Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

DMF-1220 Data Management Fundamentals Questions and Answers

Questions 4

Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

To understand and evaluate ethical use of data within the organization what principles should we base our decisions on?

Options:

A.

Principles focused on ideas such as fairness, respect, responsibility, integrity, quality, reliability, transparency and trust

B.

Data Security and Privacy Principles

C.

Data Management principles that have been agreed by the organization

D.

There are several ethical theories that need to be understood and will provide the principles we have to apply: 1. Virtue-based ethics. 2. Deontological ethics. 3. Consequentialist ethics

E.

Generally Accepted Information Principles defined by GAAP

Buy Now
Questions 6

Enterprise Architecture domains include:

Options:

A.

Business Architecture

B.

Data Architecture

C.

Data Management Architecture

D.

Systems Architecture

E.

Application Architecture

F.

Technology Architecture

Buy Now
Questions 7

Examples of transformation in the ETL process onclude:

Options:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Buy Now
Questions 8

What result(s) is/are Data Handling Ethics trying to avoid?

Options:

A.

Loss of reputation for the organization and loss of customers

B.

Unethical use of information by staff to achieve business outcomes; customers trust so they are willing to pay more

C.

Increased Risk for people whose data is exposed and criminal proceedings

D.

Ensure that Data Governance is in line with Corporate Governance and ethic business statements

E.

Ensure that organizations are adhering to ethical standards set by industry and bodies such as the World Economic Forum

Buy Now
Questions 9

The best way to validate that a database backup is working, is to:

Options:

A.

Periodically recover from the backup file

B.

Appoint a special DBA in charge of backups

C.

Check the size of the backup file

D.

Check the backup logs every day

E.

Check for the automatic email notification of backup success

Buy Now
Questions 10

A primary business driver of data storage and operations is:

Options:

A.

Business data modelling

B.

Business rules

C.

Business continuity

D.

Hardware sales

E.

Business process optimization

Buy Now
Questions 11

Because Data Governance activities require coordination across functional areas, the DG program must establish an ___________ that defines accountabilities and intersections.

Options:

A.

Alliance

B.

Operating framework

C.

Organization

D.

Enterprise-wide coalition

E.

Architecture framework

Buy Now
Questions 12

An organization can enhance its Data Governance program and thereby improve its approach to enterprise data management. This is important for the following reason:

Options:

A.

Since most organizations start Data Governance in silos and not at the enterprise level, it is important to be able to assess current state and determine desired targeted state that supports the overall vision

B.

Often organizations have a data repository or dictionary that is just as good as Data Governance

C.

Data Governance programs are rarely enhanced once they are launched

D.

Assessing current state for Data Governance may not tell the organization the current state of other components

E.

Starting a Data Governance program does not require that the organization start a data management program

Buy Now
Questions 13

The purpose for adding redundancy to a data model (denormalisation) is to:

Options:

A.

Make it easier for developers to join tables

B.

Avoid the loss of data by storing key values more than once

C.

Improve aggregate database performance across read requests

D.

Fully utilize all the indexes

E.

Ensure surrogate keys are retaining their unique values in all satellite tables

Buy Now
Questions 14

Type of Reference Data Changes include:

Options:

A.

Row level changes to internal Reference Data sets

B.

Row level changes to external Reference Data sets

C.

Creation of new Reference Data sets

D.

Business model changes on column level

E.

Structural changes to external Reference Data sets

F.

None of the above

Buy Now
Questions 15

The data in Data warehouses and marts differ. Data is organized by subject rather than function

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

Once the most critical business needs and the data that supports them have been identified, the most important part of the data quality assessment is actually looking data, querying it to understand data content and relationships, and comparing actual data to rules and expectations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

The Data Governance Council (DGC) manages data governance initiatives, issues, and escalations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

Issue management is the process for identifying, quantifying, prioritizing, and resolving Data Governance issues. Which of the following are areas where that issues might arise:

Options:

A.

Contract negotiations regarding data sharing & resolution of data quality issues

B.

Documenting accounting procedures

C.

Documenting physical assets

D.

Authority and decision rights Change management escalations Meeting Compliance requirements

E.

Conformance issues related to policies, standards and principles

Buy Now
Questions 19

Data access control can be organized at an individual level or group level, depending on the need.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

There are several methods for masking data:

Options:

A.

Substitution

B.

Temporal variance

C.

Temporal stagnation

D.

Value stagnation

E.

Value variance

F.

All of the above

Buy Now
Questions 21

Communications are essential to the success of a DMM or Data Governance assessment. Communications are important because:

Options:

A.

Communications can influence the socialization and acceptance of the results and implementation of a data management or Data Governance program

B.

Many organizations will overlook the communications aspect of a data management or Data Governance assessment

C.

Findings may affect stakeholder's positions and roles

D.

Each organization will approach data management and Data Governance communications differently

E.

