Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

DMF-1220 Data Management Fundamentals Questions and Answers

Questions 4

The deliverables of the data modelling process include:

Options:

A.

Lineage

B.

Definitions

C.

Issues and outstanding questions

D.

Assessments

E.

Diagram

F.

Roadmap

Buy Now
Questions 5

When data is classified as either security data or regulatory data, the result will be:

Options:

A.

Business employees are restricted from viewing the data but technical employees can store the data in databases

B.

Employees will never see classified data for any reason

C.

Employees know they have to aggregate the data

D.

Employees, both business & technical know the sensitivity of the data

E.

Employees know they cannot use the data because it has been classified

Buy Now
Questions 6

Enterprise data architecture description must include both [1] as well as [2]

Options:

A.

[1] Data Flow Design [2] Data Context Diagram

B.

[1] Enterprise Data Model [2] Architecture Diagram

C.

[1] Enterprise Data Model [2] Data Flow Design

D.

[1] Enterprise Data Model [2] Data Context Diagram

Buy Now
Questions 7

Structural Metadata describe srealtionships within and among resource and enables identification and retrieval.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 8

Temporal aspects usually include:

Options:

A.

Valid time

B.

Transmitting time

C.

Transaction time

D.

Value time

Buy Now
Questions 9

When reviewing data access plans, sequential searching is slowing the database. One

way to fix this is:

Options:

A.

Reducing the number of database users

B.

Creating new indexes

C.

Adding more memory

D.

Converting it to an in-memory database

E.

Moving the database to the cloud

Buy Now
Questions 10

In designing and building the database, the DBA should keep the following design principles in mind:

Options:

A.

Assessments

B.

Maintainability

C.

Reusability

D.

Performance and ease of use

E.

Security

F.

Integrity

Buy Now
Questions 11

Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 12

A weakness or defect in a system that allows it to be successfully attacked and

compromised is a:

Options:

A.

Risk

B.

Threat

C.

Feature

D.

Vulnerability

E.

Chasm

Buy Now
Questions 13

Metadata is described using three sets od categories, including:

Options:

A.

Structural Metadata

B.

Descriptive Metadata

C.

Generic Metadata

D.

Administrative metadata

E.

Conceptual Metadata

Buy Now
Questions 14

Many people assume that most data quality issues are caused by data entry errors. A more sophisticated understanding recognizes that gaps in or execution of business and technical processes cause many more problems that mis-keying.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 16

Lack of automated monitoring represents serious risks, including compliance risk.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

An information maturity assessment provides a valuable input to Data Governance planning because it provides:

Options:

A.

An assessment of the ability of the organization to utilize data and information in an advanced manner

B.

A benchmark against the organization's peers to drive dissatisfaction with current state among senior leadership

C.

A detailed roadmap for information management related change in the organization

D.

It identifies key weaknesses in the Information Strategy of the organization which impede good governance

E.

Stakeholders require a visual representation in graphical form of their current state versus target state

Buy Now
Questions 18

Principles for data asset accounting include:

Options:

A.

Accounting Principle

B.

Due Diligence Principle

C.

Asset Principle

D.

Audit Principle

E.

Going Concern Principle

F.

All of the above

Buy Now
Questions 19

Which of the following is NOT a responsibility of a Data Steward?

Options:

A.

Data Standards

B.

Operational Data Activities

C.

Data Quality

D.

Performance Tuning

E.

Metadata Management

Buy Now
Questions 20

The accuracy dimension of data quality refers to the degree that data correctly respresents ‘real-life’ entities.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

An input in the data architecture context diagram includes data governance.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Enterprise Architecture domains include:

Options:

A.

Business Architecture

B.

Data Architecture

C.

Data Management Architecture

D.

Systems Architecture

E.

Application Architecture

F.

Technology Architecture

Buy Now
Questions 23

The purpose of data governance is to ensure that data is managed properly, according to policies and best practices. Data governance is focused on how decisions are made about data and how people and processes are expected to behave in relation to data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

All DMM and Data Governance assessments should identify its objectives and goals for improvement. This is important because:

Options:

A.

There is always room for improvement

B.

An assessment without goals and objectives will not have a conclusion

C.

The assessment team has to be aware of the objectives to be successful

D.

Data management and Data Governance assessments have different goals and objectives

E.

Assessment objectives start at the business drivers (for funding), goals to describe focus, and objectives to provide specific expectations and criteria for evaluation for success

Buy Now
Questions 25

A change management program supporting formal data governance should focus communication on:

Obtaining buy-in from all stakeholders

Options:

A.

Implementing data management training

B.

Monitoring the resistance

C.

Promoting the value of data assets

D.

Addressing all queries

E.

Implementing new metric and KPIs

Buy Now
Questions 26

Malware refers to any infectious software created to damage, change or improperly access a computer or network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

Data governance requires control mechanisms and procedures for, but not limited to, assignment and tracking of action items.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 28

Reference and Master Data Management follow these guiding principles:

Options:

A.

Quality

B.

Stewardship

C.

Authority

D.

Ownership

E.

Exclusivity

F.

