Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

DMF-1220 Data Management Fundamentals Questions and Answers

Questions 4

Within the Data Handling Ethics Context Diagram a key deliverable is the Ethical Data Handling Strategy.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 6

While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

The acronym CMDB stands for:

Options:

A.

Customization management tools or databases

B.

Classic management technologies or databases

C.

Cached management technologies or databases

D.

Configuration management tools or databases

E.

Cached management tools or databases

F.

Classic monitoring technologies or databases

Buy Now
Questions 8

Primary deliverables of the Data Warehouse and Business Intelligence context diagram include:

Options:

A.

Data Products

B.

Data Stewardship

C.

Governance Activities

D.

Release Plan

E.

Load Tuning Activities

F.

BI Activity Monitoring

Buy Now
Questions 9

Data Governance includes developing alignment of the data management approach with organizational touchpoints outside of the direct authority of the Chief Data Officer. Select the example of such a touchpoint.

Options:

A.

Content Management

B.

Requirements

C.

Business Glossary

D.

Records Management

E.

Regulatory Compliance

Buy Now
Questions 10

Domains can be identified in different ways including: data type; data format; list; range; and rule-based.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

The Shewhart chart contains the following elements:

Options:

A.

Plan

B.

Utilization

C.

Do

D.

Check

E.

Act

F.

All of the above

Buy Now
Questions 12

Repositories facilitate the collection, publishing and distribution of data in a centralized and possibly standardized way. Data is most often used to:

Options:

A.

Make sure the DBAs are not creating new tables and columns

B.

Document and organize the provided data

C.

To support the business users not the technical users

D.

Give developers all the data they will need for programming

E.

Find new initiatives for the business to pursue

Buy Now
Questions 13

What area do you not consider when developing a 'Data Governance operating model?

Options:

A.

Impact of regulation

B.

Cultural factors - such as acceptance of discipline and adaptability to change

C.

The availability of industry data models

D.

The business model - decentralised versus centralised

E.

The value of data to the organization

Buy Now
Questions 14

Real-time data integration is usually triggered by batch processing, such as historic data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

The difference between warehouses and operational systems do not include the following element:

Options:

A.

Time variant

B.

Database

C.

Subject-orientated

D.

Historical

Buy Now
Questions 16

Customer value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as well we managing risk related to usage. Which of these is not a way to measure value?

Options:

A.

Market value

B.

Identified opportunities

C.

Risk cost

D.

User perspective

E.

Replacement cost

Buy Now
Questions 17

A limitation of the centralized metadata repository approach is it may be less expensive.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

The four A’s in security processes include:

Options:

A.

Audit

B.

Authentication

C.

Access

D.

Authorization

E.

Aliment

F.

Applicable

Buy Now
Questions 19

Master data management includes several basic steps, which include: Develop rules for accurately matching and merging entity instances.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

Type of Reference Data Changes include:

Options:

A.

Row level changes to internal Reference Data sets

B.

Row level changes to external Reference Data sets

C.

Creation of new Reference Data sets

D.

Business model changes on column level

E.

Structural changes to external Reference Data sets

F.

None of the above

Buy Now
Questions 21

A critical step in data management organization design is identifying the best-fit operating model for the organization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Business glossaries have the following objectives:

Options:

A.

Improve the alignment between technology assets and the business organization

B.

All of the above

C.

Cultural factors that might improve the concepts and terminology

D.

Maximise search capability and enable access to documented institutional knowledge

E.

Enable common understanding of the core business concepts and terminology

F.

Reduce the risk that data will be misused due to inconsistent understanding of the business concepts.

Buy Now
Questions 23

A key feature of the Bill Inmon's approach to data warehousing is:

Options:

A.

A preference for supporting operational reporting

B.

An exclusive focus on star schemas and cubes

C.

A normalized relational model to store and manage data

D.

A tight management of data dimensions

E.

Its ability to operate on open source platforms

Buy Now
Questions 24

Examples of the ‘Who’ entity category include: employee; patient; player; and suspect.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

According to the DMBoK, Data Governance is central to Data Management. In practical terms, what other functions of Data Management are required to ensure that your Data Governance programme is successful?

Options:

A.

Master Data, Data Quality, and Data Development

B.

Data Quality, Content and Document Management, and Data Development

C.

Data Modelling, Data Architecture and Master Data Management

D.

Data Quality, Data Architecture, and Metadata Management

E.

Data Architecture, Data Security, and Metadata Management

Buy Now
Questions 26

Deliverables in the data quality context diagram include:

Options:

A.

DQM Procedures

B.

Data architecture

C.

Data governance

D.

DQ Policies and guidelines

E.

Analyses from data profiling

F.

Data quality Service Level Agreements

Buy Now
Questions 27

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 28

Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:

Options:

A.