Data management and Data Governance communications are different from each other

Buy Now
Questions 22

A pensioner who usually receives a quarterly bill of around $300 was sent a

$100,000,000 electricity bill. They were a victim of poor data quality checks in

which dimension?

Options:

A.

Currency

B.

Integrity

C.

Accuracy

D.

Reasonableness

E.

Timeliness

Buy Now
Questions 23

Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

Time-based patterns are used when data values must be associated in chronological order and with specific time values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

Release management is critical to batch development processes that grows new capabilities.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

Business activity information is one of the types of data that can be modelled.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

Within the Data Handling Ethics Context Diagram a key deliverable is the Ethical Data Handling Strategy.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

Which of the following is NOT a goal of Data Quality?

Options:

A.

Identify and advocate for opportunities to improve the quality of data, throughprocess and system improvements

B.

Define standards, requirements, and specifications for data quality controls aspart of thedata lifecycle.

C.

Develop a governed approach to make data fit for purpose based on dataconsumers" requirements

D.

Define and implement processes to measure, monitor, and report on data qualitylevels

E.

Understand and comply with all relevant regulations and policies for privacy.protection, and confidentiality

Buy Now
Questions 30

Business people must be fully engaged in order to realize benefits from the advanced analytics.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

Please select the correct name for the PDM abbreviation when referring to modelling.

Options:

A.

Physical Dimension Model

B.

Photo Data Model

C.

None of the above

D.

Probabilistic Dimension Model

E.

Photo Dimensional Model

F.

Physical Data Model

Buy Now
Questions 32

Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

ISO 8000 will describe the structure and organization of data quality management, including:

Options:

A.

Data Quality Assurance

B.

None of the above

C.

Data Quality Planning

D.

Data Quality Audit

E.

Data Quality Control

F.

Data Quality Improvement

Buy Now
Questions 36

A lineage data tool provides:

Options:

A.

Scope for reporting requirements

B.

A temporal distortion of data values across systems

C.

The capture and maintenance of source structures for each attribute on the datamodel

D.

Ancestral origin of data DNA

E.

A clean line between columns in the same entity

Buy Now
Questions 37

Wat data architecture designs represent should be clearly documented. Examples include:

Options:

A.

Priority

B.

Retirement

C.

Preferred

D.

All of the above

E.

Current

F.

Emerging

Buy Now
Questions 38

Value is the difference between the cost of a thing and the benefit derived from that thing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

Examples of the ‘What’ entity category include the following nouns:

Options:

A.

Product

B.

Service

C.

Time

D.

Sales amount

E.

Payment quantity

F.

All of the above

Buy Now
Questions 40

Different types of product Master Data solutions include:

Options:

A.

People Lifecycle Product Management (PLPM)

B.

Product data in Manufacturing Execution Systems (MES)

C.

None of the above

D.

Product Data in Enterprise Resource Planning (ERP)

E.

Product Lifecycle Management (PLM)

Buy Now
Questions 41

Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:

Options:

A.

Each type of stakeholder may need a different form of interaction, and each process evaluation may lend itself to a different form of information gathering

B.

Data management and Data Governance assessments will have different types of stakeholders

C.

The definition of stakeholder interaction depends on the executive sponsor

D.

Assessment teams may not know what a stakeholder is

E.

Each type of stakeholder may need a different form of data and security

Buy Now
Questions 42

Data replication is useful as it provides:

Options:

A.

The ability to spread the workload across multiple databases

B.

Opportunities to secure sensitive data

C.

An alternative to backups

D.

Enables different table structures to be built

E.

Insights into customer retention

Buy Now
Questions 43

The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:

Options:

A.

What -> The inventory Column

B.

What -> The entity column

C.

When -> The timing column

D.

Why -> The motivation column

E.

Who -> The responsibility column

F.

How -> The process column

Buy Now
Questions 44

A critical step in data management organization design is identifying the best-fit operating model for the organization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

An authoritative system where data is created/captured, and/or maintained through

a defined set of rules and expectations is called:

Options:

A.

A System of Systems

B.

A System of Retirement

C.

A System of Record

D.

A System of Reference

E.

A System of Referential Integrity

Buy Now
Questions 46

The acronym BASE is made up of:

Options:

A.

Basically available

B.

Basically not available

C.

Software state

D.

Soft state

E.

Eventual consistency

F.

Everything considered

Buy Now
Questions 47

Some ways to measure value of data include:

Options:

A.

Replacement cost

B.

Market value

C.

Selling Data

D.

Risk cost

E.

Identified opportunities

F.

All of the above

Buy Now
Questions 48

Data governance requires control mechanisms and procedures for, but not limited to, escalating issues to higher level of authority.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 49

The Data Warehouse (DW) is a combination of three primary components: An integrated decision support database, related software programs and business intelligence reports.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 50

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 51

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

Options:

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Buy Now
Questions 52

Data governance and IT governance are the same thing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 53

Types of metadata include:

Options:

A.