Inclusivity

Buy Now
Questions 29

An implemented warehouse and its customer facing BI tool is a data product.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

Please select valid modelling schemes or notations

Options:

A.

NoSQL

B.

Dimensional

C.

Relational

D.

Object-orientated

E.

Fact-based

F.

Matrix-based

Buy Now
Questions 31

The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 32

Data flows map and document relationships between data and locations where global differences occur.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

The goals of Data Integration and Interoperability include:

Options:

A.

Provide data securely, with regulatory compliance, in the format and timeframe needed.

B.

Lower cost and complexity of managing solutions by developing shared models and interfaces.

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Identify meaningful events and automatically trigger alerts and actions.

F.

Support business intelligence, analytics, master data management and operational efficiency efforts.

Buy Now
Questions 34

To push up the urgency level requires adding of the sources of complacency or increasing of their impact.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

When assessing security risks it is required to evaluate each system for the following:

Options:

A.

The current security protections in place

B.

The requirements to protect the data

C.

None of the above

D.

All of the above

E.

The complexity of the data stored or in transit

F.

The sensitivity of the data stored or in transit

Buy Now
Questions 36

Please select correct term for the following sentence: Any collection of stored data regardless of structure or content. Some large databases refer to instances and schema.

Options:

A.

Schema

B.

Database

C.

Node

D.

Instance

Buy Now
Questions 37

Corrective actions are implemented after a problem has occurred and been detected.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 38

Big Data and Data Science Governance should address such data questions as:

Options:

A.

What the data means on the source side and how to interpret the results on the on the output side

B.

What the data means on the source side but no assessment needed for the interpretation of results

C.

Whether to enrich the data and benefits of enrichment

D.

Terms for data obtained from vendors and outside organizations

E.

The approach for alignment of data visualization tools to the user community

Buy Now
Questions 39

What techniques should be used and taught to produce the required ethical data handling deliverables?

Options:

A.

Change, Communication and training techniques need to be established

B.

A privacy impact assessment (PIA) is critical to ensuring that we are adhering to ethical data management

C.

Do an ethical impact assessment framework for all projects and activities involved in data management

D.

Due to fact that ethics are constantly changing we need to constantly affirm the organizations ethic statements on an annual basis

E.

Data Governance should define the set of ethical practices that are good for the organization

Buy Now
Questions 40

What are the primary drivers of data security activities?

Options:

A.

Risk reduction

B.

Risk alleviation

C.

Business growth

D.

Business compliance

Buy Now
Questions 41

OCR is the abbreviation for Optical Character Recognition.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

It is unwise to implement data quality checks to ensure that the copies of the attributes are correctly stored.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 43

An organization can enhance its Data Governance program and thereby improve its approach to enterprise data management. This is important for the following reason:

Options:

A.

Since most organizations start Data Governance in silos and not at the enterprise level, it is important to be able to assess current state and determine desired targeted state that supports the overall vision

B.

Often organizations have a data repository or dictionary that is just as good as Data Governance

C.

Data Governance programs are rarely enhanced once they are launched

D.

Assessing current state for Data Governance may not tell the organization the current state of other components

E.

Starting a Data Governance program does not require that the organization start a data management program

Buy Now
Questions 44

A data architecture team is best described as:

Options:

A.

A group of strong database administrators

B.

A strategic planning and compliance team

C.

An operational data provisioning group

D.

The authors of reference data

E.

A well-managed project of architectural development

Buy Now
Questions 45

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 46

A complexity in documenting data lineage is:

Options:

A.

Establishing data quality metrics

B.

Conflicting application requirements from data owners

C.

Choosing which content management software to use

D.

Identifying source databases

E.

Different data element names and formats

Buy Now
Questions 47

On example of a transformation process in ETL is:

Options:

A.

Re-ordering

B.

Recording

C.

Duping

D.

Servicing

Buy Now
Questions 48

You are a reporting Data Analyst. A new Management Report has been requested. What is the most effective way to ensure you receive the appropriate data at the correct level of accuracy to meet the business need?

Options:

A.

Hold a meeting to understand the timelines of when data will be provided

B.

Supply a detailed definition document which includes timelines, data requirements, calculation details, etc

C.

Supply a detailed definition template document and request completion by relevant managers

D.

Send a general email to the manager of the department(s)

E.

Write a general definitions statement describing conceptually what is required

Buy Now
Questions 49

An advantage of a centralized repository include: High availability since it is independent of the source systems.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 50

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:

Options:

A.

Regulatory compliance

B.

Data quality improvements

C.

Metadata management

D.

Efficiency in development projects

E.

Vendor management

F.

All of the above

Buy Now
Questions 51

How can the Data Governance process in an organisation best support the requirements of various Regulatory reporting needs?

Options:

A.

By creating a map of where the enterprise data is located in IT systems.

B.

By providing a Business Glossary based look up facility for data definitions.

C.

By ensuring that data is properly categorized, owned, understood, defined, documented and controlled

D.

By highlighting the challenges of multiple data definitions within the enterprise

E.

By performing an as-is data audit

Buy Now
Questions 52

Please select the answers that correctly describes the set of principles that recognizes salient features of data management and guide data management practice.