Each type of stakeholder may need a different form of interaction, and each process evaluation may lend itself to a different form of information gathering

B.

Data management and Data Governance assessments will have different types of stakeholders

C.

The definition of stakeholder interaction depends on the executive sponsor

D.

Assessment teams may not know what a stakeholder is

E.

Each type of stakeholder may need a different form of data and security

Buy Now
Questions 29

Document and content management is defined as planning, implementation and control activities for storage management of data and information found in any form or medium.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

A controlled vocabulary is a defined list of explicitly allowed terms used to index, categorize, tag, sort and retrieve content through browsing and searching.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

SPARC published their three-schema approach to database management. The three key components were:

Options:

A.

Internal

B.

Logical

C.

Generic

D.

Conceptual

E.

External

Buy Now
Questions 32

The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 33

When reviewing data access plans, sequential searching is slowing the database. One

way to fix this is:

Options:

A.

Reducing the number of database users

B.

Creating new indexes

C.

Adding more memory

D.

Converting it to an in-memory database

E.

Moving the database to the cloud

Buy Now
Questions 34

Please select the correct types of data stewards:

Options:

A.

Executive Data Steward

B.

Chief Data Steward

C.

Enterprise Data Steward

D.

Business Data Steward

E.

A Data Seller

F.

All of the above

Buy Now
Questions 35

Integration of ETL data flows will usually be developed within tools specialised to manage those flows in a proprietary way.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

Match rules for different scenarios require different workflows, including:

Options:

A.

Consistency rules

B.

Duplicate identification match rules

C.

Match-merge rules

D.

Match-split rules

E.

Match-link rules

F.

All of the above

Buy Now
Questions 37

Examples of concepts that can be standardized within the data architecture knowledge area include:

Options:

A.

Enterprise data models

B.

System naming conventions

C.

None of the above

D.

Data security standards

E.

Data quality rules

F.

Tool standards

Buy Now
Questions 38

The failure to gain acceptance of a business glossary may be due to ineffective:

Options:

A.

Metadata Management

B.

Business Architecture

C.

Content and Document Management

D.

Data Governance

E.

Data Security

Buy Now
Questions 39

Please select the four domains of enterprise architecture:

Options:

A.

Enterprise software architecture

B.

Enterprise technology architecture

C.

Enterprise business architecture

D.

Enterprise data architecture

E.

Enterprise hardware architecture

F.

Enterprise application architecture

Buy Now
Questions 40

What are the business objectives for building a business glossary?

Options:

A.

To have a place to store physical schemas for the DBAs

B.

Make sure that the data stewards have valid work to perform, & justify that the budget for Data Governance

C.

Take all the core data elements from the data models and store them in the glossary

D.

Establish a common understanding of core business concepts and terminology & enable access to documented institutional knowledge

E.

Create a place to manage metadata and lineage

Buy Now
Questions 41

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 42

Latency can be:

Options:

A.

Batch

B.

Event-driven

C.

Distributed

D.

Real-time synchronous

Buy Now
Questions 43

The most common drivers for initiating a Mater Data Management Program are:

Options:

A.

Metadata insecurity

B.

Managing data quality

C.

Reducing risk

D.

Managing the costs of data integration

E.

Meeting organizational data requirements

F.

Reducing latency

Buy Now
Questions 44

The disclosure of sensitive addresses may occur through:

Options:

A.

Inappropriate use of photocopier toner

B.

Ineffective implementation of data architecture

C.

Cloud-based databases

D.

Stored procedures being called directly

E.

Software ignoring privacy tags on the data.

Buy Now
Questions 45

SOA stands for:

Options:

A.

Service orchestrated architecture

B.

Service orientated access

C.

Service orientated architecture

D.

Service overall architecture

Buy Now
Questions 46

Use business rules to support Data Integration and Interoperability at various points, to:

Options:

A.

Direct the flow of data in the organization

B.

Monitor the organization’s operational data

C.

Software alerts when events are triggered

D.

Direct when to automatically trigger events and alerts

E.

Consistency in allocation event resources

F.

None of the above

Buy Now
Questions 47

Architects seek to design in a way that brings value to an organisation. To reach these goals, data architects define and maintain specifications that:

Options:

A.

Align data architecture with enterprise strategy and business architecture

B.

Provide a standard business vocabulary for data and components

C.

Outline high-level integrated designs to meet these requirements.

D.

Integrate with overall enterprise architecture roadmap

E.

Define the current state of data in the organization.

F.

Express strategic data requirements

Buy Now
Questions 48

What key components make up the Data Governance Charter?

Options:

A.

Vision/Mission Statement, Data Governance data principles, Business drivers

B.

Data Stewardship Metrics, Data Governance, Business Drivers

C.

Vision/Mission statement, Data quality framework, Data stewardship metrics

D.