Strategic

B.

Business

C.

Column-orientated

D.

Operational

E.

Graph

F.

Technical

Buy Now
Questions 54

Which of the following is NOT required to effectively track data quality incidents?

Options:

A.

An effective service level agreement with defined rewards and penalties

B.

An assignment process to appropriate individuals and teams

C.

A standard vocabulary for classifying data quality issues

D.

A well defined system of escalation based on the impact, duration, or urgency ofan issue

E.

An operational workflow that ensures effective resolution

Buy Now
Questions 55

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:

Options:

A.

Regulatory compliance

B.

Data quality improvements

C.

Metadata management

D.

Efficiency in development projects

E.

Vendor management

F.

All of the above

Buy Now
Questions 56

An input in the data architecture context diagram includes data governance.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

Confirming and documenting understanding of different perspectives facilitate:

Options:

A.

Formalization

B.

Normalization

C.

Scope definition

D.

Knowledge retention/documentation

Buy Now
Questions 58

Inputs in the reference and master data context diagram include:

Options:

A.

None of the above

B.

Business Drivers

C.

Business model

D.

Data Glossary

E.

Cultural Drivers

F.

All of the above

Buy Now
Questions 59

The best preventative action to prevent poor quality data from entering an organisation include:

Options:

A.

Institute a formal change control

B.

Define and enforce rules

C.

Implement data governance and stewardship

D.

None of the above

E.

Train data procedures

F.

Establish data entry controls

Buy Now
Questions 60

A limitation of the centralized approach include: Maintenance of a decentralized repository is costly.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 61

SOR Stands for:

Options:

A.

Service of Record

B.

System of Record

C.

System on Record

D.

Service over Record

Buy Now
Questions 62

Reference and master data require governance processes, including:

Options:

A.

The data sources to be integrated

B.

Emotions matrix

C.

Compliance framework

D.

The priority and response levels of data stewardship efforts

E.

The conditions of use rules to be followed

F.

None of the above

Buy Now
Questions 63

What is the main purpose of developing a Data Architecture Roadmap?

Options:

A.

To help forward-looking decision making

B.

To help the management of the organization to see the trade-offs

C.

To manage the data dependencies that require active management

D.

To formulate a plan to address architectural problems in the business

E.

To ensure that projects are aligned with business needs and opportunities

Buy Now
Questions 64

With respect to health data, what is the difference between the privacy and the security of the data?

Options:

A.

Privacy is defined as the right for an individual to keep his individual health information from being disclosed. Security is defined as the mechanism used to protect privacy of information

B.

Privacy is defined as the right for an doctor to share health data with other doctors and insurance companies. Security is defined as keeping the data where it was recorded

C.

Privacy is defined as the right of the individual to see their own medical records. Security is defined as the laws that protect a person's privacy

D.

Privacy is only possible if a person signs an affidavit requesting privacy. Security is the placing of the document in a safe place

E.

Privacy means only an individual can give access to their medical records to another person. Security means their records are secure and will not be shared

Buy Now
Questions 65

A general principle for managing metadata includes Responsibility.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 66

CIF stands for:

Options:

A.

Company Information Factory

B.

Corporate Information Floor

C.

Corporate Information Factories

D.

Corporate Information Factory

Buy Now
Questions 67

When selecting a DMM framework one should consider of it is repeatable.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

The neutral zone is one of the phases in the Bridges’ transition phases.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 69

Data models are critical to effective management of data. They:

Options:

A.

Provide a common vocabulary around data

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Serve as a primary communication tool during projects

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Provide the organisation with clear system of the architecture

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 70

Most document programs have policies related to:

Options:

A.

Scope and compliance audits

B.

Proper destruction of records

C.

Proper construction of records

D.

Identification and protection of vital records

E.

Partition tolerance

F.

All of the above

Buy Now
Questions 71

A change management program supporting Data Governance should focus communication on what?

Options:

A.

Promoting the value of its data assets, monitor and act on feedback about Data Governance activities & implement data management training programs.

B.

Promote the value of its data assets

C.

Show the value of data stewardship & implement data management training program

D.

How many errors are in each of the various department's data

E.

Implement a data management training program and create a data dictionary

Buy Now
Questions 72

Development of goals, principles and policies derived from the data governance strategy will not guide the organization into the desired future state.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 73

Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.

Options:

A.

Purpose Limitation

B.

Data Minimisation

C.

Accuracy

D.

Storage Limitation

E.

Accountability

F.

All of the above

Buy Now
Questions 74

Please select the four domains of enterprise architecture:

Options:

A.

Enterprise software architecture

B.

Enterprise technology architecture

C.

Enterprise business architecture

D.

Enterprise data architecture

E.

Enterprise hardware architecture

F.