Options:

A.

Data is an asset with unique properties.

B.

It takes Metadata to manage data.

C.

The most important part of data management is security.

D.

Data management is lifecycle management.

E.

Effective data management requires leadership commitment.

F.

Efficient data management requires a team of IT professionals only.

Buy Now
Questions 53

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

Options:

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Buy Now
Questions 54

Different levels of policy are required to govern behavior to enterprise security. For example:

Options:

A.

Data security policy

B.

Business Security Policy

C.

IT security policy

D.

Enterprise security policy

E.

All of the above

F.

None of the above

Buy Now
Questions 55

Quality Assurance Testing (QA) is used to test functionality against requirements.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 56

Data quality issues cannot emerge at any point in the data lifecycle.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 57

XML is the abbreviation for standard mark-up language.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 58

Oversight for the appropriate handling of data falls under both Data Governance and Legal Counsel. What are they NOT required to do?

Options:

A.

Data Governance and Legal Counsel are required to reduce the risk of ethical impropriety by making sure employees know of their obligations

B.

Data Governance must set standards and policies for and provide insight of data handling practices

C.

Data Governance is required to review plans and decisions proposed by Business Intelligence, Analytics, and Data Science studies

D.

Data Governance and Legal Counsel are required to keep up-to-date on legal changes

E.

Legal Counsel is required to audit their organizations on ethical compliance

Buy Now
Questions 59

Three data governance operating models types include:

Options:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Buy Now
Questions 60

What key components must be included in the Implementation Roadmap?

Options:

A.

Timeframes and resources for data quality requirements, policies and directives and testing standards

B.

Data metrics, physical data structures, and data model designs

C.

Timeframes and resources for Policies and Directives, a Business Glossary Architecture, Business and IT processes and role descriptions

D.

Testing requirements, risk assessment, data security and privacy policies and database design

E.

Timeframes and resources for policies and directives Architecture, Tools and Control Metrics

Buy Now
Questions 61

Which DMBok knowledge area is most likely responsible for a high percentage of

returned mail?

Options:

A.

Data Quality

B.

Reference and Master Data

C.

Data Warchousing and Business Intelligence

D.

Data Integration and Interoperability

E.

Metadata Management

Buy Now
Questions 62

Typically, DW/BI have three concurrent development tracks:

Options:

A.

Data mart

B.

Business Intelligence tools

C.

Data

D.

System development

E.

Techonology

F.

None of the above

Buy Now
Questions 63

The database administrator (DBA) is the most established and the most widely adopted data professional role.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 64

Inputs in the data storage and operations context diagram include:

Options:

A.

Data requirements

B.

Service level agreements

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Data models

Buy Now
Questions 65

The first two steps of the Reference data Change request process, as prescribed DMBOk2, include:

Options:

A.

Decide and Communicate

B.

Receive Change Request

C.

Update and Inform

D.

Identify Stakeholder

E.

Identify Impact

Buy Now
Questions 66

Which of the following is not a step in the 'document and content management

lifecycle'?

Options:

A.

Capture records and content

B.

Manage versions and control

C.

Audit documents and records

D.

Create a content strategy

E.

Manage retention and disposal

Buy Now
Questions 67

There are numerous methods of implementing databases on the cloud. The most common are:

Options:

A.

Virtual machine image

B.

Distributed machine image

C.

DAAS

D.

Managed database hosting on the cloud

Buy Now
Questions 68

The placement of Data Governance is most effective when:

Options:

A.

It is defined by Compliance because most of what is governed is driven by regulatory and compliance issues

B.

The Database Administrators incorporate Data Governance in their database design

C.

It has a Data Governance manager and some data stewards

D.

Defined at the department level at which is most important

E.

When it is at the enterprise level so it can support all other data management initiatives that cross functional boundaries

Buy Now
Questions 69

Factors that have shown to play a key role in the success in the success of effective data management organizations does not include:

Options:

A.

Clear vision

B.

Orientation and training

C.

Leadership alignment

D.

IT sponsorship

Buy Now
Questions 70

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

Options:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Buy Now
Questions 71

Primary deliverables of the Data Warehouse and Business Intelligence context diagram include:

Options:

A.

Data Products

B.

Data Stewardship

C.

Governance Activities

D.

Release Plan

E.

Load Tuning Activities

F.

BI Activity Monitoring

Buy Now
Questions 72

A "Data Governance strategy" usually includes the following deliverables:

Options:

A.

A Statement of Intent, a Decision Framework, an Implementation Roadmap, and a Governance Toolkit

B.

A Charter, a Data Architecture, a Program Data Model, and a Plan for Operational Success

C.

A Program Plan, a Resource Plan, an Implementation Plan, and a Test Plan

D.

A Charter, an Operating Framework, an Implementation Roadmap, and a Plan for Operational Success

E.

A Charter, a Security Strategy, a Solution Roadmap, and a User Experience Plan

Buy Now
Questions 73

Device security standards include:

Options:

A.

Access policies regarding connections using mobile devices

B.

