Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

DMF-1220 Questions and Answers

Question # 6

A data lineage tool enables a user to:

A.

Track the data from source system to a target database; understanding itstransformations

B.

Track the historical changes to a data value

C.

Visualize how the data gets to the data lake

D.

Enables rapid development of dashboard reporting

E.

Line up the data to support sophisticated glossary management

Full Access
Question # 7

Typically, DW/BI have three concurrent development tracks:

A.

Data mart

B.

Business Intelligence tools

C.

Data

D.

System development

E.

Techonology

F.

None of the above

Full Access
Question # 8

What techniques should be used and taught to produce the required ethical data handling deliverables?

A.

Change, Communication and training techniques need to be established

B.

A privacy impact assessment (PIA) is critical to ensuring that we are adhering to ethical data management

C.

Do an ethical impact assessment framework for all projects and activities involved in data management

D.

Due to fact that ethics are constantly changing we need to constantly affirm the organizations ethic statements on an annual basis

E.

Data Governance should define the set of ethical practices that are good for the organization

Full Access
Question # 9

Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?

A.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

B.

Alignment of Business and IT strategies, definition of data standards, implementation of Data Governance and metadata software tools

C.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

D.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

E.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

Full Access
Question # 10

Deliverables in the data quality context diagram include:

A.

DQM Procedures

B.

Data architecture

C.

Data governance

D.

DQ Policies and guidelines

E.

Analyses from data profiling

F.

Data quality Service Level Agreements

Full Access
Question # 11

Inputs in the reference and master data context diagram include:

A.

None of the above

B.

Business Drivers

C.

Business model

D.

Data Glossary

E.

Cultural Drivers

F.

All of the above

Full Access
Question # 12

The disclosure of sensitive addresses may occur through:

A.

Inappropriate use of photocopier toner

B.

Ineffective implementation of data architecture

C.

Cloud-based databases

D.

Stored procedures being called directly

E.

Software ignoring privacy tags on the data.

Full Access
Question # 13

SLA Stands for:

A.

Service Level Agreement

B.

System Lifecycle Audit

C.

System Latitude Audit

D.

Service Lifecycle Audit

Full Access
Question # 14

What result(s) is/are Data Handling Ethics trying to avoid?

A.

Loss of reputation for the organization and loss of customers

B.

Unethical use of information by staff to achieve business outcomes; customers trust so they are willing to pay more

C.

Increased Risk for people whose data is exposed and criminal proceedings

D.

Ensure that Data Governance is in line with Corporate Governance and ethic business statements

E.

Ensure that organizations are adhering to ethical standards set by industry and bodies such as the World Economic Forum

Full Access
Question # 15

The IBM Data Governance Council model is organized around four key categories. Select the answer that is not a category.

A.

Outcomes

B.

System Lifecycles

C.

Enablers

D.

Core disciplines

E.

Supporting disciplines

Full Access
Question # 16

Emergency contact phone number would be found in which master data

management program?

A.

Location

B.

Asset

C.

Service

D.

Employee

E.

Product

Full Access
Question # 17

Data modelling tools are software that automate many of the tasks the data modeller performs.

A.

FALSE

B.

TRUE

Full Access
Question # 18

The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:

A.

What -> The inventory Column

B.

What -> The entity column

C.

When -> The timing column

D.

Why -> The motivation column

E.

Who -> The responsibility column

F.

How -> The process column

Full Access
Question # 19

An implemented warehouse and its customer facing BI tool is a data product.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Hierarchical database model is the newest database model

A.

TRUE

B.

FALSE

Full Access
Question # 21

Reduced risk is a benefit of high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 22

A controlled vocabulary is a defined list of explicitly allowed terms used to index, categorize, tag, sort and retrieve content through browsing and searching.

A.

TRUE

B.

FALSE

Full Access
Question # 23

SOA stands for:

A.

Service orchestrated architecture

B.

Service orientated access

C.

Service orientated architecture

D.

Service overall architecture

Full Access
Question # 24

Over a decade an organisation has rationalised implementation of party concepts

from 48 systems to 3. This is a result of good:

A.

Data quality and data governance

B.

Data architecture and data warehousing

C.

Data operations and system rationalization

D.

System rationalization and metadata management

E.

Data architecture and data governance

Full Access
Question # 25

Confidentiality classification schemas might include two or more of the five confidentiality classification levels. Three correct classifications levels are:

A.

Consistency

B.

Internal use only

C.

Restricted confidential

D.

System development

E.

Confidential

F.

None of the above

Full Access
Question # 26

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Full Access
Question # 27

Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:

A.

The triggers for effective change

B.

Data architecture

C.

How people experience changes

D.

Data security

E.

The barriers to change

F.

Why change fails

Full Access
Question # 28

The purpose of enterprise application architecture is to describe the structure and functionality of applications in an enterprise.

A.

TRUE

B.

FALSE

Full Access
Question # 29

Operational Metadata describes details of the processing and accessing of data. Which one is not an example:

A.

Error logs

B.

Schedule anomalies

C.

Purge criteria

D.

Failure logs

Full Access
Question # 30

Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.

A.

TRUE

B.

FALSE

Full Access
Question # 31

The primary goal of data management capability assessment is to evaluate the current state of critical data management activities in order to plan for improvement.

