Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

DMF-1220 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

DMF-1220 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Data Management Fundamentals
  • Last Update: Sep 12, 2025
  • Questions and Answers: 730
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

DMF-1220 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

DMF-1220 Practice Exam Questions with Answers Data Management Fundamentals Certification

Question # 6

In Data Modelling, the generalization of the concept of person and organization into a party enables:

A.

The implementation of relationships between persons and organizations

B.

Single person organizations to be managed consistently

C.

Faster implementation into packages that use the same vocabulary

D.

Them to act in roles in agreements, shared address usages, and common interaction processes

E.

Greater security as users are unaware if this party is a person or an organization

Full Access
Question # 7

Metrics tied to Reference and Master Data Quality include:

A.

Addressing all queries

B.

Data steward coverage

C.

Implementing data management training

D.

Data sharing volume and usage

E.

Data ingestion and consumption

F.

Service level agreements

Full Access
Question # 8

The 'Data Governance Steering Committee' is best described as:

A.

The community of interest, focused on specific subject areas or projects

B.

A burden to the agile delivery in a modern enterprise

C.

The local or divisional council, working under auspices of the CDO

D.

The representatives of data use on project steering committees

E.

The primary and highest authority responsible for the oversight and support of Data Governance activities

Full Access
Question # 9

Operational reports are outputs from the data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 10

Which of the following is a Data Quality principle?

A.

Prevention

B.

Governance

C.

Criticality

D.

Standards Driven

E.

All of these

Full Access
Question # 11

Metrics tied to Reference and Master Data quality include:

A.

Strategic usage reporting

B.

Amsterdam Information Model

C.

Data change activity

D.

Total cost of ownership

Full Access
Question # 12

Creating the CDM involves the following steps:

A.

Select Scheme

B.

Obtain Sign-off

C.

Complete Initial CDM

D.

Select Notation

E.

Incorporate Enterprise Technology

F.

All of the above

Full Access
Question # 13

Accomplish repository scanning in two distinct approaches, including:

A.

Semi- proprietary integration

B.

Proprietary interface

C.

Semi-proprietary interface

D.

Proprietary integration

Full Access
Question # 14

Integrating data security with document and content management knowledge areas.

guides the implementation of:

A.

Appropriate access and authorization to unstructured data

B.

Fitness for purpose metrics for unstructured data

C.

Appropriate privacy controls on data marts

D.

Appropriate access and authorization to structured data

E.

Straight-through processing for NoSQL queries

Full Access
Question # 15

There are three techniques for data-based change data capture, namely:

A.

The source system populates specific data elements.

B.

Application automated interfaces

C.

The source system processes copy data that has changed into a separate object as part of the transaction, which is then used for the extract process.

D.

The source systems send binary code through ASCI that makes the process rapid.

E.

The source system processes add to a simple list of objects and identifiers when changing data, which is then used to control selection of data extraction.

F.

None of the above

Full Access
Question # 16

The data warehouse and marts differ from that in applications as the data is organized by subject rather than function.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Characteristics that minimise distractions and maximise useful information include, but not limited to, consistent object attributes

A.

TRUE

B.

FALSE

Full Access
Question # 18

Data mining is a sub-field of supervised learning where users attempt to model data elements and predict future outcomes through the evaluation of probability estimates.

A.

TRUE

B.

FALSE

Full Access
Question # 19

Achieving security risk reduction in an organisation begins with developing what?

A.

A change management model, prioritising security changes and then updatingthe active directory

B.

An enterprise data model, rolling out data flow diagrams and enbedding securityinto the database

C.

A security model, classifying each organisational role and putting the physicaldata behind a firewall

D.

A classification model, classifying each data concept and locating the physicaldata

E.

A metadata model, locating the data and moving it into the metadata repository

Full Access
Question # 20

The business glossary application is structured to meet the functional requirements of the three core audiences:

A.

Data users

B.

Application users

C.

Innovation users

D.

Business users

E.

Data stewards

F.

Technical users

Full Access
Question # 21

The minority of operational metadata is generated as data is processed.