Awareness of security vulnerabilities

C.

Installation of malware software

D.

Storage of data on fixed devices

Buy Now
Questions 74

Practitioners identify development of staff capability to be a primary concern of Data Governance. Why would this be a main concern?

Options:

A.

Because we need to develop the next generation of Chief Data Officers

B.

Because it is important to have senior people, in order to dictate that the policy will be followed

C.

Because organizations expect quick results

D.

Because it is important to train staff to ensure application of appropriate methods

E.

Because it is a recognized benchmark standard

Buy Now
Questions 75

The dependencies of enterprise technology architecture are that it acts on specified data according to business requirements.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 76

Metrics tied to Reference and Master Data quality include:

Options:

A.

Strategic usage reporting

B.

Amsterdam Information Model

C.

Data change activity

D.

Total cost of ownership

Buy Now
Questions 77

Data and text mining use a range of techniques, including:

Options:

A.

Profiling

B.

Application reduction

C.

Association

D.

Data reduction

E.

Clustering

F.

All of the above

Buy Now
Questions 78

Several global regulations have significant implications on data management practices. Examples include:

Options:

A.

BCBS 239

B.

Data Standards

C.

Privacy laws

D.

Effectiveness of education Standards

E.

SPCA

F.

PCI-DSS

Buy Now
Questions 79

Information architecture is the process of creating structure for a body of information or content. It includes the following components:

Options:

A.

Navigation maps

B.

User flows

C.

Use cases

D.

Controlled technologies

Buy Now
Questions 80

Data Integration and Interoperability is dependent on these other areas of data management:

Options:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Buy Now
Questions 81

The number of entities in a relationship is the arity of the relationship. The most common are:

Options:

A.

Unary

B.

Binary

C.

Trinary

D.

Ternary

Buy Now
Questions 82

The most common drivers for initiating a Mater Data Management Program are:

Options:

A.

Metadata insecurity

B.

Managing data quality

C.

Reducing risk

D.

Managing the costs of data integration

E.

Meeting organizational data requirements

F.

Reducing latency

Buy Now
Questions 83

A goal of Data warehouse and business intelligence is to support and enable ineffective business analysis and decision making by knowledge workers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 84

When it comes to Data Governance, what does the Operations Plan include?

Options:

A.

The list of events required to implement and operate Data Governance activities

B.

A risk assessment for the enterprise

C.

The types of enterprise operations that need Data Governance

D.

The metrics needed for each department within the organization

E.

The list of activities the Data Stewards will follow to define the data

Buy Now
Questions 85

One common KPI of e-discovery is cost reduction.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 86

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

Options:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Buy Now
Questions 87

Which answer is considered to be the best definition of data security?

Options:

A.

Data security occurs when all metadata is tagged as either Confidential, Public or Sensitive

B.

Data security is only possible after Data Governance and Risk Management have looked at all the data, verified, definitions and conducted a impact analysis

C.

Data security can be described as having all of an organization's data in a repository along with a policy of limited access to only those employees managing the data

D.

Data security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization's data

E.

Data security is the ability to track who in the organization has access to metadata

Buy Now
Questions 88

Data architect: A senior analyst responsible for data architecture and data integration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 89

It is recommended that organizations not print their business data glossaries for general use, why would you not want to print the glossary?

Options:

A.

Because there is so much data in an organization's glossary that the report would be too big to handle

B.

Because the glossary contains trade 'secrets' that the organization wants to protect

C.

Because industry rules and regulation should not be printed because they vary by State

D.

Because the data is not static but is being updated by stewards as they add new fields and definitions

E.

Because the data is confidential and should not be given out in printed form

Buy Now
Questions 90

The flow of data in a data integration solution does not have to be designed and documented.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 91

Please select the 2 frameworks that show high-level relationships that influence how an organization manages data.

Options:

A.

Strategic Alignment Model

B.

DAMA DMBOK Hexagon

C.

DAMA Wheel

D.

Amsterdam Information Model

Buy Now
Questions 92

Which of these is NOT a component of an enterprise wide data strategy?

Options:

A.

A business Case for better data management

B.

A description of data management roles & organizations

C.

An outline of 'as is' and 'to be' technical architectures

D.

A data management roadmap, highlighting major activities

E.

A vision statement for data management

Buy Now
Questions 93

A goal of metadata management is to manage data related business terminology in

order toc

Options:

A.

Successfully size the database

B.

Ensure accurate data requirements are gathered for reporting

C.

Ensure people understand data content and can use data consistently

D.

Ensure people understand data definition in Bl systems

E.

Ensure the business processes align to the data model

Buy Now
Questions 94

Data replication can be active or passive.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 95

What is the main purpose of developing a Data Architecture Roadmap?

Options:

A.

To help forward-looking decision making

B.

To help the management of the organization to see the trade-offs

C.

To manage the data dependencies that require active management

D.

To formulate a plan to address architectural problems in the business

E.

To ensure that projects are aligned with business needs and opportunities

Buy Now
Questions 96

Functionality-focused requirements associated with a comprehensive metadata solution, include:

Options:

A.

Synchronization

B.