Enterprise application architecture

Buy Now
Questions 75

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 76

XML provides a language for representing both structures and unstructured data and information.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 77

As part of its transformation, the organization must identify and respond to different kinds of roadblocks. Please select the answer that is not a roadblock:

Options:

A.

Active resistance

B.

Psychological

C.

Systematic

D.

Structural

Buy Now
Questions 78

Metadata is described using a different set of categories, not including:

Options:

A.

Descriptive metadata

B.

Database metadata

C.

Structural metadata

D.

Administrative metadata

Buy Now
Questions 79

Primary deliverables of the Data Warehouse and Business Intelligence context diagram include:

Options:

A.

Data Products

B.

Data Stewardship

C.

Governance Activities

D.

Release Plan

E.

Load Tuning Activities

F.

BI Activity Monitoring

Buy Now
Questions 80

In Resource Description Framework (RDF) terminology, a triple store is composed of a subject that denotes a resource, the predicate that expresses a relationship between the subject and the object, and the object itself.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 81

Use business rules to support Data Integration and Interoperability at various points, to:

Options:

A.

Direct the flow of data in the organization

B.

Monitor the organization’s operational data

C.

Software alerts when events are triggered

D.

Direct when to automatically trigger events and alerts

E.

Consistency in allocation event resources

F.

None of the above

Buy Now
Questions 82

Oversight for the appropriate handling of data falls under both Data Governance and Legal Counsel. What are they NOT required to do?

Options:

A.

Data Governance and Legal Counsel are required to reduce the risk of ethical impropriety by making sure employees know of their obligations

B.

Data Governance must set standards and policies for and provide insight of data handling practices

C.

Data Governance is required to review plans and decisions proposed by Business Intelligence, Analytics, and Data Science studies

D.

Data Governance and Legal Counsel are required to keep up-to-date on legal changes

E.

Legal Counsel is required to audit their organizations on ethical compliance

Buy Now
Questions 83

Which of the following is not a step in the 'document and content management

lifecycle'?

Options:

A.

Capture records and content

B.

Manage versions and control

C.

Audit documents and records

D.

Create a content strategy

E.

Manage retention and disposal

Buy Now
Questions 84

In the Information Management Lifecycle, the Data Governance Activity "Define the Data Governance Framework" is considered in which Lifecycle stage?

Options:

A.

Create & Acquire

B.

Maintain & Use

C.

Specify

D.

Enable

E.

Plan

Buy Now
Questions 85

CMA is an abbreviation for Capability Maturity Assessment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 86

Quality Assurance Testing (QA) is used to test functionality against requirements.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 87

Effective data management involves a set of complex, interrelated processes that disable an organization to use its data to achieve strategic goals.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 88

Deliverables in the data management maturity assessment context diagram include:

Options:

A.

Maturity baseline

B.

Roadmap

C.

Executive briefings

D.

Recommendations

E.

Risk assessment

F.

Ratings and ranks

Buy Now
Questions 89

Data science merges data mining, statistical analysis, and machine learning with the integration and data modelling capabilities, to build predictive models that explore data content patterns.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 90

The DW encompasses all components in the data staging and data presentation areas, including:

Options:

A.

Operational source system

B.

Data access tools

C.

Data presentation area

D.

Data staging area

E.

All of the above

F.

Technology source system

Buy Now
Questions 91

On example of a transformation process in ETL is:

Options:

A.

Re-ordering

B.

Recording

C.

Duping

D.

Servicing

Buy Now
Questions 92

When doing reference data management, there many organizations that have standardized data sets that are incredibly valuable and should be subscribed to. Which of these organizations would be least useful?

Options:

A.

The company registration organization

B.

Wikipedia

C.

ISO

D.

IEEE

E.

The national post office

Buy Now
Questions 93

The library of Alexandria was one of the largest collection of books in the ancient

world. Which DMBoK knowledge area is most aligned with managing the collection?

Options:

A.

Data Integration and Interoperability

B.

Reference and Master Data

C.

Data Security

D.

Document and Content Management

E.

Data Govemance

Buy Now
Questions 94

A completely distributed architecture maintains a single access point. The metadata retrieval engine responds to user requests by retrieving data from source systems in real time.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 95

Key processing steps for MDM include:

Options:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Buy Now
Questions 96

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

Options:

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Buy Now
Questions 97

Malware types include:

Options:

A.

Trojan horse

B.

Worm

C.

Weasel

D.

Virus

E.

Adware

F.

Camware

Buy Now
Questions 98

As an often-overlooked aspects of basic data movement architecture, Process controls include:

Options:

A.

Consistency logging

B.

Exception logs

C.

Database activity logs

D.

Alerts

E.

Exception logs

F.

All of the above

Buy Now
Questions 99

Device security standard include:

Options:

A.

Installation of anti-malware and encryption software

B.

Relational security policies

C.

Access policies regarding connections using mobile devices

D.

Regulation compliance standards

E.

None of the above

F.