A.

TRUE

B.

FALSE

Full Access
Question # 22

What is one of the most important things about collecting data?

A.

To share the data across the organization

B.

To keep data away from the public

C.

To resolve many-to-many relationships

D.

To collect as much data as possible into the data repository

E.

To keep data for each department separate because no one needs all the data

Full Access
Question # 23

Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.

A.

FALSE

B.

TRUE

Full Access
Question # 24

During the intial scoping of a project, a data model can be used to:

A.

Identify detailed impact on all the tables in a database that must be changed

B.

Determine the security requirements for accessing the data

C.

Provide a clear definition of affected and non-affected data entities

D.

Determine the impact of business processes and customer lifecycles

E.

Plan the structure of the metadata repository

Full Access
Question # 25

Through similarity analysis, slight variation in data can be recognized and data values can be consolidated. Two basic approaches, which can be used together, are:

A.

Realistic

B.

Opportunistic

C.

Deterministic

D.

Probabilistic

E.

Procedural

F.

All of the above

Full Access
Question # 26

An implemented warehouse and its customer-facing BI tools is a technology product.

A.

TRUE

B.

FALSE

Full Access
Question # 27

During the initial scoping of a project, a data model can be used to:

A.

Determine the impact of business processes and customer lifecycles

B.

Identify detailed impact on all the tables in a database that must be changed

C.

Plan structure of the metadata repository

D.

Provide a clear definition of affected and non-affected data entities

E.

Determine the security requirements for accessing the data

Full Access
Question # 28

Advantages if a centralized metadata repository include:

A.

Quick metadata retrieval

B.

None of the above

C.

Combining data from multiple other tables in advance to avoid costly run-time joins

D.

All of the above

E.

High availability

F.

Low latency, since it is independent of the source systems

Full Access
Question # 29

When recovering from multiple system failures, what is the biggest difficulty faced

by a DBA?

A.

Determining where the corrupt pages exist in the database file system

B.

Determining what point to recover to using backups taken at different points intime

C.

Reseting active directory to reapply the security policies

D.

Organising for the tapes to be delivered to the main data center

E.

Determining what version of the DBMS to recover - considering incrementalPatches

Full Access
Question # 30

The better an organization understands the lifecycle and lineage of its data, the better able it will be to manage its data. Please select correct implication of the focus of data management on the data lifecycle.

A.

Data Quality must be managed throughout the data lifecycle

B.

Data Security must only be managed at the start of the data lifecycle

C.

Metadata Quality is the most important part of the management process

D.

Data Management efforts should focus on the most critical data last

Full Access
Question # 31

Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.

A.

TRUE

B.

FALSE

Full Access
Question # 32

A complexity in documenting data lineage is:

A.

Establishing data quality metrics

B.

Conflicting application requirements from data owners

C.

Choosing which content management software to use

D.

Identifying source databases

E.

Different data element names and formats

Full Access
Question # 33

CMA is an abbreviation for Capability Maturity Assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 34

Data warehousing describes the operational extract, cleaning, transformation, control and load processes that maintain the data in a data warehouse.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Data Management maturity has many goals for accomplishment including having a positive effect on culture. This is important to a Data Governance program for the following reason:

A.

It is important to be able to assess the level of current state for each component against the Data Governance best practices to determine how readily the culture has accepted Data Governance

B.

Data Governance does not affect the culture of the organization directly

C.

It is important to have many goals so that you can show progress on some of the goals even if you can't meet all of them

D.

Data management maturity only has one goal

E.

Best practices for data management are not the same as best practices for Data Governance

Full Access
Question # 36
A.

FALSE

B.

TRUE

Full Access
Question # 37

Reduced risk is a benefit of high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 38

Data security internal audits ensure data security and regulatory compliance policies are followed should be conducted regularly and consistently.

A.

TRUE

B.

FALSE

Full Access
Question # 39

People often incorrectly combine the concepts of data management and information technology into one. Which of the following is NOT an example of this?

A.