A.

TRUE

B.

FALSE

Full Access
Question # 32

Big data primarily refers specifically to the volume of the data.

A.

TRUE

B.

FALSE

Full Access
Question # 33

There are three techniques for data-based change data capture, namely:

A.

The source system populates specific data elements.

B.

Application automated interfaces

C.

The source system processes copy data that has changed into a separate object as part of the transaction, which is then used for the extract process.

D.

The source systems send binary code through ASCI that makes the process rapid.

E.

The source system processes add to a simple list of objects and identifiers when changing data, which is then used to control selection of data extraction.

F.

None of the above

Full Access
Question # 34

Please select the answer that does not represent a machine learning algorithm:

A.

Reinforcement learning

B.

Supervised learning

C.

Artificial learning

D.

Unsupervised learning

Full Access
Question # 35

Business activity information is one of the types of data that can be modelled.

A.

TRUE

B.

FALSE

Full Access
Question # 36

Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:

A.

Consistency

B.

Rich data sources

C.

Information alignment and analysis

D.

Information delivery

E.

Presentation of findings and data insights

F.

All of the above

Full Access
Question # 37

Consistent input data reduces the chance of errors in associating records. Preparation processes include:

A.

Standardization

B.

EnrichmentC Validation

C.

Database management

Full Access
Question # 38

The Data Model Scorecard provides 10 data model quality metrics

A.

TRUE

B.

FALSE

Full Access
Question # 39

MPP is an abbreviation for Major Parallel Processing.

A.

TRUE

B.

FALSE

Full Access
Question # 40

The difference between warehouses and operational systems do not include the following element:

A.

Time variant

B.

Database

C.

Subject-orientated

D.

Historical

Full Access
Question # 41

A content strategy should end with an inventory of current state and a gap assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 42

Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Data science merges data mining, statistical analysis, and machine learning with the integration and data modelling capabilities, to build predictive models that explore data content patterns.

A.

FALSE

B.

TRUE

Full Access
Question # 44

Data architect: A senior analyst responsible for data architecture and data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 45

In data integration, the goal of data discovery is toc

A.

Identify potential sources and assure data recovery processes are compliant

B.

Identify key users and perform high level assessment of data quality

C.

Assign data glossary terms and data formats

D.

Identify potential sources and perform high-level assessment of data quality

E.

Assien data plossary terms and canonical models

Full Access
Question # 46

Various Regulations require evidence of clear data lineage and accuracy. How can we as data managers best serve our enterprises in achieving this goal?

A.

Perform a one off review of data quality

B.

Create a new data store for regulator required metrics

C.

Capture and document all metrics and store in a central repository

D.

Undertake an audit of current process and produce a report

E.

Provide the framework and guidance to enable a business led ongoing Data Governance process

Full Access
Question # 47

A design approach for managing the risk of errors in data marts is:

A.

Purge the data in the data marts and reload from the data warehouse

B.

Purge the data in the source system and reload the data warehouse

C.

Purge the data in the data warehouse and copy back to the data mart

D.

Purge the data in the data warehouse and reload from the source systems

E.

Purge the data generally and reload from the best system

Full Access
Question # 48

Customer relationship management systems manage Master Data about customers.

A.

TRUE

B.

FALSE

Full Access
Question # 49

What are the business objectives for building a business glossary?

A.

To have a place to store physical schemas for the DBAs

B.

Make sure that the data stewards have valid work to perform, & justify that the budget for Data Governance

C.

Take all the core data elements from the data models and store them in the glossary

D.

Establish a common understanding of core business concepts and terminology & enable access to documented institutional knowledge

E.

Create a place to manage metadata and lineage

Full Access
Question # 50

RACI is an acronym that is made up of the following terms.

A.

Control

B.

Responsible

C.

Accountable

D.

Informed

E.

Reliable

F.

Consulted

Full Access
Question # 51

A sandbox environment can either be a sub-set of the production system, walled off from production processing or a completely separate environment.

A.

TRUE

B.

FALSE

Full Access
Question # 52

Discovering and documenting metadata about physical data assets provides:

A.

Effective project scope management

B.

Scoping boundaries of the data dictionary

C.

Insights into the temporal data quality

D.

An estimation of balance sheet value of enterprise data

E.

Information on how data is transformed as it moves between systems

Full Access
Question # 53

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

A.

All of the above

B.

Streaming

C.

Messaging

D.

Technology

E.

Data

F.

Trickle Feeds

Full Access
Question # 54

Big Data and Data Science Governance should address such data questions as:

A.

What the data means on the source side and how to interpret the results on the on the output side

B.

What the data means on the source side but no assessment needed for the interpretation of results

C.

Whether to enrich the data and benefits of enrichment

D.

Terms for data obtained from vendors and outside organizations

E.

The approach for alignment of data visualization tools to the user community

Full Access
Question # 55

Veracity refers to how difficult the data is to use or to integrate.

A.

TRUE

B.

FALSE

Full Access
Question # 56

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Full Access
Question # 57

Which of the following is an activity for defining a Data Governance strategy?

A.

Develop a Business Glossary

B.

Perform Readiness Assessment

C.

Develop Goals, Principles, and Policies

D.