Data processes, data principles and the timeframe for implementation

E.

The Enterprise data architecture, data security practices and industry regulations

Buy Now
Questions 49

Assessment capabilities are evaluated against a pre-determined scale with established criteria. This is important because:

Options:

A.

Each process that is being evaluated must show some financial justification.

B.

It is difficult to be objective when using an internally developed assessment

C.

Each process under evaluation must be rated objectively against best practices found in many organizations and industries.

D.

Pre-determined scales give organizations a way to justify their weaknesses

E.

Established criteria in an industry make each organization more likely to want to use the industry's assessment.

Buy Now
Questions 50

When constructing an organization’s operating model cultural factors must be taken into consideration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

Security Risks include elements that can compromise a network and/or database.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 52

DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 53

SDLC stands for:

Options:

A.

System development leverage cycle

B.

System design lifecycle

C.

System and design long cycle

D.

System development lifecycle

Buy Now
Questions 54

Please select the two concepts that drive security restrictions:

Options:

A.

Regulation

B.

Regression

C.

Confidence level

D.

Confidentiality level

Buy Now
Questions 55

One of the first steps in a master data management program is to:

Options:

A.

Decommission similar data collection systems

B.

Review data security protocols

C.

Secure funding for 20 years of operations

D.

Build multiple data marts

E.

Evaluate and assess data sources

Buy Now
Questions 56

Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

Which of the following is not a step in the 'document and content management

lifecycle'?

Options:

A.

Capture records and content

B.

Manage versions and control

C.

Audit documents and records

D.

Create a content strategy

E.

Manage retention and disposal

Buy Now
Questions 58

What are the components of a Data Governance Readiness Assessment?

Options:

A.

Assess best practices, data metrics, and data quality

B.

Compliance to internal standards, Data Security, Data Privacy rules

C.

Data Management Maturity, Capacity to Change, Collaborative Readiness and Business Alignment

D.

Capacity to change, Establish standards. Data Quality skills, Data Stewardship productivity

E.

Capacity to change, Establish Stewardship, Business Alignment and Metadata Repository

Buy Now
Questions 59

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

Emergency contact phone number would be found in which master data

management program?

Options:

A.

Location

B.

Asset

C.

Service

D.

Employee

E.

Product

Buy Now
Questions 61

Which answer is considered to be the best definition of data security?

Options:

A.

Data security occurs when all metadata is tagged as either Confidential, Public or Sensitive

B.

Data security is only possible after Data Governance and Risk Management have looked at all the data, verified, definitions and conducted a impact analysis

C.

Data security can be described as having all of an organization's data in a repository along with a policy of limited access to only those employees managing the data

D.

Data security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization's data

E.

Data security is the ability to track who in the organization has access to metadata

Buy Now
Questions 62

SSD is the abbreviation for Solid State Dimension.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 64

A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 65

The best preventative action to prevent poor quality data from entering an organisation include:

Options:

A.

Institute a formal change control

B.

Define and enforce rules

C.

Implement data governance and stewardship

D.

None of the above

E.

Train data procedures

F.

Establish data entry controls

Buy Now
Questions 66

Which of the following is NOT a preventative action for creating high quality data?

Options:

A.

Automated correction algorithms capable of detecting and correcting errors

B.

Train data producers

C.

Institute formal data change control

D.

Establish data entry controls

E.

Implement data governance and stewardship

Buy Now
Questions 67

The load step of the ETL is physically storing or presenting the results of the transformation into the source system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

There are three techniques for data-based change data capture, namely:

Options:

A.

The source system populates specific data elements.

B.

Application automated interfaces

C.

The source system processes copy data that has changed into a separate object as part of the transaction, which is then used for the extract process.

D.

The source systems send binary code through ASCI that makes the process rapid.

E.

The source system processes add to a simple list of objects and identifiers when changing data, which is then used to control selection of data extraction.

F.

None of the above

Buy Now
Questions 69

There are numerous methods of implementing databases on the cloud. The most common are:

Options:

A.

Virtual machine image

B.

Distributed machine image

C.

DAAS

D.

Managed database hosting on the cloud

Buy Now
Questions 70

A complexity in documenting data lineage is:

Options:

A.

Establishing data quality metrics

B.

Conflicting application requirements from data owners

C.

Choosing which content management software to use

D.

Identifying source databases

E.

Different data element names and formats

Buy Now
Questions 71

All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 72

Data models comprise and contain metadata essential to data consumers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 73

Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?

Options:

A.

Each division of an enterprise may have its own way to describe its business and associated metrics

B.

There is disagreement among divisions on the meaning of key metrics

C.

There is typically significant waste in an enterprise through duplication of reports and metrics

D.

Increasing regulation in industry can impose real penalties in terms of substantial fines or jail terms for non-compliance to properly managed data (e.g. accurate reporting/accounting)

E.

