Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

DMF-1220 Questions and Answers

Question # 6

A limitation of the centralized approach include: Maintenance of a decentralized repository is costly.

A.

TRUE

B.

FALSE

Full Access
Question # 7

Please select the answers that correctly describes the set of principles that recognizes salient features of data management and guide data management practice.

A.

Data is an asset with unique properties.

B.

It takes Metadata to manage data.

C.

The most important part of data management is security.

D.

Data management is lifecycle management.

E.

Effective data management requires leadership commitment.

F.

Efficient data management requires a team of IT professionals only.

Full Access
Question # 8

Assessment criteria are broken into levels, and most capability maturity models use five (5) levels. This is important since:

A.

It is not important how many levels there are; vendors do this to show they have a complex model

B.

Each capability level will have specific criteria associated with its completion. To move to the next higher level, all the capabilities of the current level must be satisfied

C.

Each capability is separate, so each level represents a separate stage in development

D.

Assessments are difficult and breaking them into levels makes them more difficult to perform

E.

The organization must be able to manage each criterion, and breaking them into levels is the only way to do that

Full Access
Question # 9

Key processing steps for MDM include:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Full Access
Question # 10

The loading of country codes into a CRM is a classic:

A.

Reference data integration

B.

Fact data integration

C.

Master data integration

D.

Analytics data integration

E.

Transaction data integration

Full Access
Question # 11

A sandbox environment can either be a sub-set of the production system, walled off from production processing or a completely separate environment.

A.

TRUE

B.

FALSE

Full Access
Question # 12

An organization can enhance its Data Governance program and thereby improve its approach to enterprise data management. This is important for the following reason:

A.

Since most organizations start Data Governance in silos and not at the enterprise level, it is important to be able to assess current state and determine desired targeted state that supports the overall vision

B.

Often organizations have a data repository or dictionary that is just as good as Data Governance

C.

Data Governance programs are rarely enhanced once they are launched

D.

Assessing current state for Data Governance may not tell the organization the current state of other components

E.

Starting a Data Governance program does not require that the organization start a data management program

Full Access
Question # 13

In the Abate Information Triangle the past moves through the following echelons befor it comes insight:

A.

Data

B.

Information

C.

Transactions

D.

Knowledge

E.

Big data

F.

Time

Full Access
Question # 14

The steps followed in managing data issues include:

A.

Standardization, Allocation, Assignment, and Correction

B.

Standardization, Explanation, Ownership, and Completion

C.

Read, Guess, Code, Release

D.

Standardization, Assignment, Escalation, and Completion

E.

Escalation, Review, Allocation and Completion

Full Access
Question # 15

The flow of data in a data integration solution does not have to be designed and documented.

A.

TRUE

B.

FALSE

Full Access
Question # 16

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Malware types include:

A.

Trojan horse

B.

Worm

C.

Weasel

D.

Virus

E.

Adware

F.

Camware

Full Access
Question # 18

A DMZ is bordered by 2 firewalls. These are between the DMZ and the:

A.

Internet, for added security

B.

Korean peninsula

C.

Internet and internal systems

D.

Internet and intranet

E.

Internet and extranet

Full Access
Question # 19

Data Storage and Operations: The design, implementation and support of stored data to maximize its value.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Oversight for the appropriate handling of data falls under both Data Governance and Legal Counsel. What are they NOT required to do?

A.

Data Governance and Legal Counsel are required to reduce the risk of ethical impropriety by making sure employees know of their obligations

B.

Data Governance must set standards and policies for and provide insight of data handling practices

C.

Data Governance is required to review plans and decisions proposed by Business Intelligence, Analytics, and Data Science studies

D.

Data Governance and Legal Counsel are required to keep up-to-date on legal changes

E.

Legal Counsel is required to audit their organizations on ethical compliance

Full Access
Question # 21

Examples of business processes when constructing data flow diagrams include:

A.

Order Management

B.

Marketing & Sales

C.

Sales order

D.

Invoicing

E.

Product Development

F.

Customer

Full Access
Question # 22

Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Which of these is not a goal of Data Governance and Stewardship?

A.

Define, approve, communicate, and implement principles, policies, procedures, metrics, tools, and responsibilities for data management

B.

Monitor and guide policy compliance, data usage, and management activities

C.

Help the data modelers to use data elements that have gone through Data Governance processes

D.

Enable an organization to manage its data as an asset

E.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Full Access
Question # 24

XML is the abbreviation for standard mark-up language.

A.

FALSE

B.

TRUE

Full Access
Question # 25

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Full Access
Question # 26

Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.

A.

FALSE

B.

TRUE

Full Access
Question # 27

Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:

A.

Each type of stakeholder may need a different form of interaction, and each process evaluation may lend itself to a different form of information gathering

B.

Data management and Data Governance assessments will have different types of stakeholders

C.

The definition of stakeholder interaction depends on the executive sponsor

D.

Assessment teams may not know what a stakeholder is

E.

Each type of stakeholder may need a different form of data and security

Full Access
Question # 28

Data warehouses are often loaded and serviced by a nightly batch window.

A.

FALSE

B.

TRUE

Full Access
Question # 29

Metadata is described using a different set of categories, not including:

A.

Descriptive metadata

B.

Database metadata

C.

Structural metadata

D.

Administrative metadata

Full Access
Question # 30

An application DBA leads the review and administration of procedural database objects.

A.

TRUE

B.

FALSE

Full Access
Question # 31

Operational reports are outputs from the data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 32

One of the first steps in a master data management program is to:

A.

Decommission similar data collection systems

B.

Review data security protocols

C.

Secure funding for 20 years of operations

D.

Build multiple data marts

E.

Evaluate and assess data sources

Full Access
Question # 33

An effective team is based on two simple foundations: trust and a common goal.

A.

TRUE

B.