Charter Data Governance Council

E.

Deliver a plan for mapping metadata

Full Access
Question # 58

Metadata is described using different set of categories, including:

A.

Descriptive Metadata, Structural Metada, Administrative Metadata

B.

Diagnostic Metadata, Structural Metada, Administrative Metadata

C.

Prescriptive Metadata, Serial Metada, Administrative Metadata

D.

Descriptive Metadata, Serial Metada, Administrative Metadata

E.

None of the above

Full Access
Question # 59

An authoritative system where data is created/captured, and/or maintained through

a defined set of rules and expectations is called:

A.

A System of Systems

B.

A System of Retirement

C.

A System of Record

D.

A System of Reference

E.

A System of Referential Integrity

Full Access
Question # 60

Data Fabric is:

A.

A superior star schema strategy

B.

A form of data lake that automates data acquisition and initial data qualityprocessing

C.

A metadata repository

D.

A way of sewing together different data concepts into a single data warehouse

E.

Just another data warehouse with no distinguishing features

Full Access
Question # 61

The second stage of Kotter’s eight stage process is:

A.

Developing a vision and a strategy

B.

Establishing a sense of urgency

C.

Creating short term wins

D.

Creating the guiding coalition

Full Access
Question # 62

An organization will create an uncover valuable Metadata during the process of developing Data Integration and Interoperability solutions.

A.

TRUE

B.

FALSE

Full Access
Question # 63

Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.

A.

TRUE

B.

FALSE

Full Access
Question # 64

A Global ID is the MDM solution-assigned and maintained unique identifier attached to reconciled records.

A.

TRUE

B.

FALSE

Full Access
Question # 65

An enterprise's organisation chart has multiple levels, each with a single reporting

line. This is an example of a:

A.

Ecological taxonomy

B.

Hierarchical taxonomy

C.

Flat taxonomy

D.

Compound taxonomy

E.

Hybrid taxonomy

Full Access
Question # 66

The European Commission Article 29 Data Protection Working Party provides a set of criteria to evaluate anonymization methods. What do they recommend?

A.

It is useful to use small groups because it is not possible to discover the identity of an individual from a small group of individuals.

B.

Datasets that includes individuals occupations as well as demographic information could never be linked to publicly available profiles.

C.

Delete particular types of data to prevent identification of an individual. This is better than masking data.

D.

Anonymity is protected when it is only possible to analyse sizable 'clusters' of individuals who cannot be distinguished from one another based on their attributes.

E.

Use Social Media data because people have already shared their information and do not care about anonymity.

Full Access
Question # 67

Category information is one of the types of data that can be modelled.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Which DMBok knowledge area is most likely responsible for a high percentage of

returned mail?

A.

Data Quality

B.

Reference and Master Data

C.

Data Warchousing and Business Intelligence

D.

Data Integration and Interoperability

E.

Metadata Management

Full Access
Question # 69

An effective team is based on two simple foundations: trust and a common goal.

A.

TRUE

B.

FALSE

Full Access
Question # 70

What is the most critical task for a new Data Governance team?

A.

To begin developing the Business Data Glossary

B.

To identify metrics for data quality issues in the organisation

C.

To define the requirements for technologies to support DG activities

D.

To collate an Information Risk Register

E.

To establish its purpose, process, and measures of team progress

Full Access
Question # 71

Service accounts are convenient because they can tailor enhanced access for the processes that use them.

A.

TRUE

B.

FALSE

Full Access
Question # 72

Key processing steps for MDM include:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Full Access
Question # 73

Please select the 3 visuals that depict DAMA’s Data Management Framework.

A.

The DAMA Octagon

B.

The Knowledge Area Context Diagram

C.

The Data Quality Function Context Diagram

D.

The DAMA Wheel

E.

The Environmental Factors hexagon

Full Access
Question # 74

Enterprise data architecture project-related activities include:

A.

Define maturity assessment

B.

Define scope

C.

Design

D.

Implement

E.

None of the above

F.

All of the above

Full Access
Question # 75

What are the primary drivers of data security activities?

A.

Risk reduction

B.

Risk alleviation

C.

Business growth

D.

Business compliance

Full Access
Question # 76

A ‘Golden Record’ means that it is always a 100% complete and accurate representation of all entities within the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 77

ANSI 859 recommends taking into account the following criteria when determining which control level applies to a data asset:

A.

Need to reuse the asset or earlier versions of the assets

B.

Consequences of change to the enterprise or project

C.

Cost of providing and updating the asset

D.

Project impact, if change will have significant cost or schedule consequences

Full Access
Question # 78

What areas should you consider when constructing an organization's Data Governance operating model?

A.

Cultural factors. Governance strategy will need to advocate for an operating model that fits with organizational culture, while still progressing change

B.

What is their Business Model (decentralized vs. centralized, local vs. international, etc.)

C.

Impact of regulation. Highly regulated organizations will have a different mindset and operating model of Data Governance than those less regulated

D.

All of these

E.

Value of the data to the organization. Is their Data a crucial commodity (do they sell the data)

Full Access
Question # 79

Product Master data can only focus on an organization’s internal product and services.

A.

TRUE

B.

FALSE

Full Access
Question # 80

Security Risks include elements that can compromise a network and/or database.