I've been to a conference and found that lots of our competitors are doing it

Buy Now
Questions 74

A data lineage tool enables a user to:

Options:

A.

Track the data from source system to a target database; understanding itstransformations

B.

Track the historical changes to a data value

C.

Visualize how the data gets to the data lake

D.

Enables rapid development of dashboard reporting

E.

Line up the data to support sophisticated glossary management

Buy Now
Questions 75

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 76

E-discovery is the process of finding electronic records that might serve as evidence in a legal action.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 77

Poorly managed Metadata leads to, among other, redundant data and data management processes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 78

The data in Data warehouses and marts differ. Data is organized by subject rather than function

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 79

ISO 8000 will describe the structure and the organization of data quality management, including:

Options:

A.

Data Quality Availability

B.

Data Quality Planning

C.

Data Quality Control

D.

Data Quality Assurance

E.

Data Quality Improvement

Buy Now
Questions 80

A general principle for managing metadata includes Responsibility.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 81

SOR Stands for:

Options:

A.

Service of Record

B.

System of Record

C.

System on Record

D.

Service over Record

Buy Now
Questions 82

Small reference data value sets in the logical data model can be implemented in a physical model in three common ways:

Options:

A.

Create a matching separate code table

B.

Create a master shared code table

C.

None of the above

D.

Program integration by joining tables

E.

Embed rules or valid codes into the appropriate object’s definition.

F.

Roadmap Development

Buy Now
Questions 83

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

Options:

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Buy Now
Questions 84

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 85

Over a decade an organisation has rationalised implementation of party concepts

from 48 systems to 3. This is a result of good:

Options:

A.

Data quality and data governance

B.

Data architecture and data warehousing

C.

Data operations and system rationalization

D.

System rationalization and metadata management

E.

Data architecture and data governance

Buy Now
Questions 86

Databases are categorized in three general ways:

Options:

A.

Warped

B.

Non-relational

C.

Relational

D.

Accessible

E.

None of the above

F.

Hierarchical

Buy Now
Questions 87

In a data warehouse, where the classification lists for organisation type are

inconsistent in different source systems, there is an indication that there is a lack of

focus on:

Options:

A.

Metadata Management

B.

Data Storage

C.

Data Modelling

D.

Master Data

E.

Reference data

Buy Now
Questions 88

Communications are essential to the success of a DMM or Data Governance assessment. Communications are important because:

Options:

A.

Communications can influence the socialization and acceptance of the results and implementation of a data management or Data Governance program

B.

Many organizations will overlook the communications aspect of a data management or Data Governance assessment

C.

Findings may affect stakeholder's positions and roles

D.

Each organization will approach data management and Data Governance communications differently

E.

Data management and Data Governance communications are different from each other

Buy Now
Questions 89

An input in the data architecture context diagram includes data governance.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 90

Structural Metadata describe srealtionships within and among resource and enables identification and retrieval.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 91

In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 92

Metadata is described using a different set of categories, not including:

Options:

A.

Descriptive metadata

B.

Database metadata

C.

Structural metadata

D.

Administrative metadata

Buy Now
Questions 93

Those responsible for the data-sharing environment have an obligation to downstream data consumers to provide high quality data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 94

Metrics tied to Reference and Master Data quality include:

Options:

A.

Strategic usage reporting

B.

Amsterdam Information Model

C.

Data change activity

D.

Total cost of ownership

Buy Now
Questions 95

Adoption of a Data Governance program is most likely to succeed:

Options:

A.

When the CDO is a charismatic leader

B.

In 1 or 2 months with a large consulting team

C.

When the entire enterprise is partaking at once

D.

When dictated by senior executives

E.

With an incremental rollout strategy

Buy Now
Questions 96

The implementation of a Data Warehouse should follow guiding principles, including:

Options:

A.

Data Efficiency

B.

One size does not fit all

C.

Contracts

D.

Focus on the business goals

E.

Start with the end in mind

F.

Collaborate

Buy Now
Questions 97

Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:

Options:

A.

Consistency

B.

Rich data sources

C.

Information alignment and analysis

D.

Information delivery

E.

Presentation of findings and data insights

F.

All of the above

Buy Now
Questions 98

MPP is an abbreviation for Major Parallel Processing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 99

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:

Options:

A.

Regulatory compliance

B.

Data quality improvements

C.

Metadata management

D.

Efficiency in development projects

E.

Vendor management

F.

All of the above

Buy Now
Questions 100

The acroymn ACID stands for.

Options:

A.

Atomicity, completeness, independence and durability

B.

Actual, created, identifled and deleted

C.

Avallable, completeness, isolation and dangerous

D.

Atomicity, consistency, isolation and durability

E.

Available, corrupt, isolation and durable

Buy Now
Questions 101

Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?