FALSE

Full Access
Question # 34

Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Emergency contact phone number would be found in which master data

management program?

A.

Location

B.

Asset

C.

Service

D.

Employee

E.

Product

Full Access
Question # 36

An information maturity assessment provides a valuable input to Data Governance planning because it provides:

A.

An assessment of the ability of the organization to utilize data and information in an advanced manner

B.

A benchmark against the organization's peers to drive dissatisfaction with current state among senior leadership

C.

A detailed roadmap for information management related change in the organization

D.

It identifies key weaknesses in the Information Strategy of the organization which impede good governance

E.

Stakeholders require a visual representation in graphical form of their current state versus target state

Full Access
Question # 37

Reduced risk is a benefit of high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 38

Please select the transition phases in Bridges’ Transition process:

A.

The neutral zone

B.

The new beginning

C.

The ending

D.

The transition

E.

The translation

F.

The game

Full Access
Question # 39

Open by default' document control will assist data sharing by:

A.

Allocating more metadata to each document

B.

Automatically opening the document when it is selected on the desktop

C.

Keeping the documents open on the desktop ready for use

D.

Setting the security to shared unless overwritten

E.

Automatically moving the data to the warehouse where everybody can access it

Full Access
Question # 40

Data profiling also includes cross-column analysis, which can identify overlapping or duplicate columns and expose embedded value dependencies.

A.

TRUE

B.

FALSE

Full Access
Question # 41

Within projects, conceptual data modelling and logical data modelling are part of requirements planning and analysis activities, while physical data modelling is a design activity.

A.

TRUE

B.

FALSE

Full Access
Question # 42

A completely distributed architecture maintains a single access point. The metadata retrieval engine responds to user requests by retrieving data from source systems in real time.

A.

FALSE

B.

TRUE

Full Access
Question # 43

Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.

A.

Purpose Limitation

B.

Data Minimisation

C.

Accuracy

D.

Storage Limitation

E.

Accountability

F.

All of the above

Full Access
Question # 44

You are a reporting Data Analyst. A new Management Report has been requested. What is the most effective way to ensure you receive the appropriate data at the correct level of accuracy to meet the business need?

A.

Hold a meeting to understand the timelines of when data will be provided

B.

Supply a detailed definition document which includes timelines, data requirements, calculation details, etc

C.

Supply a detailed definition template document and request completion by relevant managers

D.

Send a general email to the manager of the department(s)

E.

Write a general definitions statement describing conceptually what is required

Full Access
Question # 45

Data governance program must contribute to the organization by identifying and delivering on specific benefits.

A.

TRUE

B.

FALSE

Full Access
Question # 46

Organizations should evaluate several maturity assessment models for data management, and for Data Governance, before adopting one or before developing a custom maturity assessment model because:

A.

Choosing a maturity model for an organization is expensive

B.

Vendors may go out of business so organizations need to choose wisely

C.

Performing an assessment without evaluating multiple models does not provide the organization with the ability to use the easiest model

D.

Each maturity model is flawed and the organization must find the flaws and work around them

E.

Each DMMM is based on a specific approach and needs to align with an organization's needs

Full Access
Question # 47

What position is responsible for the quality and use of their organization's data

assets?

A.

Data Architect

B.

Data Steward

C.

Data Scientist

D.

Chief Information Officer

E.

Data Modeler

Full Access
Question # 48

Examples of the ‘Who’ entity category include: employee; patient; player; and suspect.

A.

TRUE

B.

FALSE

Full Access
Question # 49

The purpose of data governance is to ensure that data is managed properly, according to policies and best practices. Data governance is focused on how decisions are made about data and how people and processes are expected to behave in relation to data.

A.

TRUE

B.

FALSE

Full Access
Question # 50

Poorly managed metadata leads to:

A.

Row-orientated metadata

B.

Graph metadata issues

C.

Redundant data and data management processes

D.

Doubt about the reliability of metadata and data

E.

Redundant master data

F.

Document inefficiencies

Full Access
Question # 51

Input in the Big Data and data science context diagram include:

A.

IT standards

B.

Data sources

C.

Business strategy & goals

D.

Database standards

Full Access
Question # 52

Architects seek to design in a way that brings value to an organisation. To reach these goals, data architects define and maintain specifications that:

A.

Align data architecture with enterprise strategy and business architecture

B.

Provide a standard business vocabulary for data and components

C.

Outline high-level integrated designs to meet these requirements.

D.

Integrate with overall enterprise architecture roadmap

E.

Define the current state of data in the organization.

F.

Express strategic data requirements

Full Access
Question # 53

Advantages if a centralized metadata repository include:

A.

Quick metadata retrieval

B.

None of the above

C.

Combining data from multiple other tables in advance to avoid costly run-time joins

D.

All of the above

E.

High availability

F.

Low latency, since it is independent of the source systems

Full Access
Question # 54

Which Data Architecture Artifact describes how data transforms into business

assets?

A.

Implementation Roadmap

B.

Data Value Chain

C.

Master Data Models

D.

Business Value Chains

E.

Data Flows

Full Access
Question # 55

Resource Description Framework (RDF), a common framework used to describe information about any Web resource, is a standard model for data interchange in the Web.

A.

FALSE

B.

TRUE

Full Access
Question # 56

The goal of Data Governance is to enable an organization to manage data as an asset. To achieve this overall goal, a DG program must be:

A.

Modeled, sanctioned and readable

B.

Eloquent, transformative and explicit

C.

Horizontal, vertical and fluid

D.

Sustainable, embedded and measured

E.

Visionary, vertical and vivid

Full Access
Question # 57

Business Intelligence, among other things, refer to the technology that supports this kind of analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 58

Several global regulations have significant implications on data management practices. Examples include:

A.

BCBS 239

B.

Data Standards

C.

Privacy laws

D.