A significant focus on identity in the call centre has reduced duplication by 50%

B.

The rollout of reporting corrections has been delayed by the Big Data Project

C.

The migration of customer data to a new platform failed to reduce the amount of returned mail

D.

Collaboration will be improved by the new document management system

E.

The delivery of the DG portal is critical to achieving any benefits of Data Governance

Full Access
Question # 40

The goals of implementing best practices around document and content management include:

A.

Ensuring effective and efficient retrieval and use of data and information in unstructured formats

B.

Ensuring integration capabilities between structured and unstructured data

C.

Complying with legal obligations and customer expectations

D.

Enduring integration competencies between semi-structured systems

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Full Access
Question # 41

What is the best definition of Crowdsourced data collection?

A.

Crowdsourcing should not be used to gather data because there will be too many opinions and not enough facts

B.

Crowdsourcing is the process of obtaining needed data by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers  

C.

Crowdsourced data is the best way of finding data because so many people are contributing their definitions

D.

Crowdsourced data is the data that comes from using a company wiki to gather data because anyone in the crowd can contribute

E.

Crowdsourced data collection is only used by researchers to answer research, survey or feedback questions

Full Access
Question # 42

Class operations can be:

A.

General: Hidden

B.

Public: Externally visible

C.

Internally visible: Visible to children objects

D.

Private: Hidden

Full Access
Question # 43

Examples of concepts that can be standardized within the data architecture knowledge area include:

A.

Enterprise data models

B.

System naming conventions

C.

None of the above

D.

Data security standards

E.

Data quality rules

F.

Tool standards

Full Access
Question # 44

What are the three characteristics of effective Data Governance communication?

A.

It must be clear, unambiguous, and consistent

B.

It must be consistent, unambiguous, engaging

C.

It must be viral, vital, and have volume

D.

It must be colorful, engaging, using multi-media

E.

It must be clear, structured, repetitive

Full Access
Question # 45

Please select the correct name for the LDM abbreviation

A.

Logical Data Model

B.

Logical Dimensional Model

C.

Lifecycle Data Model

D.

Lifecycle Dimensional Model

Full Access
Question # 46

A data dictionary is necessary to support the use of a DW.

A.

TRUE

B.

FALSE

Full Access
Question # 47

Which answer is considered to be the best definition of data security?

A.

Data security occurs when all metadata is tagged as either Confidential, Public or Sensitive

B.

Data security is only possible after Data Governance and Risk Management have looked at all the data, verified, definitions and conducted a impact analysis

C.

Data security can be described as having all of an organization's data in a repository along with a policy of limited access to only those employees managing the data

D.

Data security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization's data

E.

Data security is the ability to track who in the organization has access to metadata

Full Access
Question # 48

Data for Big Data ingestion can also be called the data lake. This needs to be carefully managed, or the data lake will become:

A.

A data model

B.

An organizational statistic

C.

A biased report

D.

A level of data not usable by Data Scientists

E.

A data swamp

Full Access
Question # 49

A data warehouse deployment with multiple ETL, storage and querying tools often

suffers due to the lack of:

A.

Integration of the dictionaries to achieve common understanding

B.

Conflict between software vendors

C.

Disk space on the big data platform

D.

Quality data modelers

E.

Common data types in the source datasets

Full Access
Question # 50

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Full Access
Question # 51

The search function associated with a document management store is failing to return known artefacts. This is due to a failure of:

A.

Effective data quality metrics

B.

Business intelligence implementation

C.

Maintaining public access to all documents in the document management store

D.

Maintaining appropriate metadata on each document

E.

Data privacy and confidentiality procedures

Full Access
Question # 52

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

A.

TRUE

B.

FALSE

Full Access
Question # 53

When doing reference data management, there many organizations that have standardized data sets that are incredibly valuable and should be subscribed to. Which of these organizations would be least useful?

A.

The company registration organization

B.

Wikipedia

C.

ISO

D.

IEEE

E.

The national post office

Full Access
Question # 54

Data quality management is a key capability of a data management practice and organization.