A.

TRUE

B.

FALSE

Full Access
Question # 81

When measuring the value of data architecture one should be most concerned about

A.

Improved coding efficiency

B.

Project speed

C.

Number of Projects reviewed

D.

Added business value

E.

Cost savings

Full Access
Question # 82

A deliverable in the data architecture context diagram includes an implementation roadmap.

A.

TRUE

B.

FALSE

Full Access
Question # 83

A goal of reference and master data is to provide authoritative source of reconciled and quality-assessed master and reference data.

A.

TRUE

B.

FALSE

Full Access
Question # 84

Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.

A.

TRUE

B.

FALSE

Full Access
Question # 85

Data professionals involved in Business Intelligence, analytics and Data Science are often responsible for data that describes: who people are; what people do; where people live; and how people are treated. The data can be misused and counteract the principles underlying data ethics.

A.

FALSE

B.

TRUE

Full Access
Question # 86

Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.

A.

TRUE

B.

FALSE

Full Access
Question # 87

Which of the following is not a step in the 'document and content management

lifecycle'?

A.

Capture records and content

B.

Manage versions and control

C.

Audit documents and records

D.

Create a content strategy

E.

Manage retention and disposal

Full Access
Question # 88

Advantages if a centralized metadata repository include:

A.

Quick metadata retrieval

B.

None of the above

C.

Combining data from multiple other tables in advance to avoid costly run-time joins

D.

All of the above

E.

High availability

F.

Low latency, since it is independent of the source systems

Full Access
Question # 89

Please select the answers that correctly describes where the costs of poor quality data comes from.

A.

Scrap and rework

B.

Organizational conflict

C.

High job satisfaction

D.

High productivity

E.

Reputational costs

F.

Compliance costs

Full Access
Question # 90

DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.

A.

FALSE

B.

TRUE

Full Access
Question # 91

Data governance program must contribute to the organization by identifying and delivering on specific benefits.

A.

TRUE

B.

FALSE

Full Access
Question # 92

The advantage of a decentralized data governance model over a centralized model is:

A.

The common metadata repository configurations

B.

Having a common approach to resolving data governance issues

C.

The easier implementation of industry data models

D.

An increased level of ownership from local decision making groups

E.

The cheaper execution of data governance operations

Full Access
Question # 93

Which of the following is NOT required to effectively track data quality incidents?

A.

An effective service level agreement with defined rewards and penalties

B.

An assignment process to appropriate individuals and teams

C.

A standard vocabulary for classifying data quality issues

D.

A well defined system of escalation based on the impact, duration, or urgency ofan issue

E.

An operational workflow that ensures effective resolution

Full Access
Question # 94

The operational data quality management procedures depend on the ability to measure and monitor the applicability of data.

A.

FALSE

B.

TRUE

Full Access
Question # 95

A data warehouse deployment with multiple ETL, storage and querying tools often

suffers due to the lack of:

A.

Integration of the dictionaries to achieve common understanding

B.

Conflict between software vendors

C.

Disk space on the big data platform

D.

Quality data modelers

E.

Common data types in the source datasets

Full Access
Question # 96

Governance ensures data is managed, but is not include the actual act of managing data.

A.

TRUE

B.

FALSE

Full Access
Question # 97

The purpose for adding redundancy to a data model (denormalisation) is to:

A.

Make it easier for developers to join tables

B.

Avoid the loss of data by storing key values more than once

C.

Improve aggregate database performance across read requests

D.

Fully utilize all the indexes

E.

Ensure surrogate keys are retaining their unique values in all satellite tables

Full Access
Question # 98

The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.

A.

FALSE

B.

TRUE

Full Access
Question # 99

In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.

A.

FALSE

B.

TRUE

Full Access
Question # 100

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.

A.

FALSE

B.

TRUE

Full Access
Question # 101

Development of goals, principles and policies derived from the data governance strategy will not guide the organization into the desired future state.

A.

FALSE

B.

TRUE

Full Access
Question # 102

The database administrator (DBA) is the most established and the most widely adopted data professional role.

A.

TRUE

B.

FALSE

Full Access
Question # 103

The implementation of a Data Warehouse should follow guiding principles, including:

A.

Data Efficiency

B.

One size does not fit all

C.

Contracts

D.

Focus on the business goals

E.

Start with the end in mind

F.

Collaborate

Full Access
Question # 104

Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?

A.

Each division of an enterprise may have its own way to describe its business and associated metrics

B.

There is disagreement among divisions on the meaning of key metrics

C.

There is typically significant waste in an enterprise through duplication of reports and metrics

D.

Increasing regulation in industry can impose real penalties in terms of substantial fines or jail terms for non-compliance to properly managed data (e.g. accurate reporting/accounting)

E.

I've been to a conference and found that lots of our competitors are doing it

Full Access
Question # 105

Orchestration is the term used to describe how multiple processes are organized and executed in a system.

A.

TRUE

B.

FALSE

Full Access
Question # 106

Reference and Master Data Management follow these guiding principles:

A.

Quality

B.

Stewardship

C.

Authority

D.

Ownership

E.

Exclusivity

F.

Inclusivity

Full Access
Question # 107

An image processing system captures, transforms and manages images of paper and electronic documents.