Effectiveness of education Standards

E.

SPCA

F.

PCI-DSS

Full Access
Question # 59

What business function is best aligned to deliver oversight to data architecture ?

A.

Data Govemance

B.

Business Innovation

C.

Business Integration

D.

Chief Technology Office

E.

Enterprise Architecture

Full Access
Question # 60

A goal of data architecture is to identify data storage and processing requirements.

A.

TRUE

B.

FALSE

Full Access
Question # 61

Dimensions of data quality include:

A.

Validity

B.

Privacy

C.

Innovation

D.

Accessibility

E.

Currency

F.

All of the above

Full Access
Question # 62

Which DMBok knowledge area is most likely responsible for a high percentage of

returned mail?

A.

Data Quality

B.

Reference and Master Data

C.

Data Warchousing and Business Intelligence

D.

Data Integration and Interoperability

E.

Metadata Management

Full Access
Question # 63

How does the DMBOK refer to an organization that values data as an asset and manages data through all phases of its lifecycle?

A.

A Data integration organization

B.

A Data support organization

C.

A Data-driven organization

D.

A Data-centric organization

E.

A Data management organization

Full Access
Question # 64

A goal of reference and master data is to provide authoritative source of reconciled and quality-assessed master and reference data.

A.

TRUE

B.

FALSE

Full Access
Question # 65

Changes to reference data do not need to be management, only metadata should be managed.

A.

TRUE

B.

FALSE

Full Access
Question # 66

Do experts feel a Data Lake needs data management?

A.

No, metadata might keep sensitive data out of the data lake, and analysts need all the data

B.

Yes, metadata in a data lake prevents synchronization issues by providing both current state and history

C.

Yes, metadata creates an inventory of the data as it is ingested into the data lake

D.

No, a data lake should contain all the data whether it is inconsistent or not, otherwise data scientists don’t have full insight into the data

E.

No, a data lake should ingest streaming data without any restrictions

Full Access
Question # 67

ETL is the basic process which is central to all areas in Data Integration and Interoperability. It is an abbreviation for extract, transition and load.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Please select the three types of data models:

A.

Innovative Data Model

B.

Logical Data Model

C.

Dimensional Data model

D.

Conceptual Data Model

E.

Idea Data Model

F.

Physical Data Model

Full Access
Question # 69

The business glossary application is structured to meet the functional requirements of the three core audiences:

A.

Data users

B.

Application users

C.

Innovation users

D.

Business users

E.

Data stewards

F.

Technical users

Full Access
Question # 70

Modeling Bid data is a non-technical challenge but critical if an organization that want to describe and govern its data.

A.

TRUE

B.

FALSE

Full Access
Question # 71

Data quality rules and standards are a critical form of Metadata. Ti be effective they need to be managed as Metadata. Rules include:

A.

None of the above

B.

Tied to business impact

C.

Document consistency

D.

Accessible to all data customers

E.

Hierarchical consistency

F.

Confirmed by SMEs

Full Access
Question # 72

The second stage of Kotter’s eight stage process is:

A.

Developing a vision and a strategy

B.

Establishing a sense of urgency

C.

Creating short term wins

D.

Creating the guiding coalition

Full Access
Question # 73

The Belmont principles that may be adapted for Information Management disciplines, include:

A.

Respect for Persons

B.

Respect for Machines

C.

Beneficence

D.

Criminality

E.

Justice

Full Access
Question # 74

People often incorrectly combine the concepts of data management and information technology into one. Which of the following is NOT an example of this?

A.

A significant focus on identity in the call centre has reduced duplication by 50%

B.

The rollout of reporting corrections has been delayed by the Big Data Project

C.

The migration of customer data to a new platform failed to reduce the amount of returned mail

D.

Collaboration will be improved by the new document management system

E.

The delivery of the DG portal is critical to achieving any benefits of Data Governance

Full Access
Question # 75

Most people who work with data know that it is possible to use data to misrepresent facts. Which of the following is NOT a way in which data is used to misrepresent facts?

A.

Data collected with bias to prove a pre-conceived idea is correct

B.

Leaving out required context in a report resulting in ambiguity and assumptions being made about the data points

C.

Omission or inclusion of certain data points in a report or activity based on timing

D.

Providing transparency on the sources, uses, and intent of the data used in a report

E.

Leaving out the relationship between data points in a chart

Full Access
Question # 76

The TOGAF framework does NOT include a(n):

A.

Business focus

B.

Enterprise continuum approach

C.

Metamodel

D.

Methods

E.

Maturity model

Full Access
Question # 77

Compound authorization groups provide a means to:

A.

Effectively prepare for data security audits

B.

Distract the data security officer

C.

Encrypt sensitive transmissions of data

D.

Precisely configure an individual's access to a system

E.

Obfuscate a user's actual access to a system

Full Access
Question # 78

The library of Alexandria was one of the largest collection of books in the ancient

world. Which DMBoK knowledge area is most aligned with managing the collection?

A.

Data Integration and Interoperability

B.

Reference and Master Data

C.

Data Security

D.

Document and Content Management

E.

Data Govemance

Full Access
Question # 79

When recovering from multiple system failures, what is the biggest difficulty faced

by a DBA?

A.

Determining where the corrupt pages exist in the database file system

B.

Determining what point to recover to using backups taken at different points intime

C.

Reseting active directory to reapply the security policies

D.

Organising for the tapes to be delivered to the main data center

E.

Determining what version of the DBMS to recover - considering incrementalPatches

Full Access
Question # 80

E-discovery is the process of finding electronic records that might serve as evidence in a legal action.

A.

TRUE

B.

FALSE

Full Access
Question # 81

Achieving security risk reduction in an organisation begins with developing what?

A.

A change management model, prioritising security changes and then updatingthe active directory

B.

An enterprise data model, rolling out data flow diagrams and enbedding securityinto the database

C.

