Implementing a BI portfolio is about identifying the right tools for the right user communities within or across business units.
Data warehousing describes the operational extract, cleaning, transformation, control and load processes that maintain the data in a data warehouse.
A change management program supporting formal data governance should focus communication on:
Obtaining buy-in from all stakeholders
Elements that point to differences between warehouses and operational systems include:
The data in Data warehouses and marts differ. Data is organized by subject rather than function
Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.
Referential Integrity (RI) is often used to update tables without human intervention. Would this be a good idea for reference tables?
What business function is best aligned to deliver oversight to data architecture ?
ISO 8000 will describe the structure and organization of data quality management, including:
Wat data architecture designs represent should be clearly documented. Examples include:
Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.
In Data Modelling, the generalization of the concept of person and organization into a party enables:
The biggest business driver for developing organizational capabilities around Big Data and Data Science is the desire to find and act on business opportunities that may be discovered through data sets generated through a diversified range of processes.
How can the Data Governance process best support Regulatory reporting requirements?
While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.
Content management includes the systems for organizing information resources so that they can specially be stored.
Business metadata focuses largely on the content and condition of the data and includes details related to data governance.
ISO 8000 will describe the structure and the organization of data quality management, including:
Value is the difference between the cost of a thing and the benefit derived from that thing.
Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.
Which of the following activities is most likely to maintain bias in data analysis?
Data security internal audits ensure data security and regulatory compliance policies are followed should be conducted regularly and consistently.
ETL is the basic process which is central to all areas in Data Integration and Interoperability. It is an abbreviation for extract, transition and load.
CMDB provide the capability to manage and maintain Metdata specifically related to the IT assets, the relationships among them, and contractual details of the assets.
Examples of the ‘Who’ entity category include: employee; patient; player; and suspect.
Domains can be identified in different ways including: data type; data format; list; range; and rule-based.
Architecture is the fundamental organization of a system, embodied in its components, their relationships to each other and the environment and the principles governing its design and evolution.
Emergency contact phone number would be found in which master data
management program?
An authoritative system where data is created/captured, and/or maintained through
a defined set of rules and expectations is called:
To understand and evaluate ethical use of data within the organization what principles should we base our decisions on?
Layers of data governance are often part of the solution. This means determining where accountability should reside for stewardship activities and who the owners of the data are.
The Belmont principles that may be adapted for Information Management disciplines, include:
All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.
Data Storage and Operations: The design, implementation and support of stored data to maximize its value.
Malware refers to any infectious software created to damage, change or improperly access a computer or network.
Data access control can be organized at an individual level or group level, depending on the need.
Use business rules to support Data Integration and Interoperability at various points, to:
Data modelling tools are software that automate many of the tasks the data modeller performs.
The process of identifying how different records may relate to a single entity is called:
In the Abate Information Triangle the past moves through the following echelons befor it comes insight:
The business glossary application is structured to meet the functional requirements of the three core audiences:
The CAP theorem asserts that the distributed system cannot comply with all the parts of the ACID. A distributed system must instead trade-off between the following properties:
The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.
Data Management Professionals only work with the technical aspects related to data.
When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?
Logical abstraction entities become separate objects in the physical database design using one of two methods.
Operational Metadata describes details of the processing and accessing of data. Which one is not an example:
An effective Data Governance communication program should include the following:
Practitioners identify development of staff capability to be a primary concern of Data Governance. Why would this be a main concern?
When constructing models and diagrams during formalisation of data architecture there are certain characteristics that minimise distractions and maximize useful information. Characteristics include:
Data profiling is a form of data analysis used to inspect data and assess quality.
Corrective actions are implemented after a problem has occurred and been detected.
XML provides a language for representing both structures and unstructured data and information.
A controlled vocabulary is a defined list of explicitly allowed terms used to index, categorize, tag, sort and retrieve content through browsing and searching.
What ISO standard defines characteristics that can be tested by any organisation in the data supply chain to objectively determine conformance of the data to this ISO standard.
What changes in data processing when a gas utility checks the condition of its assets using a drone rather than a team of people driving alongside the pipeline?
Normalisation is the process of applying rules in order to organise business complexity into stable data structures.
Organizations conduct capability maturity assessments for a number of reasons, including:
There are numerous methods of implementing databases on the cloud. The most common are:
The language used in file-based solutions is called MapReduce. This language has three main steps:
The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.
You are a reporting Data Analyst. A new Management Report has been requested. What is the most effective way to ensure you receive the appropriate data at the correct level of accuracy to meet the business need?
Within projects, conceptual data modelling and logical data modelling are part of requirements planning and analysis activities, while physical data modelling is a design activity.
The independent updating of data into a system of reference is likely to cause:
Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.
