to:

A.

Make sure the DBAs are not creating new tables and columns

B.

Document and organize the provided data

C.

To support the business users not the technical users

D.

Give developers all the data they will need for programming

E.

Find new initiatives for the business to pursue

Full Access
Question # 50

The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.

A.

FALSE

B.

TRUE

Full Access
Question # 51

If data is not integrated with care it presents risk for unethical data handling. These ethical risks intersect with fundamental problems in data management including: Limited knowledge of data’s origin and lineage; Data of poor quality; Unreliable Metadata; and Documentation of error remediation.

A.

TRUE

B.

FALSE

Full Access
Question # 52

Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.

A.

TRUE

B.

FALSE

Full Access
Question # 53

Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.

A.

FALSE

B.

TRUE

Full Access
Question # 54

There are several methods for masking data:

A.

Substitution

B.

Temporal variance

C.

Temporal stagnation

D.

Value stagnation

E.

Value variance

F.

All of the above

Full Access
Question # 55

Dimensions of data quality include:

A.

Validity

B.

Privacy

C.

Innovation

D.

Accessibility

E.

Currency

F.

All of the above

Full Access
Question # 56

Managing business party Master Data poses these unique challenges:

A.

Difficulties in unique dimensions

B.

Difficulties in unique identification

C.

Reference data anomaly detection

D.

The number of data sources and the differences between them

Full Access
Question # 57

What type of key is used in physical and sometimes logical relational data modelling schemes to represent a relationship?

A.

Primary key

B.

Foreign key

C.

Network key

D.

Applications key

E.

Door key

F.

All of the above

Full Access
Question # 58

No recorded negative ethical outcomes does not mean that the organization is processing data ethically. Legislation cannot keep up with the evolution of the data environment so how do we stay compliant?

A.

Constant attention to ethical legislation and legal proceedings and international ethical bodies will enable the organization to recognize potential compliancy issues that can be addressed

B.

An active data quality and privacy assessment program can be used to detect ethical risks. Once identified, we can reduce the associated risks according to the organizations ethical values

C.

A healthy internal governance, risk and compliance function, including internal data audits will identify potential ethical issues

D.

An organization must develop and sustain a culture of ethical data handling to detect potential ethical risks. On identifying ethical risks, the onus is on the organization to modifying the processing to achieve acceptable data handling

E.

The best way to keep up with the evolution is to survey communities, customers and employees and what they consider to be appropriate use of the information

Full Access
Question # 59

The purpose for adding redundancy to a data model (denormalisation) is to:

A.

Make it easier for developers to join tables

B.

Avoid the loss of data by storing key values more than once

C.

Improve aggregate database performance across read requests

D.

Fully utilize all the indexes

E.

Ensure surrogate keys are retaining their unique values in all satellite tables

Full Access
Question # 60

Critical Data is most often used in

A.

Regulatory, financial, or management reporting

B.

Business operational needs

C.

Measuring product quality and customer satisfaction

D.

Business strategy, especially efforts at competitive differentiation.

E.

All of these

Full Access
Question # 61

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

A.

TRUE

B.

FALSE

Full Access
Question # 62

Data Governance deliverables commonly include:

A.

Data value chains

B.

IT methodology and practices

C.

Business culture assessment

D.

Roadmaps and implementation strategy

E.

Regulatory requirements

Full Access
Question # 63

Please select the answer that does not represent a machine learning algorithm:

A.

Reinforcement learning

B.

Supervised learning

C.

Artificial learning

D.

Unsupervised learning

Full Access
Question # 64

Database monitoring tools measure key database metrics, such as:

A.

Capacity, availability, backup instances, data quality

B.

Capacity, design, normalization, user access

C.

Create, read, update, delete

D.

Create, read, normalization, user access

E.

Capacity, availability, cache performance, user statistics

Full Access
Question # 65

Consistent input data reduces the chance of errors in associating records. Preparation processes include:

A.

Standardization

B.

EnrichmentC Validation

C.

Database management

Full Access
Question # 66

Which artifact is the highest level of abstraction in the Enterprise Data Model?

A.

Data Ownership Model

B.

Top-level Process Model

C.

Subject Area Model

D.

Conceptual Model

E.

Systems Portfolio Model

Full Access
Question # 67

Please select the correct definition of Data Management from the options below.

A.

Data Management is the strict control of all plans, policies, programs and practices that enable the business strategy to be successfully executed.

B.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data and information assets throughout their lifecycles.

C.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data assets throughout their lifecycles.

D.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of information assets throughout their lifecycles.

Full Access
Question # 68

The disclosure of sensitive addresses may occur through:

A.

Inappropriate use of photocopier toner

B.

Ineffective implementation of data architecture

C.

Cloud-based databases

D.

Stored procedures being called directly

E.