A security model, classifying each organisational role and putting the physicaldata behind a firewall

D.

A classification model, classifying each data concept and locating the physicaldata

E.

A metadata model, locating the data and moving it into the metadata repository

Full Access
Question # 82

The repeated implementation of different CRM technologies with different data

structures is mostly a failure of:

A.

Data security

B.

Data modelling

C.

Data architecture

D.

Data warehousing

E.

Data quality

Full Access
Question # 83

What are the three qualities of an effective Data Governance function?

A.

Optimism, objective, sustainable

B.

Sustainable, embedded, measured

C.

Measured, objective, embedded

D.

Embedded, systematic, sustainable

E.

Sustainable, realistic, embedded

Full Access
Question # 84

One of the deliverables in the Data Integration and Interoperability context diagram is:

A.

Data Integration and Interoperability Strategy

B.

Data hogging

C.

Data access agreements

D.

Data security plan

Full Access
Question # 85

Malware refers to any infectious software created to damage, change or improperly access a computer or network.

A.

TRUE

B.

FALSE

Full Access
Question # 86

The term data quality refers to only the characteristics associated with high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 87

A sandbox is an alternate environment that allows write-only connections to production data and can be managed by the administrator.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Many people assume that most data quality issues are caused by data entry errors. A more sophisticated understanding recognizes that gaps in or execution of business and technical processes cause many more problems that mis-keying.

A.

TRUE

B.

FALSE

Full Access
Question # 89

Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.

A.

FALSE

B.

TRUE

Full Access
Question # 90

Data replication has two dimensions of scaling: diagonal and lateral

A.

FALSE

B.

TRUE

Full Access
Question # 91

What changes in data processing when a gas utility checks the condition of its assets using a drone rather than a team of people driving alongside the pipeline?

A.

Previously, they received condition data, now they receive observation data that needs to be analyzed to extract the condition

B.

Previously, they received reference data, now they receive incident data to find the work order

C.

Video data is much easier to read than structured data from the teams

D.

Previously, they received master data, now they receive reference data to find the incidents

E.

Previously, they received metadata, now they receive transactional data that needs to be analyzed to extract the data

Full Access
Question # 92

A goal of Data warehouse and business intelligence is to support and enable ineffective business analysis and decision making by knowledge workers.

A.

TRUE

B.

FALSE

Full Access
Question # 93

Defining quality content requires understanding the context of its production and use, including:

A.

Producers

B.

Timing

C.

None of the above

D.

Delivery

E.

Consumers

F.

Format

Full Access
Question # 94

One of the difficulties when integrating multiple source systems is:

A.

Maintaining documentation describing the data warehouse operation

B.

Determining valid links or equivalences between data elements

C.

Modifying the source systems to align to the enterprise data model

D.

Having a data quality rule applicable to all source systems

E.

Completing the data architecture on time for the first release

Full Access
Question # 95

Examples of transformation in the ETL process onclude:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Full Access
Question # 96

Metadata is essential to the management of unstructured data as it id to the management of structured data.

A.

TRUE

B.

FALSE

Full Access
Question # 97

Data modeller: responsible for fata model version control an change control

A.

TRUE

B.

FALSE

Full Access
Question # 98

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

A.

TRUE

B.

FALSE

Full Access
Question # 99

OCR is the abbreviation for Optical Character Recognition.

A.

TRUE

B.

FALSE

Full Access
Question # 100

A key feature of Bill Inmon’s approach to data warehousing is:

A.

A tight management of data dimensions

B.

An exclusive focus on star schemas and cubes

C.

A normalized relational model to store and manage data

D.

A preference for supporting operational reporting

E.

Its ability to operate on open-source platforms

Full Access
Question # 101

Various Regulations require evidence of clear data lineage and accuracy. How can we as data managers best serve our enterprises in achieving this goal?

A.

Perform a one off review of data quality

B.

Create a new data store for regulator required metrics

C.

Capture and document all metrics and store in a central repository

D.

Undertake an audit of current process and produce a report

E.

Provide the framework and guidance to enable a business led ongoing Data Governance process

Full Access
Question # 102

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:

A.

Specific risk management

B.

General risk management

C.

Data ethics

D.

Data security

E.

Publicity

F.

Privacy

Full Access
Question # 103

Types of metadata include:

A.

Strategic

B.

Business

C.

Column-orientated

D.

Operational

E.

Graph

F.

Technical

Full Access
Question # 104

Data flows map and document relationships between data and:

A.

Locations where local differences occur

B.

Situations where local differences occur

C.

Network segments

D.

Applications within a business process

E.

None of the above

F.

All of the above

Full Access
Question # 105

Please select the 3 visuals that depict DAMA’s Data Management Framework.

A.

The DAMA Octagon

B.

The Knowledge Area Context Diagram

C.

The Data Quality Function Context Diagram

D.

The DAMA Wheel

E.

The Environmental Factors hexagon

Full Access
Question # 106

Technical metadata describes details of the processing and accessing of data.

A.

FALSE

B.

TRUE

Full Access
Question # 107

One common KPI of e-discovery is cost reduction.

A.

FALSE

B.

TRUE

Full Access
Question # 108

Metrics tied to Reference and Master Data quality include:

A.

Strategic usage reporting

B.

Amsterdam Information Model

C.

Data change activity

D.

Total cost of ownership

Full Access
Question # 109

The best preventative action to prevent poor quality data from entering an organisation include:

A.

Institute a formal change control

B.

Define and enforce rules

C.

Implement data governance and stewardship

D.

None of the above

E.

Train data procedures

F.

Establish data entry controls

Full Access
Question # 110

The most informal enterprise data model is the most detailed data architecture design document.

A.

TRUE

B.

FALSE

Full Access
Question # 111

The Shewhart chart contains the following elements:

A.