Awareness of security vulnerabilities

Buy Now
Questions 100

Governance ensures data is managed, but is not include the actual act of managing data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 101

Service accounts are convenient because they can tailor enhanced access for the processes that use them.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 102

Please select the types of DBA specializations:

Options:

A.

Data

B.

Application

C.

Innovation

D.

Development

E.

Procedural

F.

All of the above

Buy Now
Questions 103

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 104

Data modelling tools are software that automate many of the tasks the data modeller performs.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 105

Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 106

Typically, DW/BI projects have three concurrent development tracks, including:

Options:

A.

Technology

B.

Trickle Feeds

C.

Data

D.

BI Tools

E.

Messaging

F.

Streaming

Buy Now
Questions 107

If data is not integrated with care it presents risk for unethical data handling. These ethical risks intersect with fundamental problems in data management including: Limited knowledge of data’s origin and lineage; Data of poor quality; Unreliable Metadata; and Documentation of error remediation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 108

When constructing an organization’s operating model cultural factors must be taken into consideration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 109

Which answer is considered to be the best definition of data security?

Options:

A.

Data security occurs when all metadata is tagged as either Confidential, Public or Sensitive

B.

Data security is only possible after Data Governance and Risk Management have looked at all the data, verified, definitions and conducted a impact analysis

C.

Data security can be described as having all of an organization's data in a repository along with a policy of limited access to only those employees managing the data

D.

Data security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization's data

E.

Data security is the ability to track who in the organization has access to metadata

Buy Now
Questions 110

Content needs to be modular, structured, reusable and device and platform independent.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 111

Data Integrity includes ideas associated with completeness, accuracy, and consistency.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 112

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 113

There are numerous methods of implementing databases on the cloud. The most common are:

Options:

A.

Virtual machine image

B.

Distributed machine image

C.

DAAS

D.

Managed database hosting on the cloud

Buy Now
Questions 114

Developing complex event processing solutions require:

Options:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Buy Now
Questions 115

Top down' and "bottom up' data analysis and profiling is best done in concert

because:

Options:

A.

It gets everyone involved

B.

It balances business relevance and the actual state of the data

C.

Data quality tools are more productive when they are effectively configured

D.

It gives something for the architects to do while the profilers get on with thework

E.

It allows the profiler to show the business the true state of the data

Buy Now
Questions 116

Improving an organization’s ethical behaviour requires an informal Organizational Change Management (OCM) process.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 117

The second stage of Kotter’s eight stage process is:

Options:

A.

Developing a vision and a strategy

B.

Establishing a sense of urgency

C.

Creating short term wins

D.

Creating the guiding coalition

Buy Now
Questions 118

MPP is an abbreviation for Major Parallel Processing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 119

Effective document management requires clear policies and procedures, especially regarding retention and disposal of records.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 120

Please select the correct general cost and benefit categories that can be applied consistently within an organization.

Options:

A.

Cost of erasing data from servers

B.

Cost of improving data

C.

What the data could be sold for

D.

Benefit of higher quality data

E.

Cost of replacing data if it were lost

F.

What competitors would pay for data

Buy Now
Questions 121

A communication plan includes an engagement model for stakeholders, the type of information to be shared, and the schedule for sharing information.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 122

Resource Description Framework (RDF), a common framework used to describe information about any Web resource, is a standard model for data interchange in the Web.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 123

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 124

Databases are categorized in three general ways:

Options:

A.

Warped

B.

Non-relational

C.

Relational

D.

Accessible

E.

None of the above

F.

Hierarchical

Buy Now
Questions 125

Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.

Options:

A.

Principle of integrity

B.

Principle of availability

C.

Principle of retention

D.

Principle of accountability

Buy Now
Questions 126

The goals of Metadata management include:

Options:

A.

Managing performance of data assets

B.

Ensure metadata quality, consistency, currency and security

C.

Managing the availability of data throughout the data lifecycle

D.

Provide standard ways to make metadata accessible to metadata consumers

E.

Managing the performance of data transactions

F.

Establish or enforce the use of technical Metadata standards to enable data exchange

Buy Now
Questions 127

The creation of overly complex enterprise integration over time is often a symptom

of:

Options:

A.

Multiple data warehouses

B.

Multiple integration technologies

C.

Multiple metadata tags

D.

Multiple application coding languages

E.

Multiple data owners

Buy Now
Questions 128

Enterprise data architecture project-related activities include:

Options:

A.

Define maturity assessment

B.

Define scope

C.

Design

D.

Implement

E.

None of the above

F.

All of the above

Buy Now
Questions 129

Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:

Options:

A.

The triggers for effective change

B.

Data architecture

C.

How people experience changes

D.

Data security

E.

The barriers to change

F.

Why change fails

Buy Now
Questions 130

Customer value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as well we managing risk related to usage. Which of these is not a way to measure value?

Options:

A.

Market value

B.

Identified opportunities

C.

Risk cost

D.

