Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

DMF-1220 Questions and Answers

Question # 4

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

A.

FALSE

B.

TRUE

Full Access
Question # 5

Business Intelligence, among other things, refer to the technology that supports this kind of analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 6

A sandbox environment can either be a sub-set of the production system, walled off from production processing or a completely separate environment.

A.

TRUE

B.

FALSE

Full Access
Question # 7

Resource Description Framework (RDF), a common framework used to describe information about any Web resource, is a standard model for data interchange in the Web.

A.

FALSE

B.

TRUE

Full Access
Question # 8

Possible application coupling designs include:

A.

Relaxed coupling

B.

Loose coupling

C.

Value coupling

D.

Tight coupling

Full Access
Question # 9

Data profiling also includes cross-column analysis, which can identify overlapping or duplicate columns and expose embedded value dependencies.

A.

TRUE

B.

FALSE

Full Access
Question # 10

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:

A.

Regulatory compliance

B.

Data quality improvements

C.

Metadata management

D.

Efficiency in development projects

E.

Vendor management

F.

All of the above

Full Access
Question # 11

Enterprise Architecture domains include:

A.

Business Architecture

B.

Data Architecture

C.

Data Management Architecture

D.

Systems Architecture

E.

Application Architecture

F.

Technology Architecture

Full Access
Question # 12

Please select the transition phases in Bridges’ Transition process:

A.

The neutral zone

B.

The new beginning

C.

The ending

D.

The transition

E.

The translation

F.

The game

Full Access
Question # 13

Creating the CDM involves the following steps:

A.

Select Scheme

B.

Obtain Sign-off

C.

Complete Initial CDM

D.

Select Notation

E.

Incorporate Enterprise Technology

F.

All of the above

Full Access
Question # 14

Please select the 3 visuals that depict DAMA’s Data Management Framework.

A.

The DAMA Octagon

B.

The Knowledge Area Context Diagram

C.

The Data Quality Function Context Diagram

D.

The DAMA Wheel

E.

The Environmental Factors hexagon

Full Access
Question # 15

Preparation and pre-processing of historical data needed in a predictive model may be performed in nightly batch processes or in near real-time.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Communication should start later in the process as too many inputs will distort the vision.

A.

TRUE

B.

FALSE

Full Access
Question # 17

The load step of the ETL is physically storing or presenting the results of the transformation into the source system.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.

A.

TRUE

B.

FALSE

Full Access
Question # 19

Please select the correct name for the LDM abbreviation

A.

Logical Data Model

B.

Logical Dimensional Model

C.

Lifecycle Data Model

D.

Lifecycle Dimensional Model

Full Access
Question # 20

Accomplish repository scanning in two distinct approaches, including:

A.

Semi- proprietary integration

B.

Proprietary interface

C.

Semi-proprietary interface

D.

Proprietary integration

Full Access
Question # 21

SOA stand for Service Orchestrated Architecture

A.

TRUE

B.

FALSE

Full Access
Question # 22

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

A.

TRUE

B.

FALSE

Full Access
Question # 23

SLA Stands for:

A.

Service Level Agreement

B.

System Lifecycle Audit

C.

System Latitude Audit

D.

Service Lifecycle Audit

Full Access
Question # 24

SBA is an abbreviation for service-based architecture.

A.

TRUE

B.

FALSE

Full Access
Question # 25

E-discovery is the process of finding electronic records that might serve as evidence in a legal action.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Critical success factors throughout the BI/DW lifecycle include:

A.

Business readiness

B.

A clear and consistent focus

C.

Vision alignment

D.

Business sponsorship

E.

Linear symmetry

F.

A consistent line across display methods

Full Access
Question # 27

Common OLAP operations include:

A.

Drill down/up

B.

Roll-up

C.

Slice

D.

Dice

E.

All of the above

F.

Cut

Full Access
Question # 28

ETL is the basic process which is central to all areas in Data Integration and Interoperability. It is an abbreviation for extract, transition and load.

A.

TRUE

B.

FALSE

Full Access
Question # 29

Some document management systems have a module that may support different types of workflows such as:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Full Access
Question # 30

Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity

A.

FALSE

B.

TRUE

Full Access
Question # 31

The Shewhart chart contains the following elements:

A.

Plan

B.

Utilization

C.

Do

D.

Check

E.

Act

F.

All of the above

Full Access
Question # 32

Please select the correct General Accepted Information Principles:

A.

Asset Principle

B.

Audit Principle

C.

Due Diligence Principle

D.

Going Concern Principle

E.

Ethical Principle

F.

All of the above

Full Access
Question # 33

In gathering requirements for DW/BI projects, begin with the data goals and strategies first.

A.

TRUE

B.

FALSE

Full Access
Question # 34

Corrective actions are implemented after a problem has occurred and been detected.

A.

FALSE

B.

TRUE

Full Access
Question # 35

MPP is an abbreviation for Major Parallel Processing.

A.

TRUE

B.

FALSE

Full Access
Question # 36

Coupling describes the degree to which two systems are intertwined.

A.

FALSE

B.

TRUE

Full Access
Question # 37

Measuring the effects of change management on in five key areas including: Awareness of the need to change; Desire to participate and support the change; Knowledge about how to change; Ability to implement new skills and behaviors; and Reinforcement to keep the change in place.

A.

FALSE

B.

TRUE

Full Access
Question # 38

Enterprise data architecture description must include both [1] as well as [2]

A.

[1] Data Flow Design [2] Data Context Diagram

B.

[1] Enterprise Data Model [2] Architecture Diagram

C.