Plan

B.

Utilization

C.

Do

D.

Check

E.

Act

F.

All of the above

Full Access
Question # 112

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

A.

Streaming

B.

Messaging

C.

DAAS

D.

Trickle Feeds

Full Access
Question # 113

Developing complex event processing solutions require:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Full Access
Question # 114

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Full Access
Question # 115

Business activity information is one of the types of data that can be modelled.

A.

TRUE

B.

FALSE

Full Access
Question # 116

Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.

A.

Principle of integrity

B.

Principle of availability

C.

Principle of retention

D.

Principle of accountability

Full Access
Question # 117

Which of the following is not a step in the 'document and content management

lifecycle'?

A.

Capture records and content

B.

Manage versions and control

C.

Audit documents and records

D.

Create a content strategy

E.

Manage retention and disposal

Full Access
Question # 118

No recorded negative ethical outcomes does not mean that the organization is processing data ethically. Legislation cannot keep up with the evolution of the data environment so how do we stay compliant?

A.

Constant attention to ethical legislation and legal proceedings and international ethical bodies will enable the organization to recognize potential compliancy issues that can be addressed

B.

An active data quality and privacy assessment program can be used to detect ethical risks. Once identified, we can reduce the associated risks according to the organizations ethical values

C.

A healthy internal governance, risk and compliance function, including internal data audits will identify potential ethical issues

D.

An organization must develop and sustain a culture of ethical data handling to detect potential ethical risks. On identifying ethical risks, the onus is on the organization to modifying the processing to achieve acceptable data handling

E.

The best way to keep up with the evolution is to survey communities, customers and employees and what they consider to be appropriate use of the information

Full Access
Question # 119

The main difference between a System of Record and a System of Reference is:

A.

A system of reference is the source of transaction data; the system of record is the source of master data

B.

The data does not originate in the system of reference

C.

A system of record is the source of master data; a system of reference is the source of reference data

D.

They are the same thing

E.

The data does not originate in the system of record

Full Access
Question # 120

The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.

A.

FALSE

B.

TRUE

Full Access
Question # 121

The implementation of a Data Warehouse should follow these guiding principles:

A.

Managing performance of data assets

B.

Focus on the business goals

C.

Managing the availability of data throughout the data lifecycle

D.

Start with the end in mind

E.

Managing the performance of data transactions

F.

Collaborate

Full Access
Question # 122

A System of Reference is an authoritative system where data consumers can obtain reliable data to support transactions and analysis, even if the information did not originate in the system reference.

A.

TRUE

B.

FALSE

Full Access
Question # 123

One of the key differences between operational systems and data warehouses is:

A.

Operational systems focus on data quality: data warehouses focus on datasecurity

B.

Operational systems focus on historical data; data warehouses contain currentdata

C.

Operational systems are available 24x7; data warehouses are available duringbusiness hours

D.

Operational systems focus on current data; data warehouses contain historicaldata

E.

Operational systems focus on business processes: data warehouses focus onbusiness strategies

Full Access
Question # 124

Data profiling is a form of data analysis used to inspect data and assess quality.

A.

TRUE

B.

FALSE

Full Access
Question # 125

A ‘Golden Record’ means that it is always a 100% complete and accurate representation of all entities within the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 126

Data quality issues cannot emerge at any point in the data lifecycle.

A.

FALSE

B.

TRUE

Full Access
Question # 127

Please select the correct definition of Data Management from the options below.

A.

Data Management is the strict control of all plans, policies, programs and practices that enable the business strategy to be successfully executed.

B.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data and information assets throughout their lifecycles.

C.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data assets throughout their lifecycles.

D.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of information assets throughout their lifecycles.

Full Access
Question # 128

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.

A.

FALSE

B.

TRUE

Full Access
Question # 129

Principles for data asset accounting include:

A.

Accounting Principle

B.

Due Diligence Principle

C.

Asset Principle

D.

Audit Principle

E.

Going Concern Principle

F.

All of the above

Full Access
Question # 130

The goals of data storage and operations include:

A.

Managing performance of data assets

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Full Access
Question # 131

Basic profiling of data involves analysis of:

A.

Data sources, data visualisations, data latency and ownership

B.

Data clusters, data clouds, data repositories and metadata libraries

C.

Data lakes, data warehouses and operational data stores

D.

Data formats, data values, patterns and relationships

E.

Data criteria, data acquisition, data policy and procedures inside dataGovernance

Full Access
Question # 132

A deliverable in the data modelling and design context diagram is the logical data model.

A.

TRUE

B.

FALSE

Full Access
Question # 133

Confidentiality classification schemas might include two or more of the five confidentiality classification levels. Three correct classifications levels are:

A.

Consistency

B.

Internal use only

C.

Restricted confidential

D.

System development

E.

Confidential

F.

None of the above

Full Access
Question # 134

Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.

A.

TRUE

B.

FALSE

Full Access
Question # 135

Tools required to manage and communicate changes in data governance programs include

A.

Ongoing business case for data governance

B.

Obtaining buy-in from all stakeholders

C.

Data governance roadmap

D.

Monitoring the resistance

E.

Business/Data Governance strategy map

F.

Data governance metrics

Full Access
Question # 136

The disclosure of sensitive addresses may occur through:

A.

Inappropriate use of photocopier toner

B.

Cloud-based databases

C.

Software ignoring privacy tags on the data

D.

Ineffective implementation of data architecture

E.

Stored procedures being called directly

Full Access
Question # 137

Self-service is a fundamental delivery channel in the BI portfolio.

A.

TRUE

B.

FALSE

Full Access
Question # 138

While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.

A.

TRUE

B.

FALSE

Full Access
Question # 139

A DMZ is bordered by 2 firewalls. These are between the DMZ and the:

A.

Korean peninsula

B.

Internet, for added security

C.