User perspective

E.

Replacement cost

Buy Now
Questions 131

Business rules describe why business should operate internally, in order to be successful and compliant with the outside world.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 132

In the context of big data the Three V’s refer to: Volume, Velocity and Validity

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 133

Measuring the effects of change management on in five key areas including: Awareness of the need to change; Desire to participate and support the change; Knowledge about how to change; Ability to implement new skills and behaviors; and Reinforcement to keep the change in place.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 134

Identify indicative components of a Data Strategy.

Options:

A.

Vision, case studies, succession plans, functional requirements

B.

Vision, data invoice, payment receipts, confirmations

C.

Vision, business surveys, employee performance goals

D.

Vision, business case, data models, employee goals

E.

Vision, business case, principles, goals, and measures

Buy Now
Questions 135

Operational reports are outputs from the data stewards.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 136

In matching, false positives are three references that do not represent the same entity are linked with a single identifier.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 137

Repositories facilitate the collection, publishing and distribution of data in a centralized and possibly standardized way. Data is most often used to:

Options:

A.

Make sure the DBAs are not creating new tables and columns

B.

Document and organize the provided data

C.

To support the business users not the technical users

D.

Give developers all the data they will need for programming

E.

Find new initiatives for the business to pursue

Buy Now
Questions 138

A data dictionary is necessary to support the use of a DW.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 139

In a data warehouse, where the classification lists for organisation type are

inconsistent in different source systems, there is an indication that there is a lack of

focus on:

Options:

A.

Metadata Management

B.

Data Storage

C.

Data Modelling

D.

Master Data

E.

Reference data

Buy Now
Questions 140

Examples of concepts that can be standardized within the data quality knowledge area include:

Options:

A.

Standard measurement methodologies

B.

Data security standards

C.

Data remediation standards and procedures

D.

None of the above

E.

Data quality rules

F.

Data quality rules

Buy Now
Questions 141

Please select the answer that best fits the following description: Contains only real-time data.

Options:

A.

Batch layer

B.

Speed layer

C.

Serving layer

D.

Real-time layer

Buy Now
Questions 142

Inputs in the data storage and operations context diagram include:

Options:

A.

Data requirements

B.

Service level agreements

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Data models

Buy Now
Questions 143

Data management organizational constructs include the following type of model.

Options:

A.

Network operating model

B.

Decentralized operating model

C.

Centralized operating model

D.

Federation operating model

E.

Hybrid operating model

F.

Integrated operating model

Buy Now
Questions 144

If the target system has more transformation capability than either the source or the intermediary application system, the order of processes may be switched to ELT – Extract Load Tranform.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 145

A goal of data governance is to enable an organisation to manage its data as a liability.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 146

Which of the following is NOT a responsibility of a Data Steward?

Options:

A.

Data Standards

B.

Operational Data Activities

C.

Data Quality

D.

Performance Tuning

E.

Metadata Management

Buy Now
Questions 147

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 148

The accuracy dimension of data quality refers to the degree that data correctly respresents ‘real-life’ entities.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 149

Enterprise data architecture usually include the following work streams:

Options:

A.

Strategy

B.

Governance

C.

Organization

D.

Results

E.

Working methods

F.

All of the above

Buy Now
Questions 150

One of the key differences between operational systems and data warehouses is:

Options:

A.

Operational systems focus on data quality: data warehouses focus on datasecurity

B.

Operational systems focus on historical data; data warehouses contain currentdata

C.

Operational systems are available 24x7; data warehouses are available duringbusiness hours

D.

Operational systems focus on current data; data warehouses contain historicaldata

E.

Operational systems focus on business processes: data warehouses focus onbusiness strategies

Buy Now
Questions 151

Layers of data governance are often part of the solution. This means determining where accountability should reside for stewardship activities and who the owners of the data are.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 152

A staff member has been detected inappropriately accessing client records from

usage logs. The security mechanism being used is an:

Options:

A.

Access

B.

Audit

C.

Entitlement

D.

Authorisation

E.

Authentication

Buy Now
Questions 153

Which Data Architecture artefact contains the names of key business entities, their

relationships, critical guiding business rules and critical attributes?

Options:

A.

Enterprise Data Standards

B.

Enterprise Business Glossary

C.

Enterprise Semantic Model

D.

Enterprise Data Model

E.

Enterprise Data Flows

Buy Now
Questions 154

The four main types of NoSQL databases are:

Options:

A.

Document

B.

Row-orientated

C.

Graph

D.

Strategic

E.

Key-value

F.

Column-orientated

Buy Now
Questions 155

Some document management systems have a module that may support different types of workflows such as:

Options:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Buy Now
Questions 156

Data Governance includes developing alignment of the data management approach with organizational touchpoints outside of the direct authority of the Chief Data Officer. Select the example of such a touchpoint.

Options:

A.

Content Management

B.

Requirements

C.

Business Glossary

D.