A.

TRUE

B.

FALSE

Full Access
Question # 55

Enterprise data architects in an application migration project are primarily concerned with:

A.

Mapping of data to business processes

B.

Changes to business processes

C.

Resolving data complexity

D.

Data mapping specifications

E.

Mapping outliers

Full Access
Question # 56

There are several methods for masking data:

A.

Substitution

B.

Temporal variance

C.

Temporal stagnation

D.

Value stagnation

E.

Value variance

F.

All of the above

Full Access
Question # 57

With respect to health data, what is the difference between the privacy and the security of the data?

A.

Privacy is defined as the right for an individual to keep his individual health information from being disclosed. Security is defined as the mechanism used to protect privacy of information

B.

Privacy is defined as the right for an doctor to share health data with other doctors and insurance companies. Security is defined as keeping the data where it was recorded

C.

Privacy is defined as the right of the individual to see their own medical records. Security is defined as the laws that protect a person's privacy

D.

Privacy is only possible if a person signs an affidavit requesting privacy. Security is the placing of the document in a safe place

E.

Privacy means only an individual can give access to their medical records to another person. Security means their records are secure and will not be shared

Full Access
Question # 58

Please select the types of DBA specializations:

A.

Data

B.

Application

C.

Innovation

D.

Development

E.

Procedural

F.

All of the above

Full Access
Question # 59

Device security standard include:

A.

Installation of anti-malware and encryption software

B.

Relational security policies

C.

Access policies regarding connections using mobile devices

D.

Regulation compliance standards

E.

None of the above

F.

Awareness of security vulnerabilities

Full Access
Question # 60

The advantage of a decentralised Data Governance model over a centralised model is:

A.

An increased level of ownership from local decision making groups

B.

The cheaper execution of Data Governance operations

C.

Having a common approach to resolving Data Governance issues

D.

The common metadata repository configurations

E.

The easier implementation of industry data models

Full Access
Question # 61

Which of the following is NOT a stage of the Data Quality Management Cycle?

A.

Check

B.

Do

C.

Plan

D.

Act

E.

Intervene

Full Access
Question # 62

In a data warehouse, where the classification lists for organisation type are

inconsistent in different source systems, there is an indication that there is a lack of

focus on:

A.

Metadata Management

B.

Data Storage

C.

Data Modelling

D.

Master Data

E.

Reference data

Full Access
Question # 63

Business metadata focuses largely on the content and condition of the data and includes details related to data governance.

A.

TRUE

B.

FALSE

Full Access
Question # 64

Databases are categorized in three general ways:

A.

Warped

B.

Non-relational

C.

Relational

D.

Accessible

E.

None of the above

F.

Hierarchical

Full Access
Question # 65

The placement of Data Governance is most effective when:

A.

It is defined by Compliance because most of what is governed is driven by regulatory and compliance issues

B.

The Database Administrators incorporate Data Governance in their database design

C.

It has a Data Governance manager and some data stewards

D.

Defined at the department level at which is most important

E.

When it is at the enterprise level so it can support all other data management initiatives that cross functional boundaries

Full Access
Question # 66

When data is classified as either security data or regulatory data, the result will be:

A.

Business employees are restricted from viewing the data but technical employees can store the data in databases

B.

Employees will never see classified data for any reason

C.

Employees know they have to aggregate the data

D.

Employees, both business & technical know the sensitivity of the data

E.

Employees know they cannot use the data because it has been classified

Full Access
Question # 67

Malware types include:

A.

Trojan horse

B.

Worm

C.

Weasel

D.

Virus

E.

Adware

F.

Camware

Full Access
Question # 68

Latency can be:

A.

Batch

B.

Event-driven

C.

Distributed

D.

Real-time synchronous

Full Access
Question # 69

A project scope requires the collection, exchange, and reporting of data from multiple in-house custom systems. Documents gathered include business concepts, existing database schemas, XSDs, and reporting layouts. How many models of each layer of abstraction can be expected?

A.

More XSDs than reporting layouts

B.