Options:

A.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

B.

Alignment of Business and IT strategies, definition of data standards, implementation of Data Governance and metadata software tools

C.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

D.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

E.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

Buy Now
Questions 102

Which of the following are must-do for any successful Data Governance programme?

Options:

A.

Create a communications plan to inform to all stakeholders what you are doing.

B.

Ensure there is a Data Governance Policy with which everyone in the organization is required to comply.

C.

Create a training programme for all for data owners and data stewards.

D.

Set up a wiki for incorrect data definitions.

E.

Allocate Data Ownership responsibilities according to their role in the organization.

Buy Now
Questions 103

Change only requires change agents in special circumstances, especially when there is little to no adoption.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 104

Data can be assessed based on whether it is required by:

Options:

A.

Regulatory reporting

B.

Capturing policy

C.

Ongoing operations

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Business policy

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 105

Managing business party Master Data poses these unique challenges:

Options:

A.

Difficulties in unique dimensions

B.

Difficulties in unique identification

C.

Reference data anomaly detection

D.

The number of data sources and the differences between them

Buy Now
Questions 106

Through similarity analysis, slight variation in data can be recognized and data values can be consolidated. Two basic approaches, which can be used together, are:

Options:

A.

Realistic

B.

Opportunistic

C.

Deterministic

D.

Probabilistic

E.

Procedural

F.

All of the above

Buy Now
Questions 107

Data access control can be organized at an individual level or group level, depending on the need.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 108

The term data quality refers to only the characteristics associated with high quality data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 109

A business driver for Master Data Management program is managing data quality.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 110

The accuracy dimension has to do with the precision of data values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 111

Different types of metadata include:

Options:

A.

Business, Technical and Operational

B.

Business. Quality, and Introspective

C.

Business, Application and Processing

D.

Business, Information, Application and Technology

E.

Fluid, static and viscous

Buy Now
Questions 112

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

Options:

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Buy Now
Questions 113

An implemented warehouse and its customer facing BI tool is a data product.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 114

Uniqueness, as a dimension of data quality, states no entity exists more than once within the data set.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 115

A database uses foreign keys from code tables for column values. This is a way of

implementing:

Options:

A.

Event data

B.

Temporal data

C.

Reference data

D.

Master data

E.

Star schema data

Buy Now
Questions 116

Effective document management requires clear policies and procedures, especially regarding retention and disposal of records.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 117

When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?

Options:

A.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

B.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

C.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

D.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

E.

Alignment of Business and Technology strategies, definition of data standards, implementation of supporting metadata and process tools, management of responsibility

Buy Now
Questions 118

The number of entities in a relationship is the arity of the relationship. The most common are:

Options:

A.

Unary

B.

Binary

C.

Trinary

D.

Ternary

Buy Now
Questions 119

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 120

Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 121

All assessments should include a roadmap for phased implementation of the recommendations. This is important because:

Options:

A.

The roadmap shows how to implement the important assessment results, and when to do so

B.

A roadmap will highlight items in an implementation sequence and on other considerations (budget, resources, other programs, etc.)

C.

A roadmap is just another way of saying you should have a plan

D.

A roadmap is the only way for the organization to understand the results of the assessment

E.

A roadmap includes a project plan, which gives the stakeholders information on how each recommendation will be implemented

Buy Now
Questions 122

Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 123

Disciplines within the enterprise architecture practice does not include:

Options:

A.

Technology architecture

B.

Application architecture

C.

Information architectureService Architecture

D.

Business architecture

Buy Now
Questions 124

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

Options:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Buy Now
Questions 125

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

Options:

A.

Stakeholders

B.

Government regulations

C.

Proprietary business concerns

D.

Legitimate access needs

E.

Contractual obligations

F.

None of the above

Buy Now
Questions 126

Data professionals involved in Business Intelligence, analytics and Data Science are often responsible for data that describes: who people are; what people do; where people live; and how people are treated. The data can be misused and counteract the principles underlying data ethics.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 127

Data security issues, breaches and unwarranted restrictions on employee access to data cannot directly impact operational success.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 128

Three classic implementation approaches that support Online Analytical Processing include:

Options:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Buy Now
Questions 129

Considerations for whether to integrate two data stores should include all except

the:

Options:

A.

Maintaining of master data trust across the two data stores

B.

Privacy and access consideration for the data

C.

Complexity of data operations

D.

Ability to govern the data across both systems

E.

Capability of the systems to support the data natively

Buy Now
Questions 130

An implemented warehouse and its customer-facing BI tools is a technology product.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 131

Inputs in the data modelling and design context diagram include:

Options:

A.

Data standards

B.

Data sets

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Enterprise taxonomy

Buy Now
Questions 132

Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 133

Data governance and IT governance are the same thing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 134

Deliverables in the data management maturity assessment context diagram include:

Options:

A.