Internet and extranet

D.

Internet and internal systems

E.

Internet and intranet

Full Access
Question # 140

Value is the difference between the cost of a thing and the benefit derived from that thing.

A.

TRUE

B.

FALSE

Full Access
Question # 141

Reference and master data require governance processes, including:

A.

The data sources to be integrated

B.

Emotions matrix

C.

Compliance framework

D.

The priority and response levels of data stewardship efforts

E.

The conditions of use rules to be followed

F.

None of the above

Full Access
Question # 142

The dependencies of enterprise technology architecture are that it acts on specified data according to business requirements.

A.

TRUE

B.

FALSE

Full Access
Question # 143

In an information management context, the short-term wins and goals often arise from the resolution of an identified problem.

A.

TRUE

B.

FALSE

Full Access
Question # 144

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

A.

TRUE

B.

FALSE

Full Access
Question # 145

What are the components of a Data Governance Readiness Assessment?

A.

Assess best practices, data metrics, and data quality

B.

Compliance to internal standards, Data Security, Data Privacy rules

C.

Data Management Maturity, Capacity to Change, Collaborative Readiness and Business Alignment

D.

Capacity to change, Establish standards. Data Quality skills, Data Stewardship productivity

E.

Capacity to change, Establish Stewardship, Business Alignment and Metadata Repository

Full Access
Question # 146

DAMA International’s Certified Data Management Professional (CDMP) certification required that data management professionals subscribe to a formal code of ethics, including an obligation to handle data ethically for the sake of society beyond the organization that employs them.

A.

TRUE

B.

FALSE

Full Access
Question # 147

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

A.

TRUE

B.

FALSE

Full Access
Question # 148

Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.

A.

TRUE

B.

FALSE

Full Access
Question # 149

Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as

A.

TRUE

B.

FALSE

Full Access
Question # 150

Examples of transformation include:

A.

Format changes, structure changes, replication conversion, re-duplication anddata ordering

B.

Application changes, infrastructure changes, software conversion, de-duplicationand re-ordering

C.

Data modelling changes, structure changes, metric conversion, de-duplicationand reordering

D.

Format changes, structure changes, semantic conversion, de-duplication and re-ordering

E.

Organisation changes, location changes, business strategy conversion, down-sizing and outsourcing

Full Access
Question # 151

A data dictionary is necessary to support the use of a DW.

A.

TRUE

B.

FALSE

Full Access
Question # 152

An input in the data architecture context diagram includes data governance.

A.

TRUE

B.

FALSE

Full Access
Question # 153

What is the final step in the development of a business-data-driven roadmap?

A.

Describe the Data Value Chain that supports the Business Capabilities

B.

Finalize the Data flow between business capabilities

C.

Establish the sequence of projects that will be used to establish the data value chain

D.

Resequencing of some of the business capabilities to resolve data dependencies

E.

Resolve Data Dependency challenges

Full Access
Question # 154

Logical abstraction entities become separate objects in the physical database design using one of two methods.

A.

The DAMA Wheel

B.

Supertype partition

C.

Subtype partition

D.

Subtype absorption

E.

Supertype absorption

Full Access
Question # 155

Poorly managed Metadata leads to, among other, redundant data and data management processes.

A.

TRUE

B.

FALSE

Full Access
Question # 156

Data governance and IT governance are the same thing.

A.

TRUE

B.

FALSE

Full Access
Question # 157

Critical success factors throughout the BI/DW lifecycle include:

A.

Business readiness

B.

A clear and consistent focus

C.

Vision alignment

D.

Business sponsorship

E.

Linear symmetry

F.

A consistent line across display methods

Full Access
Question # 158

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

A.

FALSE

B.

TRUE

Full Access
Question # 159

Please select the correct name for the PDM abbreviation when referring to modelling.

A.

Physical Dimension Model

B.

Photo Data Model

C.

None of the above

D.

Probabilistic Dimension Model

E.

Photo Dimensional Model

F.

Physical Data Model

Full Access
Question # 160

When assessing security risks it is required to evaluate each system for the following:

A.

The current security protections in place

B.

The requirements to protect the data

C.

None of the above

D.

All of the above

E.

The complexity of the data stored or in transit

F.

The sensitivity of the data stored or in transit

Full Access
Question # 161

Which of the following is NOT an objective of a business (data) glossary?

A.

Provide standard definitions for data and metadata

B.

Maximize search capability and enable access to documented institutional knowledge

C.

Improve the linkage between physical data assets and the business

D.

Reduce data misuse risk due to inconsistent management of a business concept

E.

Define business units, software, and other important glossary items

Full Access
Question # 162

Data flows map and document relationships between data and locations where global differences occur.

A.

TRUE

B.

FALSE

Full Access
Question # 163

Data models comprise and contain metadata essential to data consumers.

A.

TRUE

B.

FALSE

Full Access
Question # 164

Enterprise Data Architects should support projects for potential:

A.

Non-compliance to data standards

B.

Legal reviews

C.

Incomplete data requests

D.

Data-focused security reviews

E.

Planning for metadata development

Full Access
Question # 165

In matching, false positives are three references that do not represent the same entity are linked with a single identifier.

A.

TRUE

B.

FALSE

Full Access
Question # 166

Integrating data security with document and content management knowledge areas.

guides the implementation of:

A.

Appropriate access and authorization to unstructured data

B.

Fitness for purpose metrics for unstructured data

C.

Appropriate privacy controls on data marts

D.

Appropriate access and authorization to structured data

E.

Straight-through processing for NoSQL queries

Full Access
Question # 167

A "Data Governance strategy" usually includes the following deliverables:

A.

A Statement of Intent, a Decision Framework, an Implementation Roadmap, and a Governance Toolkit

B.

A Charter, a Data Architecture, a Program Data Model, and a Plan for Operational Success

C.