The same number of each of the model types

C.

More physical data models than logical data models, and more logical data models than conceptual data models

D.

Only 1 conceptual data model, 1 logical data model, and 1 physical data model

E.

More conceptual data models than physical data models

Full Access
Question # 70

Data Fabric is:

A.

A way of sewing together different data concepts into a single data warehouse

B.

A metadata repository

C.

A form of data lake that automates data acquisition and initial data quality processing

D.

A superior star schema strategy

E.

Just another data warehouse with no distinguishing features

Full Access
Question # 71

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

A.

TRUE

B.

FALSE

Full Access
Question # 72

Which model has one Data Governance organization coordinate with multiple Business Units to maintain consistent definitions and standards?

A.

Federated Data Governance Model

B.

Central Data Governance Model

C.

Cognitive Data Governance Model

D.

Replicated Data Governance Model

E.

Associative Data Governance Model

Full Access
Question # 73

A ‘Golden Record’ means that it is always a 100% complete and accurate representation of all entities within the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 74

Functionality-focused requirements associated with a comprehensive metadata solution, include:

A.

Synchronization

B.

Structure

C.

None of the above

D.

History

E.

Volatility

F.

Access rights

Full Access
Question # 75

Identify indicative components of a Data Strategy.

A.

Vision, case studies, succession plans, functional requirements

B.

Vision, data invoice, payment receipts, confirmations

C.

Vision, business surveys, employee performance goals

D.

Vision, business case, data models, employee goals

E.

Vision, business case, principles, goals, and measures

Full Access
Question # 76

The Belmont principles that may be adapted for Information Management disciplines, include:

A.

Respect for Persons

B.

Respect for Machines

C.

Beneficence

D.

Criminality

E.

Justice

Full Access
Question # 77

Defining quality content requires understanding the context of its production and use, including:

A.

Producers

B.

Timing

C.

None of the above

D.

Delivery

E.

Consumers

F.

Format

Full Access
Question # 78

Examples of interaction models include:

A.

Hub-and-spoke

B.

Publish - subscribe

C.

Point-to-point

D.

Wheel-and-spike

Full Access
Question # 79

Data Governance Office (DGO) focuses on enterprise-level data definitions and data management standards across all DAMA-DMBOK knowledge areas. Consists of coordinating data management roles.

A.

TRUE

B.

FALSE

Full Access
Question # 80

Some document management systems have a module that may support different types of workflows such as:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Full Access
Question # 81

Practitioners identify development of staff capability to be a primary concern of Data Governance. Why would this be a main concern?

A.

Because we need to develop the next generation of Chief Data Officers

B.

Because it is important to have senior people, in order to dictate that the policy will be followed

C.

Because organizations expect quick results

D.

Because it is important to train staff to ensure application of appropriate methods

E.

Because it is a recognized benchmark standard

Full Access
Question # 82

Field overloading: Unnecessary data duplication is often a result of poor data management.

A.

TRUE

B.

FALSE

Full Access
Question # 83

The four main types of NoSQL databases are:

A.

Document

B.

Row-orientated

C.

Graph

D.

Strategic

E.

Key-value

F.

Column-orientated

Full Access
Question # 84

Enterprise Data Architects should support projects for potential:

A.

Non-compliance to data standards

B.

Legal reviews

C.

Incomplete data requests

D.

Data-focused security reviews

E.

Planning for metadata development

Full Access
Question # 85

Domains can be identified in different ways including: data type; data format; list; range; and rule-based.

A.

TRUE

B.

FALSE

Full Access
Question # 86

According to the DMBoK, Data Governance is central to Data Management. In practical terms, what other functions of Data Management are required to ensure that your Data Governance programme is successful?

A.

Master Data, Data Quality, and Data Development

B.

Data Quality, Content and Document Management, and Data Development

C.

Data Modelling, Data Architecture and Master Data Management

D.

Data Quality, Data Architecture, and Metadata Management

E.