Maturity baseline

B.

Roadmap

C.

Executive briefings

D.

Recommendations

E.

Risk assessment

F.

Ratings and ranks

Buy Now
Questions 135

Please select valid modelling schemes or notations

Options:

A.

NoSQL

B.

Dimensional

C.

Relational

D.

Object-orientated

E.

Fact-based

F.

Matrix-based

Buy Now
Questions 136

All organizations have the same Master Data Management Drivers and obstacles.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 137

Please select the correct definition of Data Management from the options below.

Options:

A.

Data Management is the strict control of all plans, policies, programs and practices that enable the business strategy to be successfully executed.

B.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data and information assets throughout their lifecycles.

C.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data assets throughout their lifecycles.

D.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of information assets throughout their lifecycles.

Buy Now
Questions 138

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 139

Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 140

Validity, as a dimension of data quality, refers to whether data values are consistent with a defined domain of values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 141

Record management starts with a vague definition of what constitutes a record.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 142

Some document management systems have a module that may support different types of workflows such as:

Options:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Buy Now
Questions 143

Deliverables in the Metadata Management context diagram include:

Options:

A.

Metadata Strategy

B.

Metadata Standards

C.

Data Lineage

D.

Metadata Architecture

E.

Metadata design

F.

Data storage and operations

Buy Now
Questions 144

How can the Data Governance process best support Regulatory reporting requirements?

Options:

A.

By providing a look up service for definitions

B.

By ensuring that data is properly owned, understood, defined, documented and controlled

C.

By performing a data audit

D.

By creating a map of the enterprise data stores where copies of information may be found

E.

By highlighting challenges of multiple definitions within the enterprise

Buy Now
Questions 145

A metadata repository is essential to assure the integrity and consistent use of an enterprise data model across business processes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 146

A sandbox is an alternate environment that allows write-only connections to production data and can be managed by the administrator.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 147

Business Intelligence tool types include:

Options:

A.

Technology reporting

B.

Operational reporting

C.

Descriptive, self-service analytics

D.

Operations performance management (OPM)

E.

Business performance management (BPM)

F.

Predictive, self-service analytics

Buy Now
Questions 148

Achieving security risk reduction in an organisation begins with developing what?

Options:

A.

A change management model, prioritising security changes and then updatingthe active directory

B.

An enterprise data model, rolling out data flow diagrams and enbedding securityinto the database

C.

A security model, classifying each organisational role and putting the physicaldata behind a firewall

D.

A classification model, classifying each data concept and locating the physicaldata

E.

A metadata model, locating the data and moving it into the metadata repository

Buy Now
Questions 149

Class operations can be:

Options:

A.

General: Hidden

B.

Public: Externally visible

C.

Internally visible: Visible to children objects

D.

Private: Hidden

Buy Now
Questions 150

The advantage of a decentralized data governance model over a centralized model is:

Options:

A.

The common metadata repository configurations

B.

Having a common approach to resolving data governance issues

C.

The easier implementation of industry data models

D.

An increased level of ownership from local decision making groups

E.

The cheaper execution of data governance operations

Buy Now
Questions 151

Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 152

Dimensions of data quality include:

Options:

A.

Validity

B.

Privacy

C.

Innovation

D.

Accessibility

E.

Currency

F.

All of the above

Buy Now
Questions 153

Inputs in the data quality context diagram include:

Options:

A.

Data stores

B.

Data lakes

C.

Business requirements

D.

Data quality expectations

Buy Now
Questions 154

The neutral zone is one of the phases in the Bridges’ transition phases.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 155

Data science depends on:

Options:

A.

Information alignment and analysis

B.

Presentation of findings and data insights

C.

Rich data sources

D.

Information delivery

Buy Now
Questions 156

Data Standards used by the enterprise must:

Options:

A.

Promote consistent results but periodically reviewed and updated

B.

Be a guideline for the organization but open to interpretation

C.

Promote consistent results so only written once and never updated

D.

Only be necessary for the Data Governance team

E.

Set by an standards organization and not by the enterprise

Buy Now
Questions 157

The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:

Options:

A.

Level 2 In Development

B.

Level 4 Proactive

C.

Level 2 Sub-standard

D.

Level 4 Proactive

E.

Level 3 Transformational

F.

Level 3 Essential

Buy Now
Questions 158

What business function is best aligned to deliver oversight to data architecture ?

Options:

A.

Data Govemance

B.

Business Innovation

C.

Business Integration

D.

Chief Technology Office

E.

Enterprise Architecture

Buy Now
Questions 159

Data Stewards are most likely to be responsible for:

Options:

A.

Data Modelling and Data Security

B.

Data Integration and Interoperability

C.

Data Storage and Operations

D.

Content and Document Management

E.