Software ignoring privacy tags on the data.

Full Access
Question # 69

Common OLAP operations include:

A.

Drill down/up

B.

Roll-up

C.

Slice

D.

Dice

E.

All of the above

F.

Cut

Full Access
Question # 70

SOA stand for Service Orchestrated Architecture

A.

TRUE

B.

FALSE

Full Access
Question # 71

Data professionals involved in Business Intelligence, analytics and Data Science are often responsible for data that describes: who people are; what people do; where people live; and how people are treated. The data can be misused and counteract the principles underlying data ethics.

A.

FALSE

B.

TRUE

Full Access
Question # 72

Which of the following is NOT a goal of Data Quality?

A.

Identify and advocate for opportunities to improve the quality of data, throughprocess and system improvements

B.

Define standards, requirements, and specifications for data quality controls aspart of thedata lifecycle.

C.

Develop a governed approach to make data fit for purpose based on dataconsumers" requirements

D.

Define and implement processes to measure, monitor, and report on data qualitylevels

E.

Understand and comply with all relevant regulations and policies for privacy.protection, and confidentiality

Full Access
Question # 73

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Full Access
Question # 74

A roadmap for enterprise data architecture describes the architecture’s 3 to 5-year development path. The roadmap should be guided by a data management maturity assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 75

Advantages if a centralized metadata repository include:

A.

Quick metadata retrieval

B.

None of the above

C.

Combining data from multiple other tables in advance to avoid costly run-time joins

D.

All of the above

E.

High availability

F.

Low latency, since it is independent of the source systems

Full Access
Question # 76

Data Management maturity has many goals for accomplishment including having a positive effect on culture. This is important to a Data Governance program for the following reason:

A.

It is important to be able to assess the level of current state for each component against the Data Governance best practices to determine how readily the culture has accepted Data Governance

B.

Data Governance does not affect the culture of the organization directly

C.

It is important to have many goals so that you can show progress on some of the goals even if you can't meet all of them

D.

Data management maturity only has one goal

E.

Best practices for data management are not the same as best practices for Data Governance

Full Access
Question # 77

One of the difficulties when integrating multiple source systems is:

A.

Maintaining documentation describing the data warehouse operation

B.

Determining valid links or equivalences between data elements

C.

Modifying the source systems to align to the enterprise data model

D.

Having a data quality rule applicable to all source systems

E.

Completing the data architecture on time for the first release

Full Access
Question # 78

Assessment criteria are broken into levels, and most capability maturity models use five (5) levels. This is important since:

A.

It is not important how many levels there are; vendors do this to show they have a complex model

B.

Each capability level will have specific criteria associated with its completion. To move to the next higher level, all the capabilities of the current level must be satisfied

C.

Each capability is separate, so each level represents a separate stage in development

D.

Assessments are difficult and breaking them into levels makes them more difficult to perform

E.

The organization must be able to manage each criterion, and breaking them into levels is the only way to do that

Full Access
Question # 79

Please select the correct types of data stewards:

A.

Executive Data Steward

B.

Chief Data Steward

C.

Enterprise Data Steward

D.

Business Data Steward

E.

A Data Seller

F.

All of the above

Full Access
Question # 80

Please select the three types of data models:

A.

Innovative Data Model

B.

Logical Data Model

C.

Dimensional Data model

D.

Conceptual Data Model

E.

Idea Data Model

F.

Physical Data Model

Full Access
Question # 81

According to the DMBoK2, by creating Data Management Services, IT involves the Data Governance Council:

A.

To estimate the enterprise needs for these services and provide the justification for staffing and funding to provide these services

B.

To provide a funnel for data and information issues to take the administration load off IT

C.

To ensure that data and information is still managed by IT and business only plays an advisory role

D.

To enable the business to maintain oversight on data and information projects

E.

To provide data stewards as and when needs to perform services where IT resources are either not available or do not exist

Full Access
Question # 82

Which of these is not a goal of Data Governance and Stewardship?

A.

Define, approve, communicate, and implement principles, policies, procedures, metrics, tools, and responsibilities for data management

B.

Monitor and guide policy compliance, data usage, and management activities

C.

Help the data modelers to use data elements that have gone through Data Governance processes

D.

Enable an organization to manage its data as an asset

E.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Full Access
Question # 83

Who should write the main content for a security policy for an organisation?

A.

A security knowledge area specialist

B.

A data governance knowledge area specialist

C.

The data warehouse developer

D.

The database administrator

E.

The data steward associated with the data

Full Access
Question # 84

Poorly managed Metadata leads to, among other, redundant data and data management processes.

A.

TRUE

B.

FALSE

Full Access
Question # 85

What are the three qualities of an effective Data Governance function?

A.

Optimism, objective, sustainable

B.

Sustainable, embedded, measured

C.