[1] Enterprise Data Model [2] Data Flow Design

D.

[1] Enterprise Data Model [2] Data Context Diagram

Full Access
Question # 39

Data quality issues only emerge at initial stages of the data lifecycle.

A.

TRUE

B.

FALSE

Full Access
Question # 40

Data mining is a sub-field of supervised learning where users attempt to model data elements and predict future outcomes through the evaluation of probability estimates.

A.

TRUE

B.

FALSE

Full Access
Question # 41

An Operational Data Mart is a data mart focused on tactical decision support.

A.

TRUE

B.

FALSE

Full Access
Question # 42

Data profiling is a form of data analysis used to inspect data and assess quality.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Security Risks include elements that can compromise a network and/or database.

A.

TRUE

B.

FALSE

Full Access
Question # 44

The four main types of NoSQL databases are:

A.

Document

B.

Row-orientated

C.

Graph

D.

Strategic

E.

Key-value

F.

Column-orientated

Full Access
Question # 45

Data Integrity includes ideas associated with completeness, accuracy, and consistency.

A.

TRUE

B.

FALSE

Full Access
Question # 46

Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.

A.

FALSE

B.

TRUE

Full Access
Question # 47

All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 48

When assessing security risks it is required to evaluate each system for the following:

A.

The current security protections in place

B.

The requirements to protect the data

C.

None of the above

D.

All of the above

E.

The complexity of the data stored or in transit

F.

The sensitivity of the data stored or in transit

Full Access
Question # 49

Three data governance operating models types include:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Full Access
Question # 50

ECM is an abbreviation for:

A.

Enterprise compliance management

B.

Enterprise compliance manager

C.

Enterprise component management

D.

Enterprise content management

Full Access
Question # 51

Vulnerability is defined as:

A.

a patch in a system that allows it to be successfully unpatched and compromised.

B.

being highly data risk rated

C.

a strength in a system that allows external stakeholders to view data records.

D.

a weakness or defect in a system that allows it to be successfully attacked and compromised.

Full Access
Question # 52

Types of metadata include:

A.

Strategic

B.

Business

C.

Column-orientated

D.

Operational

E.

Graph

F.

Technical

Full Access
Question # 53

Confidentiality classification schemas might include two or more of the five confidentiality classification levels. Three correct classifications levels are:

A.

Consistency

B.

Internal use only

C.

Restricted confidential

D.

System development

E.

Confidential

F.

None of the above

Full Access
Question # 54

The acronym BASE is made up of:

A.

Basically available

B.

Basically not available

C.

Software state

D.

Soft state

E.

Eventual consistency

F.

Everything considered

Full Access
Question # 55

Please select the correct definition of Data Management from the options below.

A.

Data Management is the strict control of all plans, policies, programs and practices that enable the business strategy to be successfully executed.

B.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data and information assets throughout their lifecycles.

C.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data assets throughout their lifecycles.

D.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of information assets throughout their lifecycles.

Full Access
Question # 56

Data governance can be understood in terms of political governance. It includes the following three function types:

A.

Legislative-like functions

B.

Judicial-like functions

C.

Ethical-like functions

D.

Executive functions

E.

Data-like functions

F.

Morality-like functions

Full Access
Question # 57

The acronym CMDB stands for:

A.

Customization management tools or databases

B.

Classic management technologies or databases

C.

Cached management technologies or databases

D.

Configuration management tools or databases

E.

Cached management tools or databases

F.

Classic monitoring technologies or databases

Full Access
Question # 58

Please select the types of DBA specializations:

A.

Data

B.

Application

C.

Innovation

D.

Development

E.

Procedural

F.

All of the above

Full Access
Question # 59

Business people must be fully engaged in order to realize benefits from the advanced analytics.

A.

TRUE

B.

FALSE

Full Access
Question # 60

Poorly managed metadata leads to:

A.

Row-orientated metadata

B.

Graph metadata issues

C.

Redundant data and data management processes

D.

Doubt about the reliability of metadata and data

E.

Redundant master data

F.

Document inefficiencies

Full Access
Question # 61

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.

A.

TRUE

B.

FALSE

Full Access
Question # 62

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Full Access
Question # 63

Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.

A.

TRUE

B.

FALSE

Full Access
Question # 64

A goal of Data warehouse and business intelligence is to support and enable ineffective business analysis and decision making by knowledge workers.

A.

TRUE

B.

FALSE

Full Access
Question # 65

CIF stands for:

A.

Company Information Factory

B.

Corporate Information Floor

C.

Corporate Information Factories

D.

Corporate Information Factory

Full Access
Question # 66

SOA is an abbreviation for service orientated architecture.

A.

FALSE

B.

TRUE

Full Access
Question # 67

Uniqueness, as a dimension of data quality, states no entity exists more than once within the data set.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.

A.

TRUE

B.

FALSE

Full Access
Question # 69

Activities that drive the goals in the context diagram are classified into the following phases:

A.

Plan, Develop, Operate, Control

B.

Plan, Do, Check, Act

C.

Measure, Develop, Implement, Monitor, Improve

D.

Planning, Analysis, Design, Implementation & Maintenance

Full Access
Question # 70

Business rules describe why business should operate internally, in order to be successful and compliant with the outside world.

A.

FALSE

B.

TRUE

Full Access
Question # 71

When selecting a DMM framework one should consider of it is repeatable.

A.

TRUE

B.

FALSE

Full Access
Question # 72

Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.

A.

FALSE

B.

TRUE

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 10 Aug 2022