A.

TRUE

B.

FALSE

Full Access
Question # 108

Data Governance includes developing alignment of the data management approach with organizational touchpoints outside of the direct authority of the Chief Data Officer. Select the example of such a touchpoint.

A.

Content Management

B.

Requirements

C.

Business Glossary

D.

Records Management

E.

Regulatory Compliance

Full Access
Question # 109

Compound authorization groups provide a means to:

A.

Effectively prepare for data security audits

B.

Distract the data security officer

C.

Encrypt sensitive transmissions of data

D.

Precisely configure an individual's access to a system

E.

Obfuscate a user's actual access to a system

Full Access
Question # 110

Business Intelligence, among other things, refer to the technology that supports this kind of analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 111

Data modeller: responsible for fata model version control an change control

A.

TRUE

B.

FALSE

Full Access
Question # 112

Data Stewards are most likely to be responsible for:

A.

Data Modelling and Data Security

B.

Data Integration and Interoperability

C.

Data Storage and Operations

D.

Content and Document Management

E.

Data Governance and Data Quality

Full Access
Question # 113

Instant Messaging (IM) allows a user to message each other in real-time.

A.

TRUE

B.

FALSE

Full Access
Question # 114

An effective Data Governance communication program should include the following:

A.

All of these

B.

A Data Governance Portal

C.

Events that encourage informal networking

D.

A custom training program

E.

Regular newsletters

Full Access
Question # 115

In a data warehouse, where the classification lists for organisation type are

inconsistent in different source systems, there is an indication that there is a lack of

focus on:

A.

Metadata Management

B.

Data Storage

C.

Data Modelling

D.

Master Data

E.

Reference data

Full Access
Question # 116

Deliverables in the data management maturity assessment context diagram include:

A.

Maturity baseline

B.

Roadmap

C.

Executive briefings

D.

Recommendations

E.

Risk assessment

F.

Ratings and ranks

Full Access
Question # 117

The best way to validate that a database backup is working, is to:

A.

Periodically recover from the backup file

B.

Appoint a special DBA in charge of backups

C.

Check the size of the backup file

D.

Check the backup logs every day

E.

Check for the automatic email notification of backup success

Full Access
Question # 118

Metadata is described using three sets od categories, including:

A.

Structural Metadata

B.

Descriptive Metadata

C.

Generic Metadata

D.

Administrative metadata

E.

Conceptual Metadata

Full Access
Question # 119

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:

A.

Regulatory compliance

B.

Data quality improvements

C.

Metadata management

D.

Efficiency in development projects

E.

Vendor management

F.

All of the above

Full Access
Question # 120

When it comes to Data Governance, what does the Operations Plan include?

A.

The list of events required to implement and operate Data Governance activities

B.

A risk assessment for the enterprise

C.

The types of enterprise operations that need Data Governance

D.

The metrics needed for each department within the organization

E.

The list of activities the Data Stewards will follow to define the data

Full Access
Question # 121

Gathering and interpreting results from a DMM or Data Governance assessment are important because:

A.

Lack of results gathered can indicate a lack of assessment performance

B.

The assessments are done by different teams within the organization and may have different results

C.

Interpreting these results is difficult

D.

Data Management and Data Governance results are gathered and interpreted differently, depending on the organization being evaluated

E.

Performing these activities objectively can ensure the success of the assessment and affect the acceptance and implementation of the data management and/or Data Governance program

Full Access
Question # 122

Within each area of consideration mentioned in question 13, they should address morale adversity as per Ethical Risk Model for Sampling Projects.

A.

FALSE

B.

TRUE

Full Access
Question # 123

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.

A.

TRUE

B.

FALSE

Full Access
Question # 124

Communication should start later in the process as too many inputs will distort the vision.

A.

TRUE

B.

FALSE

Full Access
Question # 125

Principles for data asset accounting include:

A.

Accounting Principle

B.

Due Diligence Principle

C.

Asset Principle

D.

Audit Principle

E.

Going Concern Principle

F.

All of the above

Full Access
Question # 126

Data mining is a sub-field of supervised learning where users attempt to model data elements and predict future outcomes through the evaluation of probability estimates.

A.

TRUE

B.

FALSE

Full Access
Question # 127

Three data governance operating models types include:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Full Access
Question # 128

Enterprise service buses (ESB) are the data integration solution for near real-time sharing of data between many systems, where the hub is a virtual concept of the standard format or the canonical model for sharing data in the organization.

A.

FALSE

B.

TRUE

Full Access
Question # 129

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Full Access
Question # 130

In the Information Management Lifecycle, the Data Governance Activity "Define the Data Governance Framework" is considered in which Lifecycle stage?

A.

Create & Acquire

B.

Maintain & Use

C.

Specify

D.

Enable

E.

Plan

Full Access
Question # 131

The best preventative action to prevent poor quality data from entering an organisation include:

A.

Institute a formal change control

B.

Define and enforce rules

C.

Implement data governance and stewardship

D.

None of the above

E.

Train data procedures

F.

Establish data entry controls

Full Access
Question # 132

Which of the following are must-do for any successful Data Governance programme?

A.

Create a communications plan to inform to all stakeholders what you are doing.