A Program Plan, a Resource Plan, an Implementation Plan, and a Test Plan

D.

A Charter, an Operating Framework, an Implementation Roadmap, and a Plan for Operational Success

E.

A Charter, a Security Strategy, a Solution Roadmap, and a User Experience Plan

Full Access
Question # 168

Big data is often defined by three characteristics. They are:

A.

Size, Speed and Sensitivity

B.

Volume, Variety and Velocity

C.

Direction, Depth and Details

D.

Expansive, Engaged and Enormous

E.

Complexity, Compliance and Completeness

Full Access
Question # 169

Release management is critical to batch development processes that grows new capabilities.

A.

TRUE

B.

FALSE

Full Access
Question # 170

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

A.

Stakeholders

B.

Government regulations

C.

Proprietary business concerns

D.

Legitimate access needs

E.

Contractual obligations

F.

None of the above

Full Access
Question # 171

What is the best definition of Crowdsourced data collection?

A.

Crowdsourcing should not be used to gather data because there will be too many opinions and not enough facts

B.

Crowdsourcing is the process of obtaining needed data by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers  

C.

Crowdsourced data is the best way of finding data because so many people are contributing their definitions

D.

Crowdsourced data is the data that comes from using a company wiki to gather data because anyone in the crowd can contribute

E.

Crowdsourced data collection is only used by researchers to answer research, survey or feedback questions

Full Access
Question # 172

When measuring the value of data architecture one should be most concerned about

A.

Improved coding efficiency

B.

Project speed

C.

Number of Projects reviewed

D.

Added business value

E.

Cost savings

Full Access
Question # 173

ANSI standard 859 has three levels of control of data, based on the criticality of the data and the perceived harm that would occur if data were corrupt or otherwise unavailable, including:

A.

Basic

B.

Formal

C.

Informal

D.

Custody

E.

Revision

F.

None of the above

Full Access
Question # 174
A.

FALSE

B.

TRUE

Full Access
Question # 175

Data Fabric is:

A.

A way of sewing together different data concepts into a single data warehouse

B.

A metadata repository

C.

A form of data lake that automates data acquisition and initial data quality processing

D.

A superior star schema strategy

E.

Just another data warehouse with no distinguishing features

Full Access
Question # 176

Differentiating between data and information. Please select the correct answers based on the sentence below: Here is a marketing report for the last month [1]. It is based on data from our data warehouse[2]. Next month these results [3] will be used to generate our month-over-month performance measure [4].

A.

[1] Information, [2] Information, [3] Data, [4] Information

B.

[1] Data, [2] Information, [3] Data, [4] Data

C.

[1] Data, [2] Data, [3] Data, [4] Information

D.

[1] Information, [2] Data, [3] Data, [4] Information

Full Access
Question # 177

A change management program supporting Data Governance should focus communication on what?

A.

Promoting the value of its data assets, monitor and act on feedback about Data Governance activities & implement data management training programs.

B.

Promote the value of its data assets

C.

Show the value of data stewardship & implement data management training program

D.

How many errors are in each of the various department's data

E.

Implement a data management training program and create a data dictionary

Full Access
Question # 178

The biggest business driver for developing organizational capabilities around Big Data and Data Science is the desire to find and act on business opportunities that may be discovered through data sets generated through a diversified range of processes.

A.

TRUE

B.

FALSE

Full Access
Question # 179

During the intial scoping of a project, a data model can be used to:

A.

Identify detailed impact on all the tables in a database that must be changed

B.

Determine the security requirements for accessing the data

C.

Provide a clear definition of affected and non-affected data entities

D.

Determine the impact of business processes and customer lifecycles

E.

Plan the structure of the metadata repository

Full Access
Question # 180

Some document management systems have a module that may support different types of workflows such as:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Full Access
Question # 181

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

A.

TRUE

B.

FALSE

Full Access
Question # 182

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.

A.

TRUE

B.

FALSE

Full Access
Question # 183

Bias refers to an inclination of outlook. Please select the types of data bias:

A.

Data collection for pre-defined results

B.

Hunch and search

C.

Positive reinforcement

D.

Context and Emotion

E.

Biased use of data collected

F.

Biased sampling methodology

Full Access
Question # 184

Please select the two classifications of database types:

A.

Centralized

B.

Generic

C.

Distributed

D.

MapReduce

Full Access
Question # 185

All assessments should include a roadmap for phased implementation of the recommendations. This is important because:

A.

The roadmap shows how to implement the important assessment results, and when to do so

B.

A roadmap will highlight items in an implementation sequence and on other considerations (budget, resources, other programs, etc.)

C.

A roadmap is just another way of saying you should have a plan

D.

A roadmap is the only way for the organization to understand the results of the assessment

E.

A roadmap includes a project plan, which gives the stakeholders information on how each recommendation will be implemented

Full Access
Question # 186

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Full Access
Question # 187

All organizations have the same Master Data Management Drivers and obstacles.

A.

TRUE

B.

FALSE

Full Access
Question # 188

An implemented warehouse and its customer facing BI tool is a data product.

A.

TRUE

B.

FALSE

Full Access
Question # 189

Typically, DW/BI have three concurrent development tracks:

A.

Data mart

B.

Business Intelligence tools

C.

Data

D.

System development

E.

Techonology

F.

None of the above

Full Access
Question # 190

Why is the GDPR called the most important change in data and data privacy regulation in 20 years?

A.

Because most Europeans say they want the same data protection rights across the EU and regardless of where their data is processed

B.

Because most Europeans don’t want their data used by any country but the one in which they live

C.

Because most Europeans don’t care if EU companies have their data but they don’t want it shared with non-EU companies

D.

Because most Europeans are on social media because they don’t want their data exposed

E.

Because most Europeans believe other countries are stealing their data

Full Access
Question # 191

Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.