Measured, objective, embedded

D.

Embedded, systematic, sustainable

E.

Sustainable, realistic, embedded

Full Access
Question # 86

Basic profiling of data involves analysis of:

A.

Data sources, data visualisations, data latency and ownership

B.

Data clusters, data clouds, data repositories and metadata libraries

C.

Data lakes, data warehouses and operational data stores

D.

Data formats, data values, patterns and relationships

E.

Data criteria, data acquisition, data policy and procedures inside dataGovernance

Full Access
Question # 87

An input in the data architecture context diagram includes data governance.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Please select the answers that correctly describes where the costs of poor quality data comes from.

A.

Scrap and rework

B.

Organizational conflict

C.

High job satisfaction

D.

High productivity

E.

Reputational costs

F.

Compliance costs

Full Access
Question # 89

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Full Access
Question # 90

A data dictionary is necessary to support the use of a DW.

A.

TRUE

B.

FALSE

Full Access
Question # 91

Data profiling also includes cross-column analysis, which can identify overlapping or duplicate columns and expose embedded value dependencies.

A.

TRUE

B.

FALSE

Full Access
Question # 92

Data replication has two dimensions of scaling: diagonal and lateral

A.

FALSE

B.

TRUE

Full Access
Question # 93

Examples of concepts that can be standardized within the data architecture knowledge area include:

A.

Enterprise data models

B.

System naming conventions

C.

None of the above

D.

Data security standards

E.

Data quality rules

F.

Tool standards

Full Access
Question # 94

Developing complex event processing solutions require:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Full Access
Question # 95

Over a decade an organization has rationalized implementation of party concepts from 48 systems to 3. This is a result of good:

A.

Data operations and system rationalization

B.

Data quality and data governance

C.

System rationalization and metadata management

D.

Data architecture and data warehousing

E.

Data architecture and data governance

Full Access
Question # 96

The creation of overly complex enterprise integration over time is often a symptom

of:

A.

Multiple data warehouses

B.

Multiple integration technologies

C.

Multiple metadata tags

D.

Multiple application coding languages

E.

Multiple data owners

Full Access
Question # 97

Normalisation is the process of applying rules in order to organise business complexity into stable data structures.

A.

TRUE

B.

FALSE

Full Access
Question # 98

You have completed analysis of a Data Governance issue in your organisation and have presented your findings to the executive management team. However, your findings are not greeted warmly and you find yourself being blamed for the continued existence of the issue. What is the most likely root cause for this?

A.

You did not secure appropriate budget or resources for the engagement and did not properly define the project charter

B.

You failed to correctly scope the analysis project and did not secure resources to deliver a fully executed solution to address root causes

C.

You failed to communicate to your team the importance of achieving a workable solution to the issues identified

D.

You failed to correctly manage expectations about the roles, responsibilities, and accountabilities for Data Governance in the organisation and are dependent on other areas to execute your recommendations

E.

You adopted an incorrect methodology to your Data Governance and have failed to execute necessary information management tasks

Full Access
Question # 99

Business glossaries have the following objectives:

A.

Improve the alignment between technology assets and the business organization

B.

All of the above

C.

Cultural factors that might improve the concepts and terminology

D.

Maximise search capability and enable access to documented institutional knowledge

E.

Enable common understanding of the core business concepts and terminology

F.

Reduce the risk that data will be misused due to inconsistent understanding of the business concepts.

Full Access
Question # 100

Different levels of policy are required to govern behavior to enterprise security. For example:

A.

Data security policy

B.

Business Security Policy

C.

IT security policy

D.

Enterprise security policy

E.

All of the above

F.

None of the above

Full Access
Question # 101

In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.

A.

FALSE

B.

TRUE

Full Access
Question # 102

Disciplines within the enterprise architecture practice does not include:

A.

Technology architecture

B.

Application architecture

C.

Information architectureService Architecture

D.

Business architecture

Full Access
Question # 103

Which statement best describes the relationship between documents and records?

A.

Documents and records are the same thing

B.

Documents are written and records are audio

C.

Documents and records are not related

D.

Records are a sub-set of documents

E.

Documents are a sub-set of records

Full Access
Question # 104

All organizations have the same Master Data Management Drivers and obstacles.

A.

TRUE

B.

FALSE

Full Access
Question # 105

SSD is the abbreviation for Solid State Dimension.

A.

TRUE

B.

FALSE

Full Access
Question # 106

What position is responsible for the quality and use of their organization’s data assets?

A.

Chief Information Officer

B.

Data Scientist

C.

Data Steward

D.

Data Modeler

E.

Data Architect

Full Access
Question # 107

During the intial scoping of a project, a data model can be used to:

A.

Identify detailed impact on all the tables in a database that must be changed

B.

Determine the security requirements for accessing the data

C.