Structure

C.

None of the above

D.

History

E.

Volatility

F.

Access rights

Buy Now
Questions 97

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 98

Business Intelligence tool types include:

Options:

A.

Technology reporting

B.

Operational reporting

C.

Descriptive, self-service analytics

D.

Operations performance management (OPM)

E.

Business performance management (BPM)

F.

Predictive, self-service analytics

Buy Now
Questions 99

While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 100

Coupling describes the degree to which two systems are intertwined.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 101

Content needs to be modular, structured, reusable and device and platform independent.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 102

Data access control can be organized at an individual level or group level, depending on the need.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 103

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 104

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 105

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

Options:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Buy Now
Questions 106

Triplestores can be classified into these categories:

Options:

A.

Native triplestores

B.

All of the above

C.

None of the above

D.

RDMS-backed triplestores

E.

NoSQL triplestores

F.

MapReduce triplestores

Buy Now
Questions 107

To build models, data modellers heavily rely on previous analysis and modelling work.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 108

What key components make up the Data Governance Charter?

Options:

A.

Vision/Mission Statement, Data Governance data principles, Business drivers

B.

Data Stewardship Metrics, Data Governance, Business Drivers

C.

Vision/Mission statement, Data quality framework, Data stewardship metrics

D.

Data processes, data principles and the timeframe for implementation

E.

The Enterprise data architecture, data security practices and industry regulations

Buy Now
Questions 109

There are three basic approaches to implementing a Master Data hub environment, including:

Options:

A.

Transaction hub

B.

Distributed hub

C.

Registry

D.

Consolidated approach

E.

Eventual consistency

F.

Transparent hub

Buy Now
Questions 110

Dimensions of data quality include:

Options:

A.

Validity

B.

Privacy

C.

Innovation

D.

Accessibility

E.

Currency

F.

All of the above

Buy Now
Questions 111

Volume refers to the amount of data. Big Data often has thousands of entities or elements in billions of records.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 112

The better an organization understands the lifecycle and lineage of its data, the better able it will be to manage its data. Please select correct implication of the focus of data management on the data lifecycle.

Options:

A.

Data Quality must be managed throughout the data lifecycle

B.

Data Security must only be managed at the start of the data lifecycle

C.

Metadata Quality is the most important part of the management process

D.

Data Management efforts should focus on the most critical data last

Buy Now
Questions 113

Governance ensures data is managed, but is not include the actual act of managing data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 114

Bias refers to an inclination of outlook. Please select the types of data bias:

Options:

A.

Data collection for pre-defined results

B.

Hunch and search

C.

Positive reinforcement

D.

Context and Emotion

E.

Biased use of data collected

F.

Biased sampling methodology

Buy Now
Questions 115

Data replication has two dimensions of scaling: diagonal and lateral

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 116

Effective document management requires clear policies and procedures, especially regarding retention and disposal of records.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 117

Issues caused by data entry processes include:

Options:

A.

Data entry interface issues

B.

List entry placement

C.

Field overloading

D.

None of the above

E.

Training issues

F.

Changes to business processes

Buy Now
Questions 118

Communications are essential to the success of a DMM or Data Governance assessment. Communications are important because:

Options:

A.

Communications can influence the socialization and acceptance of the results and implementation of a data management or Data Governance program

B.

Many organizations will overlook the communications aspect of a data management or Data Governance assessment

C.

Findings may affect stakeholder's positions and roles

D.

Each organization will approach data management and Data Governance communications differently

E.

Data management and Data Governance communications are different from each other

Buy Now
Questions 119

Data models are critical to effective management of data. They:

Options:

A.

Provide a common vocabulary around data

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Serve as a primary communication tool during projects

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Provide the organisation with clear system of the architecture

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 120

Architects seek to design in a way that brings value to an organisation. To reach these goals, data architects define and maintain specifications that:

Options:

A.

Align data architecture with enterprise strategy and business architecture

B.

Provide a standard business vocabulary for data and components

C.

Outline high-level integrated designs to meet these requirements.

D.

Integrate with overall enterprise architecture roadmap

E.

Define the current state of data in the organization.

F.

Express strategic data requirements

Buy Now
Questions 121

Different types of metadata include:

Options:

A.

Business, Technical and Operational

B.

Business. Quality, and Introspective

C.

Business, Application and Processing

D.

Business, Information, Application and Technology

E.

Fluid, static and viscous

Buy Now
Questions 122

SOA is an abbreviation for service orientated architecture.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 123

Please select the 3 visuals that depict DAMA’s Data Management Framework.

Options:

A.

The DAMA Octagon

B.

The Knowledge Area Context Diagram

C.

The Data Quality Function Context Diagram

D.

The DAMA Wheel

E.

The Environmental Factors hexagon

Buy Now
Questions 124

Gathering and interpreting results from a DMM or Data Governance assessment are important because:

Options:

A.

Lack of results gathered can indicate a lack of assessment performance

B.

The assessments are done by different teams within the organization and may have different results

C.

Interpreting these results is difficult

D.

Data Management and Data Governance results are gathered and interpreted differently, depending on the organization being evaluated

E.