Data Architecture, Data Security, and Metadata Management

Full Access
Question # 87

An implemented warehouse and its customer facing BI tool is a data product.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Quality Assurance Testing (QA) is used to test functionality against requirements.

A.

TRUE

B.

FALSE

Full Access
Question # 89

Reference and master data require governance processes, including:

A.

The data sources to be integrated

B.

Emotions matrix

C.

Compliance framework

D.

The priority and response levels of data stewardship efforts

E.

The conditions of use rules to be followed

F.

None of the above

Full Access
Question # 90

Customer value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as well we managing risk related to usage. Which of these is not a way to measure value?

A.

Market value

B.

Identified opportunities

C.

Risk cost

D.

User perspective

E.

Replacement cost

Full Access
Question # 91

Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?

A.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

B.

Alignment of Business and IT strategies, definition of data standards, implementation of Data Governance and metadata software tools

C.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

D.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

E.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

Full Access
Question # 92

Examples of transformation in the ETL process onclude:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Full Access
Question # 93

Triplestores can be classified into these categories:

A.

Native triplestores

B.

All of the above

C.

None of the above

D.

RDMS-backed triplestores

E.

NoSQL triplestores

F.

MapReduce triplestores

Full Access
Question # 94

What ISO standard defines characteristics that can be tested by any organisation in the data supply chain to objectively determine conformance of the data to this ISO standard.

A.

ISO 9000

B.

ISO 7000

C.

ISO 8000

D.

ISO 9001

Full Access
Question # 95

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Full Access
Question # 96

Effectiveness metrics for a data governance programme includes: achievement of goals and objectives; extend stewards are using the relevant tools; effectiveness of communication; and effectiveness of education.

A.

FALSE

B.

RRUE

Full Access
Question # 97

Big Data and Data Science Governance should address such data questions as:

A.

What the data means on the source side and how to interpret the results on the on the output side

B.

What the data means on the source side but no assessment needed for the interpretation of results

C.

Whether to enrich the data and benefits of enrichment

D.

Terms for data obtained from vendors and outside organizations

E.

The approach for alignment of data visualization tools to the user community

Full Access
Question # 98

The term data quality refers to only the characteristics associated with high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 99

Data Governance includes developing alignment of the data management approach with organizational touchpoints outside of the direct authority of the Chief Data Officer. Select the example of such a touchpoint.

A.

Content Management

B.

Requirements

C.

Business Glossary

D.

Records Management

E.

Regulatory Compliance

Full Access
Question # 100

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

A.

Stakeholders

B.

Government regulations

C.

Proprietary business concerns

D.

Legitimate access needs

E.

Contractual obligations

F.

None of the above

Full Access
Question # 101

Which of the following are must-do for any successful Data Governance programme?

A.

Create a communications plan to inform to all stakeholders what you are doing.

B.

Ensure there is a Data Governance Policy with which everyone in the organization is required to comply.

C.

Create a training programme for all for data owners and data stewards.

D.

Set up a wiki for incorrect data definitions.

E.

Allocate Data Ownership responsibilities according to their role in the organization.

Full Access
Question # 102

A Metadata repository contains information about the data in an organization, including:

A.

Hierarchical

B.

Data structure

C.

Warped

D.

Business rules for managing data

E.

Content

F.

None of the above

Full Access
Question # 103

An input in the data architecture context diagram includes data governance.

A.

TRUE

B.

FALSE

Full Access
Question # 104

Data integrity is the state of being partitioned – protected from being whole.

A.

TRUE

B.

FALSE

Full Access
Question # 105

Change only requires change agents in special circumstances, especially when there is little to no adoption.

A.

TRUE

B.

FALSE

Full Access
Question # 106

What areas should you consider when constructing an organization's Data Governance operating model?

A.

Cultural factors. Governance strategy will need to advocate for an operating model that fits with organizational culture, while still progressing change

B.

What is their Business Model (decentralized vs. centralized, local vs. international, etc.)

C.

Impact of regulation. Highly regulated organizations will have a different mindset and operating model of Data Governance than those less regulated

D.

All of these

E.