Provide a clear definition of affected and non-affected data entities

D.

Determine the impact of business processes and customer lifecycles

E.

Plan the structure of the metadata repository

Full Access
Question # 108

Implementing a BI portfolio is about identifying the right tools for the right user communities within or across business units.

A.

TRUE

B.

FALSE

Full Access
Question # 109

Quality Assurance Testing (QA) is used to test functionality against requirements.

A.

TRUE

B.

FALSE

Full Access
Question # 110

The dependencies of enterprise technology architecture are that it acts on specified data according to business requirements.

A.

TRUE

B.

FALSE

Full Access
Question # 111

The Data Governance Council (DGC) manages data governance initiatives, issues, and escalations.

A.

TRUE

B.

FALSE

Full Access
Question # 112

Instant Messaging (IM) allows a user to message each other in real-time.

A.

TRUE

B.

FALSE

Full Access
Question # 113

A change management program supporting Data Governance should focus communication on what?

A.

Promoting the value of its data assets, monitor and act on feedback about Data Governance activities & implement data management training programs.

B.

Promote the value of its data assets

C.

Show the value of data stewardship & implement data management training program

D.

How many errors are in each of the various department's data

E.

Implement a data management training program and create a data dictionary

Full Access
Question # 114

A goal of data architecture is to identify data storage and processing requirements.

A.

TRUE

B.

FALSE

Full Access
Question # 115

A "Data Governance strategy" usually includes the following deliverables:

A.

A Statement of Intent, a Decision Framework, an Implementation Roadmap, and a Governance Toolkit

B.

A Charter, a Data Architecture, a Program Data Model, and a Plan for Operational Success

C.

A Program Plan, a Resource Plan, an Implementation Plan, and a Test Plan

D.

A Charter, an Operating Framework, an Implementation Roadmap, and a Plan for Operational Success

E.

A Charter, a Security Strategy, a Solution Roadmap, and a User Experience Plan

Full Access
Question # 116

The independent updating of data into a system of reference is likely to cause:

A.

Reference data inconsistencies

B.

Duplicate data

C.

Deadlocks in the database

D.

Master data inconsistencies

E.

Transaction data inconsistencies

Full Access
Question # 117

Examples of technical metadata include:

A.

Access permission

B.

Recovery and backup rules

C.

Colum properties

D.

Data subject properties

Full Access
Question # 118

The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:

A.

What -> The inventory Column

B.

What -> The entity column

C.

When -> The timing column

D.

Why -> The motivation column

E.

Who -> The responsibility column

F.

How -> The process column

Full Access
Question # 119

Functionality-focused requirements associated with a comprehensive metadata solution, include:

A.

Synchronization

B.

Structure

C.

None of the above

D.

History

E.

Volatility

F.

Access rights

Full Access
Question # 120

A staff member has been detected inappropriately accessing client records from

usage logs. The security mechanism being used is an:

A.

Access

B.

Audit

C.

Entitlement

D.

Authorisation

E.

Authentication

Full Access
Question # 121

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Full Access
Question # 122

The percentage of enterprise computers having the most recent security patch

installed is a metric of which knowledge area?

A.

Data Quality

B.

Data Warehousing and Business Intelligence

C.

Data Storage and Operations

D.

Metadata Management

E.

Data Security

Full Access
Question # 123

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Full Access
Question # 124

Sample value metrics for a data governance program include:

A.

Reduction of risk

B.

Improved efficiency in operations

C.

Effectiveness of education

D.

Achievements of goals and objectives

E.

Contributions to business objectives

F.

Effectiveness of communication

Full Access
Question # 125

A database uses foreign keys from code tables for column values. This is a way of implementing:

A.

Master data

B.

Event data

C.

Reference data

D.

Star schema data

E.

Temporal data

Full Access
Question # 126

Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:

A.

The triggers for effective change

B.

Data architecture

C.

How people experience changes

D.

Data security

E.

The barriers to change

F.

Why change fails

Full Access
Question # 127

Small reference data value sets in the logical data model can be implemented in a physical model in three common ways:

A.

Create a matching separate code table

B.

Create a master shared code table

C.

None of the above

D.

Program integration by joining tables

E.

Embed rules or valid codes into the appropriate object’s definition.

F.

Roadmap Development

Full Access
Question # 128

Data replication can be active or passive.

A.

TRUE

B.

FALSE

Full Access
Question # 129

A weak point in an organization’s defenses is a:

A.

Anti-virus software

B.

Security model problem

C.

Penetration

D.

Vulnerability

E.

Firewall

Full Access
Question # 130

Which of these is NOT a component of an enterprise wide data strategy?

A.

A business Case for better data management

B.

A description of data management roles & organizations

C.

An outline of 'as is' and 'to be' technical architectures

D.