B.

Ensure there is a Data Governance Policy with which everyone in the organization is required to comply.

C.

Create a training programme for all for data owners and data stewards.

D.

Set up a wiki for incorrect data definitions.

E.

Allocate Data Ownership responsibilities according to their role in the organization.

Full Access
Question # 133

What key components must be included in the Implementation Roadmap?

A.

Timeframes and resources for data quality requirements, policies and directives and testing standards

B.

Data metrics, physical data structures, and data model designs

C.

Timeframes and resources for Policies and Directives, a Business Glossary Architecture, Business and IT processes and role descriptions

D.

Testing requirements, risk assessment, data security and privacy policies and database design

E.

Timeframes and resources for policies and directives Architecture, Tools and Control Metrics

Full Access
Question # 134

Corrective actions are implemented after a problem has occurred and been detected.

A.

FALSE

B.

TRUE

Full Access
Question # 135

Data and text mining use a range of techniques, including:

A.

Profiling

B.

Application reduction

C.

Association

D.

Data reduction

E.

Clustering

F.

All of the above

Full Access
Question # 136

The better an organization understands the lifecycle and lineage of its data, the better able it will be to manage its data. Please select correct implication of the focus of data management on the data lifecycle.

A.

Data Quality must be managed throughout the data lifecycle

B.

Data Security must only be managed at the start of the data lifecycle

C.

Metadata Quality is the most important part of the management process

D.

Data Management efforts should focus on the most critical data last

Full Access
Question # 137

The failure to gain acceptance of a business glossary may be due to ineffective:

A.

Metadata Management

B.

Business Architecture

C.

Content and Document Management

D.

Data Governance

E.

Data Security

Full Access
Question # 138

Class operations can be:

A.

General: Hidden

B.

Public: Externally visible

C.

Internally visible: Visible to children objects

D.

Private: Hidden

Full Access
Question # 139

A change management program supporting Data Governance should focus communication on what?

A.

Promoting the value of its data assets, monitor and act on feedback about Data Governance activities & implement data management training programs.

B.

Promote the value of its data assets

C.

Show the value of data stewardship & implement data management training program

D.

How many errors are in each of the various department's data

E.

Implement a data management training program and create a data dictionary

Full Access
Question # 140

Corporate Information Factory (CIF) components include:

A.

Data marts

B.

Objectives

C.

Operational Reports

D.

Reduction of risk

E.

Staging Area

F.

Contributions to business objectives

Full Access
Question # 141

Data and enterprise architecture deal with complexity from two viewpoints:

A.

None of the above

B.

Implementation-orientated

C.

Quality-orientated

D.

Architecture-orientated

E.

Innovation-orientated

F.

Industry-orientated

Full Access
Question # 142

A lineage data tool provides:

A.

Scope for reporting requirements

B.

A temporal distortion of data values across systems

C.

The capture and maintenance of source structures for each attribute on the datamodel

D.

Ancestral origin of data DNA

E.

A clean line between columns in the same entity

Full Access
Question # 143

In gathering requirements for DW/BI projects, begin with the data goals and strategies first.

A.

TRUE

B.

FALSE

Full Access
Question # 144

Data can be assessed based on whether it is required by:

A.

Regulatory reporting

B.

Capturing policy

C.

Ongoing operations

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Business policy

F.

Make the integration between data management and data analytics possible

Full Access
Question # 145

Which of the following answers best describes an Active Data Dictionary?

A.

A dictionary that is active 24 hours a day

B.

Any data dictionary is considered active because it has codes and values used in the enterprise

C.

An integrated dictionary that is managed automatically by the database management system software

D.

A dictionary that allows users to enter data in an 'active' or open manner

E.

A dictionary that can be activated by the metadata team

Full Access
Question # 146

Two risks with the Matching process are:

A.

False positives

B.

False Certainties

C.

False Negatives

D.

False Uncertainties

Full Access
Question # 147

Uniqueness, as a dimension of data quality, states no entity exists more than once within the data set.

A.

TRUE

B.

FALSE

Full Access
Question # 148

One of the percentages to measure success of a records management system implantation is the percentage of the identified corporate records declared as such and put under records control.

A.

FALSE

B.

TRUE

Full Access
Question # 149

With reliable Metadata an organization does not know what data it has, what the data represents and how it moves through the systems, who has access to it, or what it means for the data to be of high quality.

A.

TRUE

B.

FALSE

Full Access
Question # 150

Data replication is useful as it provides:

A.

The ability to spread the workload across multiple databases

B.

Opportunities to secure sensitive data

C.

An alternative to backups

D.

Enables different table structures to be built

E.

Insights into customer retention

Full Access
Question # 151

Please select the correct name for the LDM abbreviation

A.

Logical Data Model

B.

Logical Dimensional Model

C.

Lifecycle Data Model

D.

Lifecycle Dimensional Model

Full Access
Question # 152

Metadata management solutions include architectural layers including:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Full Access
Question # 153

A complexity in documenting data lineage is:

A.

Establishing data quality metrics

B.

Conflicting application requirements from data owners

C.

Choosing which content management software to use

D.

Identifying source databases

E.

Different data element names and formats

Full Access
Question # 154

A data architecture team is best described as:

A.