A.

TRUE

B.

FALSE

Full Access
Question # 192

Please select the 2 frameworks that show high-level relationships that influence how an organization manages data.

A.

Strategic Alignment Model

B.

DAMA DMBOK Hexagon

C.

DAMA Wheel

D.

Amsterdam Information Model

Full Access
Question # 193

Business glossaries have the following objectives:

A.

Improve the alignment between technology assets and the business organization

B.

All of the above

C.

Cultural factors that might improve the concepts and terminology

D.

Maximise search capability and enable access to documented institutional knowledge

E.

Enable common understanding of the core business concepts and terminology

F.

Reduce the risk that data will be misused due to inconsistent understanding of the business concepts.

Full Access
Question # 194

Lack of automated monitoring represents serious risks, including:

A.

Administrative and audit duties risk

B.

Risk of compliance

C.

Direction and recovery risk

D.

Risk of reliance on inadequate native

Full Access
Question # 195

SOA is an abbreviation for service orientated architecture.

A.

FALSE

B.

TRUE

Full Access
Question # 196

The advantage of a decentralised Data Governance model over a centralised model is:

A.

An increased level of ownership from local decision making groups

B.

The cheaper execution of Data Governance operations

C.

Having a common approach to resolving Data Governance issues

D.

The common metadata repository configurations

E.

The easier implementation of industry data models

Full Access
Question # 197

Those responsible for the data-sharing environment have an obligation to downstream data consumers to provide high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 198

Examples of technical metadata include:

A.

Access permission

B.

Recovery and backup rules

C.

Colum properties

D.

Data subject properties

Full Access
Question # 199

Big data management requires:

A.

No discipline at all

B.

Less discipline than relational data management

C.

More discipline than relational data management

D.

Big ideas with big budgets

E.

A certification in data science

Full Access
Question # 200

Oversight for the DMMA process belongs to the Data Quality team.

A.

TRUE

B.

FALSE

Full Access
Question # 201

What is the most critical task for a new Data Governance team?

A.

To begin developing the Business Data Glossary

B.

To identify metrics for data quality issues in the organisation

C.

To define the requirements for technologies to support DG activities

D.

To collate an Information Risk Register

E.

To establish its purpose, process, and measures of team progress

Full Access
Question # 202

Architecture is the fundamental organization of a system, embodied in its components, their relationships to each other and the environment and the principles governing its design and evolution.

A.

TRUE

B.

FALSE

Full Access
Question # 203

A deliverable in the data architecture context diagram includes an implementation roadmap.

A.

TRUE

B.

FALSE

Full Access
Question # 204

What does Data Handling Ethics concern itself with?

A.

Data Ethics is concerned with the right way of dealing with data throughout its lifecycle, ensuring that it’s in line with the organization’s policies and standards

B.

Data Handling Ethics is concerned with how to procure, store, manage, use, and dispose of data that are aligned with ethical principles

C.

Data Ethics is concerned about respect of persons, beneficence, and justice

D.

Data Handling Ethics is concerned with protecting individuals and society from inappropriate processing of data

E.

Data Ethics is concerned with applying ethical principles to data management. Data Management needs to be aligned to the ethical statements of the organization

Full Access
Question # 205

Metadata management solutions include architectural layers including:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Full Access
Question # 206

The independent updating of data into a system of reference is likely to cause:

A.

Reference data inconsistencies

B.

Duplicate data

C.

Deadlocks in the database

D.

Master data inconsistencies

E.

Transaction data inconsistencies

Full Access
Question # 207

When doing reference data management, there many organizations that have standardized data sets that are incredibly valuable and should be subscribed to. Which of these organizations would be least useful?

A.

The company registration organization

B.

Wikipedia

C.

ISO

D.

IEEE

E.

The national post office

Full Access
Question # 208

Enterprise service buses (ESB) are the data integration solution for near real-time sharing of data between many systems, where the hub is a virtual concept of the standard format or the canonical model for sharing data in the organization.

A.

FALSE

B.

TRUE

Full Access
Question # 209

Wat data architecture designs represent should be clearly documented. Examples include:

A.

Priority

B.

Retirement

C.

Preferred

D.

All of the above

E.

Current

F.

Emerging

Full Access
Question # 210

DMMA ratings represent a snapshot of the organization’s capability level.

A.

TRUE

B.

FALSE

Full Access
Question # 211

Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.

A.

TRUE

B.

FALSE

Full Access
Question # 212

Naming standards for data domains should:

A.

Contain acronyms that are relevant to the organization because everyone should know them

B.

Be approved by the database administrators

C.

Minimize name changes across environments

D.

Should reflect their specific environment such as QA, Pre-Prod and Production

E.

Be short for ease of use

Full Access
Question # 213

A Business Glossary forces a business to adopt a single definition of a business term.

A.

FALSE

B.

TRUE

Full Access
Question # 214

Business requirements is an input in the Data Warehouse and Business Intelligence context diagram.

A.

TRUE

B.

FALSE

Full Access
Question # 215

Please select valid modelling schemes or notations

A.

NoSQL

B.

Dimensional

C.

Relational

D.

Object-orientated

E.

Fact-based

F.

Matrix-based

Full Access
Question # 216

Improving data quality requires a strategy that accounts for the work that needs to be done and the way people will execute it.

A.

TRUE

B.

FALSE

Full Access
Question # 217

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

A.

TRUE

B.

FALSE

Full Access
Question # 218

The CAP theorem states that at most two of the three properties: consistency, availability and partition tolerance can exist in any shared data system.

A.

TRUE

B.

FALSE

Full Access
Question # 219

Analytics models are associated with different depths of analysis, including:

A.

Quality testing

B.

Explanatory modeling

C.

Descriptive modeling

D.

Performance modeling

E.

All of the above

F.

None of the above

Full Access