A data management roadmap, highlighting major activities

E.

A vision statement for data management

Full Access
Question # 131

An Operational Data Mart is a data mart focused on tactical decision support.

A.

TRUE

B.

FALSE

Full Access
Question # 132

Operational reports are outputs from the data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 133

Data integrity is the state of being partitioned – protected from being whole.

A.

TRUE

B.

FALSE

Full Access
Question # 134

The failure to gain acceptance of a business glossary may be due to ineffective:

A.

Metadata Management

B.

Business Architecture

C.

Content and Document Management

D.

Data Governance

E.

Data Security

Full Access
Question # 135

What is the best definition of Crowdsourced data collection?

A.

Crowdsourcing should not be used to gather data because there will be too many opinions and not enough facts

B.

Crowdsourcing is the process of obtaining needed data by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers  

C.

Crowdsourced data is the best way of finding data because so many people are contributing their definitions

D.

Crowdsourced data is the data that comes from using a company wiki to gather data because anyone in the crowd can contribute

E.

Crowdsourced data collection is only used by researchers to answer research, survey or feedback questions

Full Access
Question # 136

ISO 8000 will describe the structure and organization of data quality management, including:

A.

Data Quality Assurance

B.

None of the above

C.

Data Quality Planning

D.

Data Quality Audit

E.

Data Quality Control

F.

Data Quality Improvement

Full Access
Question # 137

Machine learning explores the construction and study of learning algorithms.

A.

TRUE

B.

FALSE

Full Access
Question # 138

While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.

A.

TRUE

B.

FALSE

Full Access
Question # 139

Self-service is a fundamental delivery channel in the BI portfolio.

A.

TRUE

B.

FALSE

Full Access
Question # 140

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

A.

FALSE

B.

TRUE

Full Access
Question # 141

Issues caused by data entry processes include:

A.

Data entry interface issues

B.

List entry placement

C.

Field overloading

D.

None of the above

E.

Training issues

F.

Changes to business processes

Full Access
Question # 142

Data Stewards are most likely to be responsible for:

A.

Data Modelling and Data Security

B.

Data Integration and Interoperability

C.

Data Storage and Operations

D.

Content and Document Management

E.

Data Governance and Data Quality

Full Access
Question # 143

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

A.

TRUE

B.

FALSE

Full Access
Question # 144

Select the areas to consider when constructing an organization’s operating model:

A.

Cultural Factors

B.

Business model

C.

Impact of the regulation

D.

None of the above

E.

Value of the data to the organisation

F.

All of the above

Full Access
Question # 145

Domains can be identified in different ways including: data type; data format; list; range; and rule-based.

A.

TRUE

B.

FALSE

Full Access
Question # 146

Different storage volumes include:

A.

Gigabyte

B.

Petabyte

C.

Perabyte

D.

Exabyte

E.

Tetrabyte

F.

Terabyte

Full Access
Question # 147

Time-based patterns are used when data values must be associated in chronological order and with specific time values.

A.

TRUE

B.

FALSE

Full Access
Question # 148

Control activities to manage metadata stores include:

A.

Roadmap extrapolation

B.

Load statistical analysis

C.

Lineage

D.

Missing metadata reports

E.

Definitions resolutions improvement

F.

Job scheduling and monitoring

Full Access
Question # 149

An image processing system captures, transforms and manages images of paper and electronic documents.

A.

TRUE

B.

FALSE

Full Access
Question # 150

Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?

A.

Each division of an enterprise may have its own way to describe its business and associated metrics

B.

There is disagreement among divisions on the meaning of key metrics

C.

There is typically significant waste in an enterprise through duplication of reports and metrics

D.

Increasing regulation in industry can impose real penalties in terms of substantial fines or jail terms for non-compliance to properly managed data (e.g. accurate reporting/accounting)

E.

I've been to a conference and found that lots of our competitors are doing it

Full Access
Question # 151

Data lineage is useful to the development of the data governance strategy.

A.

TRUE

B.

FALSE

Full Access
Question # 152

Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.

A.

TRUE

B.

FALSE

Full Access
Question # 153

The acronym BASE is made up of:

A.

Basically available

B.

Basically not available

C.

Software state

D.

Soft state

E.

Eventual consistency

F.

Everything considered

Full Access
Question # 154

Factors that have shown to play a key role in the success in the success of effective data management organizations does not include:

A.

Clear vision

B.

Orientation and training

C.

Leadership alignment

D.

IT sponsorship

Full Access
Question # 155

Three data governance operating models types include:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Full Access
Question # 156

Metadata is described using three sets od categories, including:

A.

Structural Metadata

B.

Descriptive Metadata

C.

Generic Metadata

D.

Administrative metadata

E.

Conceptual Metadata

Full Access
Question # 157

Most document programs have policies related to:

A.