Data Governance and Data Quality

Buy Now
Questions 160

A deliverable in the data modelling and design context diagram is the logical data model.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 161

The best way to validate that a database backup is working, is to:

Options:

A.

Periodically recover from the backup file

B.

Appoint a special DBA in charge of backups

C.

Check the size of the backup file

D.

Check the backup logs every day

E.

Check for the automatic email notification of backup success

Buy Now
Questions 162

The DMBOK support’s DAMA’s mission by:

Options:

A.

Establish a common vocabulary

B.

Guides IT personnel to improve data management

C.

Serving as the fundamental reference guide

D.

roviding a functional framework

Buy Now
Questions 163

Business glossary is not merely a list of terms. Each term will be associated with other valuable metadata such as synonyms, metrics, lineage, or:

Options:

A.

Sanctioned rules

B.

Archive Rules

C.

Business Rules

D.

Database Type

E.

Data Length

Buy Now
Questions 164

Data modeller: responsible for fata model version control an change control

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 165

Key processing steps for MDM include:

Options:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Buy Now
Questions 166

Data governance program must contribute to the organization by identifying and delivering on specific benefits.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 167

Data Fabric is:

Options:

A.

A superior star schema strategy

B.

A form of data lake that automates data acquisition and initial data qualityprocessing

C.

A metadata repository

D.

A way of sewing together different data concepts into a single data warehouse

E.

Just another data warehouse with no distinguishing features

Buy Now
Questions 168

The steps followed in managing data issues include:

Options:

A.

Standardization, Allocation, Assignment, and Correction

B.

Standardization, Explanation, Ownership, and Completion

C.

Read, Guess, Code, Release

D.

Standardization, Assignment, Escalation, and Completion

E.

Escalation, Review, Allocation and Completion

Buy Now
Questions 169

Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 170

A data warehouse deployment with multiple ETL, storage and querying tools often

suffers due to the lack of:

Options:

A.

Integration of the dictionaries to achieve common understanding

B.

Conflict between software vendors

C.

Disk space on the big data platform

D.

Quality data modelers

E.

Common data types in the source datasets

Buy Now
Questions 171

Following the rollout of a data issue process, there have been no issues recorded in the first month. The reason for this might be:

Options:

A.

A lack of credibility in the Data Governance process to really affect changes

B.

The automatic deletion of all issues in the database

C.

Staff staying back late to enter the issues into the system

D.

The denial of overtime requests

E.

There are no data issues in the enterprise

Buy Now
Questions 172

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

Options:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Buy Now
Questions 173

Examples of technical metadata include:

Options:

A.

Column Properties

B.

Access permissions

C.

Internal

D.

Conceptual

E.

ETL job details

Buy Now
Questions 174

Differentiating between data and information. Please select the correct answers based on the sentence below: Here is a marketing report for the last month [1]. It is based on data from our data warehouse[2]. Next month these results [3] will be used to generate our month-over-month performance measure [4].

Options:

A.

[1] Information, [2] Information, [3] Data, [4] Information

B.

[1] Data, [2] Information, [3] Data, [4] Data

C.

[1] Data, [2] Data, [3] Data, [4] Information

D.

[1] Information, [2] Data, [3] Data, [4] Information

Buy Now
Questions 175

To build models, data modellers heavily rely on previous analysis and modelling work.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 176

Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 177

Changes to reference data do not need to be management, only metadata should be managed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 178

You have completed analysis of a Data Governance issue in your organisation and have presented your findings to the executive management team. However, your findings are not greeted warmly and you find yourself being blamed for the continued existence of the issue. What is the most likely root cause for this?

Options:

A.

You did not secure appropriate budget or resources for the engagement and did not properly define the project charter

B.

You failed to correctly scope the analysis project and did not secure resources to deliver a fully executed solution to address root causes

C.

You failed to communicate to your team the importance of achieving a workable solution to the issues identified

D.

You failed to correctly manage expectations about the roles, responsibilities, and accountabilities for Data Governance in the organisation and are dependent on other areas to execute your recommendations

E.

You adopted an incorrect methodology to your Data Governance and have failed to execute necessary information management tasks

Buy Now
Questions 179

What result(s) is/are Data Handling Ethics trying to avoid?

Options:

A.

Loss of reputation for the organization and loss of customers

B.

Unethical use of information by staff to achieve business outcomes; customers trust so they are willing to pay more

C.

Increased Risk for people whose data is exposed and criminal proceedings

D.

Ensure that Data Governance is in line with Corporate Governance and ethic business statements

E.

Ensure that organizations are adhering to ethical standards set by industry and bodies such as the World Economic Forum

Buy Now
Questions 180

Referential Integrity (RI) is often used to update tables without human intervention. Would this be a good idea for reference tables?

Options:

A.