Performing these activities objectively can ensure the success of the assessment and affect the acceptance and implementation of the data management and/or Data Governance program

Buy Now
Questions 125

An Operational Data Mart is a data mart focused on tactical decision support.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 126

The goals of data storage and operations include:

Options:

A.

Managing performance of data assets

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 127

Please select the correct name for the PDM abbreviation when referring to modelling.

Options:

A.

Physical Dimension Model

B.

Photo Data Model

C.

None of the above

D.

Probabilistic Dimension Model

E.

Photo Dimensional Model

F.

Physical Data Model

Buy Now
Questions 128

The categories of the Data Model Scorecard with the highest weightings include:

Options:

A.

How well does the model capture the requirements?

B.

None of the above

C.

How good are the definitions?

D.

How complete is the model?

E.

How structurally sound is the model?

F.

All of the above

Buy Now
Questions 129

CIF stands for:

Options:

A.

Company Information Factory

B.

Corporate Information Floor

C.

Corporate Information Factories

D.

Corporate Information Factory

Buy Now
Questions 130

A deliverable in the data security context diagram is the data security architecture.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 131

Deliverables in the Metadata Management context diagram include:

Options:

A.

Metadata Strategy

B.

Metadata Standards

C.

Data Lineage

D.

Metadata Architecture

E.

Metadata design

F.

Data storage and operations

Buy Now
Questions 132

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

Options:

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Buy Now
Questions 133

Data quality rules and standards are a critical form of Metadata. Ti be effective they need to be managed as Metadata. Rules include:

Options:

A.

None of the above

B.

Tied to business impact

C.

Document consistency

D.

Accessible to all data customers

E.

Hierarchical consistency

F.

Confirmed by SMEs

Buy Now
Questions 134

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 135

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 136

All metadata management solutions include architectural layers including:

Options:

A.

Metadata Quality Assurance Testing

B.

Metadata integration

C.

Metadata usage

D.

Metadata delivery

E.

Metadata control and management

F.

None of the above

Buy Now
Questions 137

Differentiating between data and information. Please select the correct answers based on the sentence below: Here is a marketing report for the last month [1]. It is based on data from our data warehouse[2]. Next month these results [3] will be used to generate our month-over-month performance measure [4].

Options:

A.

[1] Information, [2] Information, [3] Data, [4] Information

B.

[1] Data, [2] Information, [3] Data, [4] Data

C.

[1] Data, [2] Data, [3] Data, [4] Information

D.

[1] Information, [2] Data, [3] Data, [4] Information

Buy Now
Questions 138

The process of building architectural activities into projects also differ between methodologies. They include:

Options:

A.

Waterfall methods

B.

Incremental methods

C.

Kanban method

D.

Agile iterative method

E.

Duck and dive method

F.

Pump and dump method

Buy Now
Questions 139

Business glossaries have the following objectives:

Options:

A.

Improve the alignment between technology assets and the business organization

B.

All of the above

C.

Cultural factors that might improve the concepts and terminology

D.

Maximise search capability and enable access to documented institutional knowledge

E.

Enable common understanding of the core business concepts and terminology

F.

Reduce the risk that data will be misused due to inconsistent understanding of the business concepts.

Buy Now
Questions 140

Data modelling tools are software that automate many of the tasks the data modeller performs.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 141

Defining quality content requires understanding the context of its production and use, including:

Options:

A.

Producers

B.

Timing

C.

None of the above

D.

Delivery

E.

Consumers

F.

Format

Buy Now
Questions 142

The key architecture domains include:

Options:

A.

Business, data, infrastructure and technology architectures

B.

Process, database, software and technology architectures

C.

Zachmann, TOGAF, Cobit, and Heath architectures

D.

Business, data, application and technology architectures

E.

Business, strategy, application and technology architectures

Buy Now
Questions 143

Please select the two classifications of database types:

Options:

A.

Centralized

B.

Generic

C.

Distributed

D.

MapReduce

Buy Now
Questions 144

Control activities to manage metadata stores include:

Options:

A.

Roadmap extrapolation

B.

Load statistical analysis

C.

Lineage

D.

Missing metadata reports

E.

Definitions resolutions improvement

F.

Job scheduling and monitoring

Buy Now
Questions 145

Please select the answer that does not represent a machine learning algorithm:

Options:

A.

Reinforcement learning

B.

Supervised learning

C.

Artificial learning

D.

Unsupervised learning

Buy Now
Questions 146

DAMA International’s Certified Data Management Professional (CDMP) certification required that data management professionals subscribe to a formal code of ethics, including an obligation to handle data ethically for the sake of society beyond the organization that employs them.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 147

Product Master data can only focus on an organization’s internal product and services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 148

Data governance program must contribute to the organization by identifying and delivering on specific benefits.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 149

Device security standard include:

Options:

A.

Installation of anti-malware and encryption software

B.

Relational security policies

C.

Access policies regarding connections using mobile devices

D.

Regulation compliance standards

E.

None of the above

F.