A group of strong database administrators

B.

A strategic planning and compliance team

C.

An operational data provisioning group

D.

The authors of reference data

E.

A well-managed project of architectural development

Full Access
Question # 155

Please select valid modelling schemes or notations

A.

NoSQL

B.

Dimensional

C.

Relational

D.

Object-orientated

E.

Fact-based

F.

Matrix-based

Full Access
Question # 156

Data governance and IT governance are the same thing.

A.

TRUE

B.

FALSE

Full Access
Question # 157

Database monitoring tools measure key database metrics, such as:

A.

Capacity, availability, backup instances, data quality

B.

Capacity, design, normalization, user access

C.

Create, read, update, delete

D.

Create, read, normalization, user access

E.

Capacity, availability, cache performance, user statistics

Full Access
Question # 158

The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:

A.

Level 2 In Development

B.

Level 4 Proactive

C.

Level 2 Sub-standard

D.

Level 4 Proactive

E.

Level 3 Transformational

F.

Level 3 Essential

Full Access
Question # 159

The deliverables in the data architecture context diagram include:

A.

Data flows

B.

Enterprise data

C.

Implementation roadmap

D.

Data Value Chains

E.

None of the above

F.

All of the above

Full Access
Question # 160

Data profiling examples include:

A.

Counts of null

B.

Max/Min value

C.

Max/Min length

D.

Frequency distribution

E.

Data type and format

F.

None of the above

Full Access
Question # 161

Content needs to be modular, structured, reusable and device and platform independent.

A.

TRUE

B.

FALSE

Full Access
Question # 162

When recovering from multiple system failures, what is the biggest difficulty faced

by a DBA?

A.

Determining where the corrupt pages exist in the database file system

B.

Determining what point to recover to using backups taken at different points intime

C.

Reseting active directory to reapply the security policies

D.

Organising for the tapes to be delivered to the main data center

E.

Determining what version of the DBMS to recover - considering incrementalPatches

Full Access
Question # 163

Which of the following is NOT a goal of Data Quality?

A.

Identify and advocate for opportunities to improve the quality of data, throughprocess and system improvements

B.

Define standards, requirements, and specifications for data quality controls aspart of thedata lifecycle.

C.

Develop a governed approach to make data fit for purpose based on dataconsumers" requirements

D.

Define and implement processes to measure, monitor, and report on data qualitylevels

E.

Understand and comply with all relevant regulations and policies for privacy.protection, and confidentiality

Full Access
Question # 164

When starting a Data Governance initiative it is important to understand what the Business cannot achieve due to data issues because:

A.

It is important to understand the data quality issues that will need to be addressed

B.

Unless you correctly identify the most important business stakeholders it is harder to sustain political buy-in to Data Governance

C.

It is essential to identify key stakeholders so you can sell your vision of Data Governance to them

D.

Change management creates a sense of dissatisfaction.

E.

Aligning Data Governance with actual business needs makes it easier to communicate the vision and value of Data Governance

Full Access
Question # 165

It is recommended that organizations not print their business data glossaries for general use, why would you not want to print the glossary?

A.

Because there is so much data in an organization's glossary that the report would be too big to handle

B.

Because the glossary contains trade 'secrets' that the organization wants to protect

C.

Because industry rules and regulation should not be printed because they vary by State

D.

Because the data is not static but is being updated by stewards as they add new fields and definitions

E.

Because the data is confidential and should not be given out in printed form

Full Access
Question # 166

Traditional tool sin data visualtization have both a data and a graphical component. Advanced visualization and discovery tools use in-memory architecture to allow users to interact with the data.

A.

TRUE

B.

FALSE

Full Access
Question # 167

The goals of Data Integration and Interoperability include:

A.

Provide data securely, with regulatory compliance, in the format and timeframe needed.

B.

Lower cost and complexity of managing solutions by developing shared models and interfaces.

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Identify meaningful events and automatically trigger alerts and actions.

F.

Support business intelligence, analytics, master data management and operational efficiency efforts.

Full Access
Question # 168

One of the deliverables in the Data Integration and Interoperability context diagram is:

A.

Data Integration and Interoperability Strategy

B.

Data hogging

C.

Data access agreements

D.

Data security plan

Full Access
Question # 169

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

A.

TRUE

B.

FALSE

Full Access
Question # 170

Master data management includes several basic steps, which include: Develop rules for accurately matching and merging entity instances.

A.

TRUE

B.

FALSE

Full Access
Question # 171

An application DBA leads the review and administration of procedural database objects.

A.

TRUE

B.

FALSE

Full Access
Question # 172

BI tool types include:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

Full Access
Question # 173

All DMM and Data Governance assessments should identify its objectives and goals for improvement. This is important because:

A.

There is always room for improvement

B.

An assessment without goals and objectives will not have a conclusion

C.

The assessment team has to be aware of the objectives to be successful

D.

Data management and Data Governance assessments have different goals and objectives

E.

Assessment objectives start at the business drivers (for funding), goals to describe focus, and objectives to provide specific expectations and criteria for evaluation for success

Full Access
Question # 174

ECM is an abbreviation for:

A.

Enterprise compliance management

B.

Enterprise compliance manager

C.