Records Management

E.

Regulatory Compliance

Buy Now
Questions 157

A deliverable in the data architecture context diagram includes an implementation roadmap.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 158

The target of organizational change is expedition.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 159

The accuracy dimension has to do with the precision of data values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 160

What is the best definition of Crowdsourced data collection?

Options:

A.

Crowdsourcing should not be used to gather data because there will be too many opinions and not enough facts

B.

Crowdsourcing is the process of obtaining needed data by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers  

C.

Crowdsourced data is the best way of finding data because so many people are contributing their definitions

D.

Crowdsourced data is the data that comes from using a company wiki to gather data because anyone in the crowd can contribute

E.

Crowdsourced data collection is only used by researchers to answer research, survey or feedback questions

Buy Now
Questions 161

Architecture is the fundamental organization of a system, embodied in its components, their relationships to each other and the environment and the principles governing its design and evolution.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 162

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

Options:

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Buy Now
Questions 163

When assessing security risks it is required to evaluate each system for the following:

Options:

A.

The current security protections in place

B.

The requirements to protect the data

C.

None of the above

D.

All of the above

E.

The complexity of the data stored or in transit

F.

The sensitivity of the data stored or in transit

Buy Now
Questions 164

What is one of the most important things about collecting data?

Options:

A.

To share the data across the organization

B.

To keep data away from the public

C.

To resolve many-to-many relationships

D.

To collect as much data as possible into the data repository

E.

To keep data for each department separate because no one needs all the data

Buy Now
Questions 165

Data Integration and Interoperability is dependent on these other areas of data management:

Options:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Buy Now
Questions 166

Operationality and interoperability depends on the data quality. In order to measure the efficiency of a repository the data quality needs to be:

Options:

A.

Stored in a Cloud for easy access

B.

Quantified by some type of metrics

C.

Be certified by a Data Governance team

D.

Have complete definitions

E.

Verified by the organization's legal department

Buy Now
Questions 167

Please select the correct name for the LDM abbreviation

Options:

A.

Logical Data Model

B.

Logical Dimensional Model

C.

Lifecycle Data Model

D.

Lifecycle Dimensional Model

Buy Now
Questions 168

'Planning, implementation and control activities for lifecycle management of data and

information, found in any form or medium', pertains to which knowledge area?

Options:

A.

Document and Content Management

B.

Metadata Management

C.

Data Warehousing and Business Intelligence

D.

Data Storage and Operations

E.

Data Integration and Interoperability

Buy Now
Questions 169

Inputs in the data modelling and design context diagram include:

Options:

A.

Data standards

B.

Data sets

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Enterprise taxonomy

Buy Now
Questions 170

The loading of country codes into a CRM is a classic:

Options:

A.

Reference data integration

B.

Fact data integration

C.

Master data integration

D.

Analytics data integration

E.

Transaction data integration

Buy Now
Questions 171

Referential Integrity (RI) is often used to update tables without human intervention. Would this be a good idea for reference tables?

Options:

A.

Yes, since Standards Bodies typically supply reference data, the enterprise can automatically update when a new code or value is received

B.

No, updates should always be made directly via data entry or through a specific batch interface based on operator-entered information partly because of regulatory reporting and archiving

C.

Yes, you do not have to worry about archived data with reference data so tables can be updated automatically

D.

No, but an enterprise can use program logic to do updates as there is little potential for problems to occur with reference data

E.

Yes, older transactions do not have to be removed because with the Cloud there is unlimited database storage

Buy Now
Questions 172

A controlled vocabulary is a defined list of explicitly allowed terms used to index, categorize, tag, sort and retrieve content through browsing and searching.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 173

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

Options:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Buy Now
Questions 174

XML is the abbreviation for standard mark-up language.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 175

Data replication can be active or passive.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 176

Different storage volumes include:

Options:

A.

Gigabyte

B.

Petabyte

C.

Perabyte

D.

Exabyte

E.

Tetrabyte

F.

Terabyte

Buy Now
Questions 177

What are the business objectives for building a business glossary?

Options:

A.

To have a place to store physical schemas for the DBAs

B.

Make sure that the data stewards have valid work to perform, & justify that the budget for Data Governance

C.

Take all the core data elements from the data models and store them in the glossary

D.

Establish a common understanding of core business concepts and terminology & enable access to documented institutional knowledge

E.

Create a place to manage metadata and lineage

Buy Now
Questions 178

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

Options:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Buy Now
Questions 179

Emergency contact phone number would be found in which master data

management program?

Options:

A.

Location

B.

Asset

C.

Service

D.

Employee

E.

Product

Buy Now
Questions 180

Big data is often defined by three characteristics. They are:

Options:

A.

Size, Speed and Sensitivity

B.

Volume, Variety and Velocity

C.

Direction, Depth and Details

D.

Expansive, Engaged and Enormous

E.