Awareness of security vulnerabilities

Buy Now
Questions 150

A System of Reference is an authoritative system where data consumers can obtain reliable data to support transactions and analysis, even if the information did not originate in the system reference.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 151

What ISO standard defines characteristics that can be tested by any organisation in the data supply chain to objectively determine conformance of the data to this ISO standard.

Options:

A.

ISO 9000

B.

ISO 7000

C.

ISO 8000

D.

ISO 9001

Buy Now
Questions 152

Data Storage and Operations: The design, implementation and support of stored data to maximize its value.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 153

Identify indicative components of a Data Strategy.

Options:

A.

Vision, case studies, succession plans, functional requirements

B.

Vision, data invoice, payment receipts, confirmations

C.

Vision, business surveys, employee performance goals

D.

Vision, business case, data models, employee goals

E.

Vision, business case, principles, goals, and measures

Buy Now
Questions 154

An enterprise's organisation chart has multiple levels, each with a single reporting

line. This is an example of a:

Options:

A.

Ecological taxonomy

B.

Hierarchical taxonomy

C.

Flat taxonomy

D.

Compound taxonomy

E.

Hybrid taxonomy

Buy Now
Questions 155

Assessment capabilities are evaluated against a pre-determined scale with established criteria. This is important because:

Options:

A.

Each process that is being evaluated must show some financial justification.

B.

It is difficult to be objective when using an internally developed assessment

C.

Each process under evaluation must be rated objectively against best practices found in many organizations and industries.

D.

Pre-determined scales give organizations a way to justify their weaknesses

E.

Established criteria in an industry make each organization more likely to want to use the industry's assessment.

Buy Now
Questions 156

What is one of the most important things about collecting data?

Options:

A.

To share the data across the organization

B.

To keep data away from the public

C.

To resolve many-to-many relationships

D.

To collect as much data as possible into the data repository

E.

To keep data for each department separate because no one needs all the data

Buy Now
Questions 157

In matching, false positives are three references that do not represent the same entity are linked with a single identifier.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 158

Operational Metadata describes details of the processing and accessing of data. Which one is not an example:

Options:

A.

Error logs

B.

Schedule anomalies

C.

Purge criteria

D.

Failure logs

Buy Now
Questions 159

A point to point interface architecture will, in general, have more or less interfa

formats than a service oriented architecture?

Options:

A.

A few less

B.

About the same

C.

A few more

D.

Many less

E.

Many more

Buy Now
Questions 160

The data warehouse and marts differ from that in applications as the data is organized by subject rather than function.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 161

The scope and focus of any data governance program depend on organizational needs, but most programs include:

Options:

A.

Strategy

B.

Policy

C.

Data Management Projects

D.

Compliance

E.

Oversight

F.

All of the above

Buy Now
Questions 162

Match rules for different scenarios require different workflows, including:

Options:

A.

Consistency rules

B.

Duplicate identification match rules

C.

Match-merge rules

D.

Match-split rules

E.

Match-link rules

F.

All of the above

Buy Now
Questions 163

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 164

The best way to validate that a database backup is working, is to:

Options:

A.

Periodically recover from the backup file

B.

Appoint a special DBA in charge of backups

C.

Check the size of the backup file

D.

Check the backup logs every day

E.

Check for the automatic email notification of backup success

Buy Now
Questions 165

The second stage of Kotter’s eight stage process is:

Options:

A.

Developing a vision and a strategy

B.

Establishing a sense of urgency

C.

Creating short term wins

D.

Creating the guiding coalition

Buy Now
Questions 166

Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:

Options:

A.

Each type of stakeholder may need a different form of interaction, and each process evaluation may lend itself to a different form of information gathering

B.

Data management and Data Governance assessments will have different types of stakeholders

C.

The definition of stakeholder interaction depends on the executive sponsor

D.

Assessment teams may not know what a stakeholder is

E.

Each type of stakeholder may need a different form of data and security

Buy Now
Questions 167

Three classic implementation approaches that support Online Analytical Processing include:

Options:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Buy Now
Questions 168

Data Governance is at the centre if the data management activities, since governance is required for consistency within and balance between functions.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 169

Data governance requires control mechanisms and procedures for, but not limited to, identifying, capturing, logging and updating actions.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 170

What types of data are considered Technical Data?

Options:

A.

Data standards; ETL job details; source-to-target mappings

B.

Valid value constraints; File format schemas; data models; data access rights

C.

Attributes that are only used for status reporting; data quality rules; data usage, database table names

D.

Physical database and column names; ETL job details; recovery and backup rules; data access rights

E.

Physical data models; calculations and algorithms; program and application names

Buy Now
Questions 171

Issue management is the process for identifying, quantifying, prioritizing and resolving data governance related issues, including:

Options:

A.

Contracts

B.

Authority

C.

Compliance

D.

All of the above

E.

Conflicts

F.

Data Efficiency

Buy Now
Questions 172

Achieving security risk reduction in an organisation begins with developing what?

Options:

A.

A change management model, prioritising security changes and then updatingthe active directory

B.

An enterprise data model, rolling out data flow diagrams and enbedding securityinto the database

C.

A security model, classifying each organisational role and putting the physicaldata behind a firewall

D.