Enterprise component management

D.

Enterprise content management

Full Access
Question # 175

A limitation of the centralized approach include: Maintenance of a decentralized repository is costly.

A.

TRUE

B.

FALSE

Full Access
Question # 176

What area do you not consider when developing a 'Data Governance operating model?

A.

Impact of regulation

B.

Cultural factors - such as acceptance of discipline and adaptability to change

C.

The availability of industry data models

D.

The business model - decentralised versus centralised

E.

The value of data to the organization

Full Access
Question # 177

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Full Access
Question # 178

A roadmap for enterprise data architecture describes the architecture’s 3 to 5-year development path. The roadmap should be guided by a data management maturity assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 179

The flow of data in a data integration solution does not have to be designed and documented.

A.

TRUE

B.

FALSE

Full Access
Question # 180

What are the components of a Data Governance Readiness Assessment?

A.

Assess best practices, data metrics, and data quality

B.

Compliance to internal standards, Data Security, Data Privacy rules

C.

Data Management Maturity, Capacity to Change, Collaborative Readiness and Business Alignment

D.

Capacity to change, Establish standards. Data Quality skills, Data Stewardship productivity

E.

Capacity to change, Establish Stewardship, Business Alignment and Metadata Repository

Full Access
Question # 181

When assessing security risks it is required to evaluate each system for the following:

A.

The current security protections in place

B.

The requirements to protect the data

C.

None of the above

D.

All of the above

E.

The complexity of the data stored or in transit

F.

The sensitivity of the data stored or in transit

Full Access
Question # 182

The goals of Metadata management include:

A.

Managing performance of data assets

B.

Ensure metadata quality, consistency, currency and security

C.

Managing the availability of data throughout the data lifecycle

D.

Provide standard ways to make metadata accessible to metadata consumers

E.

Managing the performance of data transactions

F.

Establish or enforce the use of technical Metadata standards to enable data exchange

Full Access
Question # 183

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

A.

TRUE

B.

FALSE

Full Access
Question # 184
A.

FALSE

B.

TRUE

Full Access
Question # 185

Some ways to measure value of data include:

A.

Replacement cost

B.

Market value

C.

Selling Data

D.

Risk cost

E.

Identified opportunities

F.

All of the above

Full Access
Question # 186

Because Data Governance activities require coordination across functional areas, the DG program must establish an ___________ that defines accountabilities and intersections.

A.

Alliance

B.

Operating framework

C.

Organization

D.

Enterprise-wide coalition

E.

Architecture framework

Full Access
Question # 187

What is the best definition of Crowdsourced data collection?

A.

Crowdsourcing should not be used to gather data because there will be too many opinions and not enough facts

B.

Crowdsourcing is the process of obtaining needed data by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers  

C.

Crowdsourced data is the best way of finding data because so many people are contributing their definitions

D.

Crowdsourced data is the data that comes from using a company wiki to gather data because anyone in the crowd can contribute

E.

Crowdsourced data collection is only used by researchers to answer research, survey or feedback questions

Full Access
Question # 188

SOA stand for Service Orchestrated Architecture

A.

TRUE

B.

FALSE

Full Access
Question # 189

Improving an organization’s ethical behaviour requires an informal Organizational Change Management (OCM) process.

A.

TRUE

B.

FALSE

Full Access
Question # 190

The repeated implementation of different CRM technologies with different data

structures is mostly a failure of:

A.

Data security

B.

Data modelling

C.

Data architecture

D.

Data warehousing

E.

Data quality

Full Access
Question # 191

Volume refers to the amount of data. Big Data often has thousands of entities or elements in billions of records.

A.

TRUE

B.

FALSE

Full Access
Question # 192

Which of these is not a goal of Data Governance and Stewardship?

A.

Define, approve, communicate, and implement principles, policies, procedures, metrics, tools, and responsibilities for data management

B.

Monitor and guide policy compliance, data usage, and management activities

C.

Help the data modelers to use data elements that have gone through Data Governance processes

D.

Enable an organization to manage its data as an asset

E.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Full Access
Question # 193

Change Data Capture is a method of reducing bandwidth by filtering to include only data that has been changed within a defined timeframe.

A.

TRUE

B.

FALSE

Full Access
Question # 194

CIF stands for:

A.

Company Information Factory

B.

Corporate Information Floor

C.

Corporate Information Factories

D.

Corporate Information Factory

Full Access
Question # 195

Data architects facilitate alignment between [1] and [2]

A.

[1] Business and [2] IT

B.

[1] Technology and [2] Data

C.

[1] Governance and [2] Management

D.

[1] Strategy and [2] Execution

Full Access
Question # 196

Data replication has two dimensions of scaling: diagonal and lateral

A.

FALSE

B.

TRUE

Full Access
Question # 197

A business driver for Master Data Management program is managing data quality.

A.

TRUE

B.

FALSE

Full Access
Question # 198

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

A.

FALSE

B.

TRUE

Full Access
Question # 199

Through similarity analysis, slight variation in data can be recognized and data values can be consolidated. Two basic approaches, which can be used together, are:

A.

Realistic

B.

Opportunistic

C.

Deterministic

D.

Probabilistic

E.

Procedural

F.

All of the above

Full Access