Scope and compliance audits

B.

Proper destruction of records

C.

Proper construction of records

D.

Identification and protection of vital records

E.

Partition tolerance

F.

All of the above

Full Access
Question # 158

Data Standards used by the enterprise must:

A.

Promote consistent results but periodically reviewed and updated

B.

Be a guideline for the organization but open to interpretation

C.

Promote consistent results so only written once and never updated

D.

Only be necessary for the Data Governance team

E.

Set by an standards organization and not by the enterprise

Full Access
Question # 159

How can the Data Governance process in an organisation best support the requirements of various Regulatory reporting needs?

A.

By creating a map of where the enterprise data is located in IT systems.

B.

By providing a Business Glossary based look up facility for data definitions.

C.

By ensuring that data is properly categorized, owned, understood, defined, documented and controlled

D.

By highlighting the challenges of multiple data definitions within the enterprise

E.

By performing an as-is data audit

Full Access
Question # 160

A pensioner who usually receives a quarterly bill of around $300 was sent a

$100,000,000 electricity bill. They were a victim of poor data quality checks in

which dimension?

A.

Currency

B.

Integrity

C.

Accuracy

D.

Reasonableness

E.

Timeliness

Full Access
Question # 161

One of the percentages to measure success of a records management system implantation is the percentage of the identified corporate records declared as such and put under records control.

A.

FALSE

B.

TRUE

Full Access
Question # 162

All assessments should include a roadmap for phased implementation of the recommendations. This is important because:

A.

The roadmap shows how to implement the important assessment results, and when to do so

B.

A roadmap will highlight items in an implementation sequence and on other considerations (budget, resources, other programs, etc.)

C.

A roadmap is just another way of saying you should have a plan

D.

A roadmap is the only way for the organization to understand the results of the assessment

E.

A roadmap includes a project plan, which gives the stakeholders information on how each recommendation will be implemented

Full Access
Question # 163

What are some of the business drivers for the ethical handling of data that Data Governance should satisfy?

A.

Develop Employee Awareness of the organizational risks on unethical data handling

B.

All of these

C.

Define what ethical handling of data means to the organization

D.

Achieve the preferred culture and actions in handling data

E.

Monitor, Measure and adjust the organizations approach to data ethics

Full Access
Question # 164

Several global regulations have significant implications on data management practices. Examples include:

A.

BCBS 239

B.

Data Standards

C.

Privacy laws

D.

Effectiveness of education Standards

E.

SPCA

F.

PCI-DSS

Full Access
Question # 165

A general principle for managing metadata includes Responsibility.

A.

FALSE

B.

TRUE

Full Access
Question # 166

What model is the highest level model within the enterprise data model?

A.

Logical model

B.

Physical model

C.

Conceptual model

D.

Subject Area model

Full Access
Question # 167

The implementation of a Data Warehouse should follow these guiding principles:

A.

Managing performance of data assets

B.

Focus on the business goals

C.

Managing the availability of data throughout the data lifecycle

D.

Start with the end in mind

E.

Managing the performance of data transactions

F.

Collaborate

Full Access
Question # 168

Class operations can be:

A.

General: Hidden

B.

Public: Externally visible

C.

Internally visible: Visible to children objects

D.

Private: Hidden

Full Access
Question # 169

A data model that consists of a single fact table linked to important concepts of the

business is a:

A.

elational Model

B.

Dimensional Model

C.

Transition State Model

D.

Process Model

E.

Machine Leaming Model

Full Access
Question # 170

Wat data architecture designs represent should be clearly documented. Examples include:

A.

Priority

B.

Retirement

C.

Preferred

D.

All of the above

E.

Current

F.

Emerging

Full Access
Question # 171

Defining quality content requires understanding the context of its production and use, including:

A.

Producers

B.

Timing

C.

None of the above

D.

Delivery

E.

Consumers

F.

Format

Full Access
Question # 172

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

A.

TRUE

B.

FALSE

Full Access
Question # 173

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

A.

TRUE

B.

FALSE

Full Access
Question # 174

The deliverables in the data architecture context diagram include:

A.

Data flows

B.

Enterprise data

C.

Implementation roadmap

D.

Data Value Chains

E.

None of the above

F.

All of the above

Full Access
Question # 175

Communications are essential to the success of a DMM or Data Governance assessment. Communications are important because:

A.

Communications can influence the socialization and acceptance of the results and implementation of a data management or Data Governance program

B.

Many organizations will overlook the communications aspect of a data management or Data Governance assessment

C.

Findings may affect stakeholder's positions and roles

D.

Each organization will approach data management and Data Governance communications differently

E.

Data management and Data Governance communications are different from each other

Full Access
Question # 176

One of the first steps in a master data management program is to:

A.

Decommission similar data collection systems

B.