What are some of the business drivers for the ethical handling of data that Data Governance should satisfy?
An effective team is based on two simple foundations: trust and a common goal.
Assessment criteria are broken into levels, and most capability maturity models use five (5) levels. This is important since:
Achieving security risk reduction in an organisation begins with developing what?
Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:
A business driver for Master Data Management program is managing data quality.
Data governance program must contribute to the organization by identifying and delivering on specific benefits.
Data governance requires control mechanisms and procedures for, but not limited to, identifying, capturing, logging and updating actions.
Data flows map and document relationships between data and locations where global differences occur.
In matching, false positives are three references that do not represent the same entity are linked with a single identifier.
Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.
What position is responsible for the quality and use of their organization's data
assets?
What techniques should be used and taught to produce the required ethical data handling deliverables?
Following the rollout of a data issue process, there have been no issues recorded in the first month. The reason for this might be:
When measuring the value of data architecture one should be most concerned about
Please select the option that correctly orders the models in decreasing level of detail:
Measuring the effects of change management on in five key areas including: Awareness of the need to change; Desire to participate and support the change; Knowledge about how to change; Ability to implement new skills and behaviors; and Reinforcement to keep the change in place.
A staff member has been detected inappropriately accessing client records from
usage logs. The security mechanism being used is an:
Product Master data can only focus on an organization’s internal product and services.
Which of the following is NOT a valid Data Governance programme Key Performance Indicator (KPI)?
A communication plan includes an engagement model for stakeholders, the type of information to be shared, and the schedule for sharing information.
Deliverables in the data management maturity assessment context diagram include:
What position should be responsible for leading the Data Governance Council (DGC)?
Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity
The better an organization understands the lifecycle and lineage of its data, the better able it will be to manage its data. Please select correct implication of the focus of data management on the data lifecycle.
The load step of the ETL is physically storing or presenting the results of the transformation into the source system.
ANSI standard 859 has three levels of control of data, based on the criticality of the data and the perceived harm that would occur if data were corrupt or otherwise unavailable, including:
A goal of reference and master data management is for data to ensure shared data is:
As an often-overlooked aspects of basic data movement architecture, Process controls include:
Which DMBok knowledge area is most likely responsible for a high percentage of
returned mail?
Which of these best describes the purpose of a Communications Plan in Data Governance?
A ‘Golden Record’ means that it is always a 100% complete and accurate representation of all entities within the organization.
The library of Alexandria was one of the largest collection of books in the ancient
world. Which DMBoK knowledge area is most aligned with managing the collection?
Integration of ETL data flows will usually be developed within tools specialised to manage those flows in a proprietary way.
Tools required to manage and communicate changes in data governance programs include
Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:
Why is the GDPR called the most important change in data and data privacy regulation in 20 years?
Architects seek to design in a way that brings value to an organisation. To reach these goals, data architects define and maintain specifications that:
A limitation of the centralized approach include: Maintenance of a decentralized repository is costly.
In Resource Description Framework (RDF) terminology, a triple store is composed of a subject that denotes a resource, the predicate that expresses a relationship between the subject and the object, and the object itself.
Industry is struggling to distinguish the accountabilities of CDO and CIO. The definition of their responsibilities may specify parts of:
In designing and building the database, the DBA should keep the following design principles in mind:
Content needs to be modular, structured, reusable and device and platform independent.
When data is classified as either security data or regulatory data, the result will be:
How can the Data Governance process in an organisation best support the requirements of various Regulatory reporting needs?
Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:
There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.
Field overloading: Unnecessary data duplication is often a result of poor data management.
To build models, data modellers heavily rely on previous analysis and modelling work.
A Global ID is the MDM solution-assigned and maintained unique identifier attached to reconciled records.
Which statement best describes the relationship between documents and records?
A sandbox environment can either be a sub-set of the production system, walled off from production processing or a completely separate environment.
Please select the correct general cost and benefit categories that can be applied consistently within an organization.
A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.
A database uses foreign keys from code tables for column values. This is a way of implementing:
The flow of data in a data integration solution does not have to be designed and documented.
Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.
Regulations including the Sarbanes-Oxley Act require evidence of data lineage and accuracy. How can Data Governance aid organisations in achieving this goal?
In the context of big data the Three V’s refer to: Volume, Velocity and Validity
Please select the answer that does not represent a machine learning algorithm:
CDMP | DMF-1220 Questions Answers | DMF-1220 Test Prep | Data Management Fundamentals Questions PDF | DMF-1220 Online Exam | DMF-1220 Practice Test | DMF-1220 PDF | DMF-1220 Test Questions | DMF-1220 Study Material | DMF-1220 Exam Preparation | DMF-1220 Valid Dumps | DMF-1220 Real Questions | CDMP DMF-1220 Exam Questions