Complexity, Compliance and Completeness

Buy Now
Questions 181

Inputs in the Data Integration and Interoperability context diagram include:

Options:

A.

Data needs & standards

B.

Data semantics

C.

Business goals & strategies

D.

Source data

Buy Now
Questions 182

Which of the following are must-do for any successful Data Governance programme?

Options:

A.

Create a communications plan to inform to all stakeholders what you are doing.

B.

Ensure there is a Data Governance Policy with which everyone in the organization is required to comply.

C.

Create a training programme for all for data owners and data stewards.

D.

Set up a wiki for incorrect data definitions.

E.

Allocate Data Ownership responsibilities according to their role in the organization.

Buy Now
Questions 183

Advantages if a centralized metadata repository include:

Options:

A.

Quick metadata retrieval

B.

None of the above

C.

Combining data from multiple other tables in advance to avoid costly run-time joins

D.

All of the above

E.

High availability

F.

Low latency, since it is independent of the source systems

Buy Now
Questions 184

Assessment capabilities are evaluated against a pre-determined scale with established criteria. This is important because:

Options:

A.

Each process that is being evaluated must show some financial justification.

B.

It is difficult to be objective when using an internally developed assessment

C.

Each process under evaluation must be rated objectively against best practices found in many organizations and industries.

D.

Pre-determined scales give organizations a way to justify their weaknesses

E.

Established criteria in an industry make each organization more likely to want to use the industry's assessment.

Buy Now
Questions 185

A sandbox is an alternate environment that allows write-only connections to production data and can be managed by the administrator.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 186

Organizations should evaluate several maturity assessment models for data management, and for Data Governance, before adopting one or before developing a custom maturity assessment model because:

Options:

A.

Choosing a maturity model for an organization is expensive

B.

Vendors may go out of business so organizations need to choose wisely

C.

Performing an assessment without evaluating multiple models does not provide the organization with the ability to use the easiest model

D.

Each maturity model is flawed and the organization must find the flaws and work around them

E.

Each DMMM is based on a specific approach and needs to align with an organization's needs

Buy Now
Questions 187

SDLC stands for:

Options:

A.

System development leverage cycle

B.

System design lifecycle

C.

System and design long cycle

D.

System development lifecycle

Buy Now
Questions 188

You are a reporting Data Analyst. A new Management Report has been requested. What is the most effective way to ensure you receive the appropriate data at the correct level of accuracy to meet the business need?

Options:

A.

Hold a meeting to understand the timelines of when data will be provided

B.

Supply a detailed definition document which includes timelines, data requirements, calculation details, etc

C.

Supply a detailed definition template document and request completion by relevant managers

D.

Send a general email to the manager of the department(s)

E.

Write a general definitions statement describing conceptually what is required

Buy Now
Questions 189

Examples of data enhancement includes:

Options:

A.

All of the above

B.

Audit data

C.

Contextual information

D.

Incorporate Enterprise Technology

E.

Reference vocabularies

F.

Select Notation

Buy Now
Questions 190

Communication should start later in the process as too many inputs will distort the vision.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 191

The key architecture domains include:

Options:

A.

Business, data, infrastructure and technology architectures

B.

Process, database, software and technology architectures

C.

Zachmann, TOGAF, Cobit, and Heath architectures

D.

Business, data, application and technology architectures

E.

Business, strategy, application and technology architectures

Buy Now
Questions 192

Examples of concepts that can be standardized within the data architecture knowledge area include:

Options:

A.

Enterprise data models

B.

System naming conventions

C.

None of the above

D.

Data security standards

E.

Data quality rules

F.

Tool standards

Buy Now
Questions 193

When measuring the value of data architecture one should be most concerned about

Options:

A.

Improved coding efficiency

B.

Project speed

C.

Number of Projects reviewed

D.

Added business value

E.

Cost savings

Buy Now
Questions 194

Data warehouses are often loaded and serviced by a nightly batch window.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 195

Normalisation is the process of applying rules in order to organise business complexity into stable data structures.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 196

Please select the 2 frameworks that show high-level relationships that influence how an organization manages data.

Options:

A.

Strategic Alignment Model

B.

DAMA DMBOK Hexagon

C.

DAMA Wheel

D.

Amsterdam Information Model

Buy Now
Questions 197

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

Options:

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Buy Now
Questions 198

When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?

Options:

A.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

B.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

C.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

D.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

E.

Alignment of Business and Technology strategies, definition of data standards, implementation of supporting metadata and process tools, management of responsibility

Buy Now
Questions 199

A System of Reference is an authoritative system where data consumers can obtain reliable data to support transactions and analysis, even if the information did not originate in the system reference.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: DMF-1220
Exam Name: Data Management Fundamentals
Last Update: May 1, 2025
Questions: 666

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now DMF-1220 testing engine

PDF (Q&A)

$31.5  $104.99
buy now DMF-1220 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 01 May 2025