Review data security protocols

C.

Secure funding for 20 years of operations

D.

Build multiple data marts

E.

Evaluate and assess data sources

Full Access
Question # 177

Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.

A.

TRUE

B.

FALSE

Full Access
Question # 178

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Full Access
Question # 179

The roles associated with enterprise data architecture are data architect, data modellers and data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 180

Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.

A.

Purpose Limitation

B.

Data Minimisation

C.

Accuracy

D.

Storage Limitation

E.

Accountability

F.

All of the above

Full Access
Question # 181

Data profiling is a form of data analysis used to inspect data and assess quality.

A.

TRUE

B.

FALSE

Full Access
Question # 182

Enterprise data architecture project-related activities include:

A.

Define maturity assessment

B.

Define scope

C.

Design

D.

Implement

E.

None of the above

F.

All of the above

Full Access
Question # 183

There are three basic approaches to implementing a Master Data hub environment, including:

A.

Compliance hub

B.

Transaction hub

C.

Consolidated hub

D.

Emotions hub

E.

Location hub

F.

Registry

Full Access
Question # 184

To push up the urgency level requires adding of the sources of complacency or increasing of their impact.

A.

TRUE

B.

FALSE

Full Access
Question # 185

A design approach for managing the risk of errors in data marts is:

A.

Purge the data in the data marts and reload from the data warehouse

B.

Purge the data in the source system and reload the data warehouse

C.

Purge the data in the data warehouse and copy back to the data mart

D.

Purge the data in the data warehouse and reload from the source systems

E.

Purge the data generally and reload from the best system

Full Access
Question # 186

The first two steps in the data science process are:

A.

Define Big Data data strategy & Business Need(s)

B.

Choose Data Sources

C.

Develop Data Science Hypotheses and Mehods

D.

Acquire & Ingest Data source(s)

Full Access
Question # 187

Logical abstraction entities become separate objects in the physical database design using one of two methods.

A.

The DAMA Wheel

B.

Supertype partition

C.

Subtype partition

D.

Subtype absorption

E.

Supertype absorption

Full Access
Question # 188

A deliverable in the data architecture context diagram includes an implementation roadmap.

A.

TRUE

B.

FALSE

Full Access
Question # 189

A point to point interface architecture will, in general, have more or less interfa

formats than a service oriented architecture?

A.

A few less

B.

About the same

C.

A few more

D.

Many less

E.

Many more

Full Access
Question # 190

What key components must be included in the Implementation Roadmap?

A.

Timeframes and resources for data quality requirements, policies and directives and testing standards

B.

Data metrics, physical data structures, and data model designs

C.

Timeframes and resources for Policies and Directives, a Business Glossary Architecture, Business and IT processes and role descriptions

D.

Testing requirements, risk assessment, data security and privacy policies and database design

E.

Timeframes and resources for policies and directives Architecture, Tools and Control Metrics

Full Access
Question # 191

Operationality and interoperability depends on the data quality. In order to measure the efficiency of a repository the data quality needs to be:

A.

Stored in a Cloud for easy access

B.

Quantified by some type of metrics

C.

Be certified by a Data Governance team

D.

Have complete definitions

E.

Verified by the organization's legal department

Full Access
Question # 192

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

A.

TRUE

B.

FALSE

Full Access
Question # 193

During the initial scoping of a project, a data model can be used to:

A.

Determine the impact of business processes and customer lifecycles

B.

Identify detailed impact on all the tables in a database that must be changed

C.

Plan structure of the metadata repository

D.

Provide a clear definition of affected and non-affected data entities

E.

Determine the security requirements for accessing the data

Full Access
Question # 194

Match rules for different scenarios require different workflows, including:

A.

Consistency rules

B.

Duplicate identification match rules

C.

Match-merge rules

D.

Match-split rules

E.

Match-link rules

F.

All of the above

Full Access
Question # 195

A goal of a Reference and Master Data Management program include enabling master and reference data to be shared across enterprise functions and applications.

A.

FALSE

B.

TRUE

Full Access
Question # 196

There is a global trend towards increasing legislative protection of individual's information privacy. Which of these is an emerging topic related to online ethical behaviours?

A.

The right to have your personal information erased from the web, company databases, etc. pending the request does not conflict with legislative retention requirements

B.

The right to have your personal information de-identified

C.

The right to have your personal information protected in a manner that you select

D.

The right to have your personal information erased from the web and company databases, regardless of legislative retention requirements

E.

The right to have your personal information sent to you for review prior to use by another person or organization

Full Access
Question # 197

Deliverables in the Metadata Management context diagram include:

A.

Metadata Strategy

B.

Metadata Standards

C.

Data Lineage

D.

Metadata Architecture

E.

Metadata design

F.