A classification model, classifying each data concept and locating the physicaldata

E.

A metadata model, locating the data and moving it into the metadata repository

Buy Now
Questions 173

Development of goals, principles and policies derived from the data governance strategy will not guide the organization into the desired future state.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 174

Please select the correct component pieces that form part of an Ethical Handling Strategy and Roadmap.

Options:

A.

Emotions matrix

B.

None of the above

C.

All of the above

D.

Compliance framework

E.

Values Statement

F.

Roadmap

Buy Now
Questions 175

Data Integrity includes ideas associated with completeness, accuracy, and consistency.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 176

The acronym CMDB stands for:

Options:

A.

Customization management tools or databases

B.

Classic management technologies or databases

C.

Cached management technologies or databases

D.

Configuration management tools or databases

E.

Cached management tools or databases

F.

Classic monitoring technologies or databases

Buy Now
Questions 177

Confidentiality classification schemas might include two or more of the five confidentiality classification levels. Three correct classifications levels are:

Options:

A.

Consistency

B.

Internal use only

C.

Restricted confidential

D.

System development

E.

Confidential

F.

None of the above

Buy Now
Questions 178

When recovering from multiple system failures, what is the biggest difficulty faced

by a DBA?

Options:

A.

Determining where the corrupt pages exist in the database file system

B.

Determining what point to recover to using backups taken at different points intime

C.

Reseting active directory to reapply the security policies

D.

Organising for the tapes to be delivered to the main data center

E.

Determining what version of the DBMS to recover - considering incrementalPatches

Buy Now
Questions 179

Confirming and documenting understanding of different perspectives facilitate:

Options:

A.

Formalization

B.

Normalization

C.

Scope definition

D.

Knowledge retention/documentation

Buy Now
Questions 180

ISO 8000 will describe the structure and the organization of data quality management, including:

Options:

A.

Data Quality Availability

B.

Data Quality Planning

C.

Data Quality Control

D.

Data Quality Assurance

E.

Data Quality Improvement

Buy Now
Questions 181

Data governance requires control mechanisms and procedures for, but not limited to, facilitating subjective discussions where managers’ viewpoints are heard.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 182

Business Intelligence, among other things, refer to the technology that supports this kind of analysis.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 183

The advantage of a decentralised Data Governance model over a centralised model is:

Options:

A.

An increased level of ownership from local decision making groups

B.

The cheaper execution of Data Governance operations

C.

Having a common approach to resolving Data Governance issues

D.

The common metadata repository configurations

E.

The easier implementation of industry data models

Buy Now
Questions 184

The need to manage data movement efficiently is a primary driver for Data Integration and Interoperability.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 185

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 186

Integrating data security with document and content management knowledge areas.

guides the implementation of:

Options:

A.

Appropriate access and authorization to unstructured data

B.

Fitness for purpose metrics for unstructured data

C.

Appropriate privacy controls on data marts

D.

Appropriate access and authorization to structured data

E.

Straight-through processing for NoSQL queries

Buy Now
Questions 187

The DMBOK support’s DAMA’s mission by:

Options:

A.

Establish a common vocabulary

B.

Guides IT personnel to improve data management

C.

Serving as the fundamental reference guide

D.

roviding a functional framework

Buy Now
Questions 188

Data modeller: responsible for fata model version control an change control

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 189

Data governance requires control mechanisms and procedures for, but not limited to, escalating issues to higher level of authority.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 190

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

Options:

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Buy Now
Questions 191

The four A’s in security processes include:

Options:

A.

Audit

B.

Authentication

C.

Access

D.

Authorization

E.

Aliment

F.

Applicable

Buy Now
Questions 192

BI tool types include:

Options:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

Buy Now
Questions 193

A database uses foreign keys from code tables for column values. This is a way of

implementing:

Options:

A.

Event data

B.

Temporal data

C.

Reference data

D.

Master data

E.

Star schema data

Buy Now
Questions 194

A goal of reference and master data is to provide authoritative source of reconciled and quality-assessed master and reference data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 195

Business rules describe why business should operate internally, in order to be successful and compliant with the outside world.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 196

The load step of the ETL is physically storing or presenting the results of the transformation into the source system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 197

Field overloading: Unnecessary data duplication is often a result of poor data management.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 198

Data security internal audits ensure data security and regulatory compliance policies are followed should be conducted regularly and consistently.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 199

A goal of reference and master data management is for data to ensure shared data is:

Options:

A.

Continuous, consistent, current and private

B.

Complete, consistent, current and authoritative

C.

Secure, auditable, publicly available and free

D.

Complete, consistent, content and relevant

E.

Secure, auditable. complete and relevant

Buy Now
Exam Code: DMF-1220
Exam Name: Data Management Fundamentals
Last Update: Apr 30, 2025
Questions: 666
DMF-1220 pdf

DMF-1220 PDF

$25.5  $84.99
DMF-1220 Engine

DMF-1220 Testing Engine

$30  $99.99
DMF-1220 PDF + Engine

DMF-1220 PDF + Testing Engine

$40.5  $134.99