Yes, since Standards Bodies typically supply reference data, the enterprise can automatically update when a new code or value is received

B.

No, updates should always be made directly via data entry or through a specific batch interface based on operator-entered information partly because of regulatory reporting and archiving

C.

Yes, you do not have to worry about archived data with reference data so tables can be updated automatically

D.

No, but an enterprise can use program logic to do updates as there is little potential for problems to occur with reference data

E.

Yes, older transactions do not have to be removed because with the Cloud there is unlimited database storage

Buy Now
Questions 181

Different types of product Master Data solutions include:

Options:

A.

People Lifecycle Product Management (PLPM)

B.

Product data in Manufacturing Execution Systems (MES)

C.

None of the above

D.

Product Data in Enterprise Resource Planning (ERP)

E.

Product Lifecycle Management (PLM)

Buy Now
Questions 182

Malware refers to any infectious software created to damage, change or improperly access a computer or network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 183

Self-service is a fundamental delivery channel in the BI portfolio.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 184

Corrective actions are implemented after a problem has occurred and been detected.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 185

Data mining is a sub-field of supervised learning where users attempt to model data elements and predict future outcomes through the evaluation of probability estimates.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 186

Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.

Options:

A.

Principle of integrity

B.

Principle of availability

C.

Principle of retention

D.

Principle of accountability

Buy Now
Questions 187

The goals of Metadata management include:

Options:

A.

Managing performance of data assets

B.

Ensure metadata quality, consistency, currency and security

C.

Managing the availability of data throughout the data lifecycle

D.

Provide standard ways to make metadata accessible to metadata consumers

E.

Managing the performance of data transactions

F.

Establish or enforce the use of technical Metadata standards to enable data exchange

Buy Now
Questions 188

Data architects facilitate alignment between [1] and [2]

Options:

A.

[1] Business and [2] IT

B.

[1] Technology and [2] Data

C.

[1] Governance and [2] Management

D.

[1] Strategy and [2] Execution

Buy Now
Questions 189

A DMZ is bordered by 2 firewalls. These are between the DMZ and the:

Options:

A.

Internet, for added security

B.

Korean peninsula

C.

Internet and internal systems

D.

Internet and intranet

E.

Internet and extranet

Buy Now
Questions 190

Different storage volumes include:

Options:

A.

Gigabyte

B.

Petabyte

C.

Perabyte

D.

Exabyte

E.

Tetrabyte

F.

Terabyte

Buy Now
Questions 191

Issues caused by data entry processes include:

Options:

A.

Data entry interface issues

B.

List entry placement

C.

Field overloading

D.

None of the above

E.

Training issues

F.

Changes to business processes

Buy Now
Questions 192

Tools required to manage and communicate changes in data governance programs include

Options:

A.

Ongoing business case for data governance

B.

Obtaining buy-in from all stakeholders

C.

Data governance roadmap

D.

Monitoring the resistance

E.

Business/Data Governance strategy map

F.

Data governance metrics

Buy Now
Questions 193

What is the main purpose of developing a Data Architecture Roadmap?

Options:

A.

To help forward-looking decision making

B.

To help the management of the organization to see the trade-offs

C.

To manage the data dependencies that require active management

D.

To formulate a plan to address architectural problems in the business

E.

To ensure that projects are aligned with business needs and opportunities

Buy Now
Questions 194

The process of building architectural activities into projects also differ between methodologies. They include:

Options:

A.

Waterfall methods

B.

Incremental methods

C.

Kanban method

D.

Agile iterative method

E.

Duck and dive method

F.

Pump and dump method

Buy Now
Questions 195

Critical Data is most often used in

Options:

A.

Regulatory, financial, or management reporting

B.

Business operational needs

C.

Measuring product quality and customer satisfaction

D.

Business strategy, especially efforts at competitive differentiation.

E.

All of these

Buy Now
Questions 196

Several global regulations have significant implications on data management practices. Examples include:

Options:

A.

BCBS 239

B.

Data Standards

C.

Privacy laws

D.

Effectiveness of education Standards

E.

SPCA

F.

PCI-DSS

Buy Now
Questions 197

The goals of Data Integration and Interoperability include:

Options:

A.

Provide data securely, with regulatory compliance, in the format and timeframe needed.

B.

Lower cost and complexity of managing solutions by developing shared models and interfaces.

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Identify meaningful events and automatically trigger alerts and actions.

F.

Support business intelligence, analytics, master data management and operational efficiency efforts.

Buy Now
Questions 198

The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 199

One of the deliverables in the Data Integration and Interoperability context diagram is:

Options:

A.

Data Integration and Interoperability Strategy

B.

Data hogging

C.

Data access agreements

D.

Data security plan

Buy Now
Exam Code: DMF-1220
Exam Name: Data Management Fundamentals
Last Update: May 3, 2025
Questions: 666

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99