Data storage and operations

Full Access
Question # 198

Modeling Bid data is a non-technical challenge but critical if an organization that want to describe and govern its data.

A.

TRUE

B.

FALSE

Full Access
Question # 199

Big Data and Data Science Governance should address such data questions as:

A.

What the data means on the source side and how to interpret the results on the on the output side

B.

What the data means on the source side but no assessment needed for the interpretation of results

C.

Whether to enrich the data and benefits of enrichment

D.

Terms for data obtained from vendors and outside organizations

E.

The approach for alignment of data visualization tools to the user community

Full Access
Question # 200

What are the three characteristics of effective Data Governance communication?

A.

It must be clear, unambiguous, and consistent

B.

It must be clear, structured, repetitive

C.

It must be viral, vital, and have volume

D.

It must be colorful, engaging, using multi-media

E.

It must be consistent, unambiguous, engaging

Full Access
Question # 201

Change Data Capture is a method of reducing bandwidth by filtering to include only data that has been changed within a defined timeframe.

A.

TRUE

B.

FALSE

Full Access
Question # 202

Data Integration and Interoperability is dependent on these other areas of data management:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Full Access
Question # 203

A Business Glossary forces a business to adopt a single definition of a business term.

A.

FALSE

B.

TRUE

Full Access
Question # 204

The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.

A.

FALSE

B.

TRUE

Full Access
Question # 205

How can the Data Governance process best support Regulatory reporting requirements?

A.

By providing a look up service for definitions

B.

By ensuring that data is properly owned, understood, defined, documented and controlled

C.

By performing a data audit

D.

By creating a map of the enterprise data stores where copies of information may be found

E.

By highlighting challenges of multiple definitions within the enterprise

Full Access
Question # 206

Business requirements is an input in the Data Warehouse and Business Intelligence context diagram.

A.

TRUE

B.

FALSE

Full Access
Question # 207

Examples of business processes when constructing data flow diagrams include:

A.

Order Management

B.

Marketing & Sales

C.

Sales order

D.

Invoicing

E.

Product Development

F.

Customer

Full Access
Question # 208

In Resource Description Framework (RDF) terminology, a triple store is composed of a subject that denotes a resource, the predicate that expresses a relationship between the subject and the object, and the object itself.

A.

FALSE

B.

TRUE

Full Access
Question # 209

Business metadata focuses largely on the content and condition of the data and includes details related to data governance.

A.

TRUE

B.

FALSE

Full Access
Question # 210

The data warehouse and marts differ from that in applications as the data is organized by subject rather than function.

A.

TRUE

B.

FALSE

Full Access
Question # 211

Data Integrity includes ideas associated with completeness, accuracy, and consistency.

A.

TRUE

B.

FALSE

Full Access
Question # 212

Why is it important to create short-term wins when rolling out a Data Governance initiative?

A.

Staff turnover in most organisations makes longer term planning impossible

B.

Short term wins help ensure on-going political support

C.

Short term wins help to distract stakeholders from delayed delivery on bigger issues

D.

You need to align your deliverables with internal project budgeting cycles

E.

People find it hard to sustain commitment to change if they do not see compelling results within a relatively short time period

Full Access
Question # 213

Which of the following is NOT a type of Data Steward?

A.

Coordinating

B.

Enterprise

C.

Operational

D.

Business

E.

Executive

Full Access
Question # 214

The better an organization understands the lifecycle and lineage of its data, the better able it will be to manage its data. Please select correct implication of the focus of data management on the data lifecycle.

A.

Data Quality must be managed throughout the data lifecycle

B.

Data Security must only be managed at the start of the data lifecycle

C.

Metadata Quality is the most important part of the management process

D.

Data Management efforts should focus on the most critical data last

Full Access
Question # 215

Please select the transition phases in Bridges’ Transition process:

A.

The neutral zone

B.

The new beginning

C.

The ending

D.

The transition

E.

The translation

F.

The game

Full Access
Question # 216

Metrics tied to Reference and Master Data quality include:

A.

Strategic usage reporting

B.

Amsterdam Information Model

C.

Data change activity

D.

Total cost of ownership

Full Access
Question # 217

Enterprise Data Architects should support projects for potential:

A.

Non-compliance to data standards

B.

Legal reviews

C.

Incomplete data requests

D.

Data-focused security reviews

E.

Planning for metadata development

Full Access
Question # 218

Data Fabric is:

A.

A way of sewing together different data concepts into a single data warehouse

B.

A metadata repository

C.

A form of data lake that automates data acquisition and initial data quality processing

D.

A superior star schema strategy

E.

Just another data warehouse with no distinguishing features

Full Access
Question # 219

CIF stands for:

A.

Company Information Factory

B.

Corporate Information Floor

C.

Corporate Information Factories

D.

Corporate Information Factory

Full Access