Value of the data to the organization. Is their Data a crucial commodity (do they sell the data)

Full Access
Question # 107

Self-service is a fundamental delivery channel in the BI portfolio.

A.

TRUE

B.

FALSE

Full Access
Question # 108

It is unwise to implement data quality checks to ensure that the copies of the attributes are correctly stored.

A.

FALSE

B.

TRUE

Full Access
Question # 109

Validity, as a dimension of data quality, refers to whether data values are consistent with a defined domain of values.

A.

TRUE

B.

FALSE

Full Access
Question # 110

Which of the following is NOT a type of Data Steward?

A.

Coordinating

B.

Enterprise

C.

Operational

D.

Business

E.

Executive

Full Access
Question # 111

The four A’s in security processes include:

A.

Audit

B.

Authentication

C.

Access

D.

Authorization

E.

Aliment

F.

Applicable

Full Access
Question # 112

Select three correct attributes a data governance programme must be:

A.

Embedded

B.

Flexible

C.

Measures

D.

Rigid

E.

Independent responsibility

F.

Sustainable

Full Access
Question # 113

Over a decade an organization has rationalized implementation of party concepts from 48 systems to 3. This is a result of good:

A.

Data operations and system rationalization

B.

Data quality and data governance

C.

System rationalization and metadata management

D.

Data architecture and data warehousing

E.

Data architecture and data governance

Full Access
Question # 114

What is the best reason for capturing synonyms in a data repository?

A.

Synonyms are good for indexing or for uncontrolled vocabularies

B.

You should capture all synonyms in one place so that Data Governance can decide on the best name for an element

C.

Synonyms are useful in discovering relationships between data elements

D.

Not all parts of an organization may name a field exactly the same, and the synonym will aid in data searches

E.

Without synonyms, you may not realize that two fields are the same

Full Access
Question # 115

Emergency contact phone number would be found in which master data

management program?

A.

Location

B.

Asset

C.

Service

D.

Employee

E.

Product

Full Access
Question # 116

Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.

A.

TRUE

B.

FALSE

Full Access
Question # 117

DMMA ratings represent a snapshot of the organization’s capability level.

A.

TRUE

B.

FALSE

Full Access
Question # 118

Please select the correct component pieces that form part of an Ethical Handling Strategy and Roadmap.

A.

Emotions matrix

B.

None of the above

C.

All of the above

D.

Compliance framework

E.

Values Statement

F.

Roadmap

Full Access
Question # 119

An effective team is based on two simple foundations: trust and a common goal.

A.

TRUE

B.

FALSE

Full Access
Question # 120

It is recommended that organizations not print their business data glossaries for general use, why would you not want to print the glossary?

A.

Because there is so much data in an organization's glossary that the report would be too big to handle

B.

Because the glossary contains trade 'secrets' that the organization wants to protect

C.

Because industry rules and regulation should not be printed because they vary by State

D.

Because the data is not static but is being updated by stewards as they add new fields and definitions

E.

Because the data is confidential and should not be given out in printed form

Full Access
Question # 121

What position should be responsible for leading the Data Governance Council (DGC)?

A.

Chief Data Steward or Chief Data Officer

B.

Chief Information Officer or Chief Technology Officer

C.

DGC Chair should rotate among executive positions

D.

Chief Data Architect or Chief Data Modeler

E.

Any executive can chair the DGC

Full Access
Question # 122

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

A.

Streaming

B.

Messaging

C.

DAAS

D.

Trickle Feeds

Full Access
Question # 123

The roles associated with enterprise data architecture are data architect, data modellers and data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 124

Please select the correct types of data stewards:

A.

Executive Data Steward

B.

Chief Data Steward

C.

Enterprise Data Steward

D.

Business Data Steward

E.

A Data Seller

F.

All of the above

Full Access
Question # 125

The biggest business driver for developing organizational capabilities around Big Data and Data Science is the desire to find and act on business opportunities that may be discovered through data sets generated through a diversified range of processes.

A.

TRUE

B.

FALSE

Full Access
Question # 126

Examples of transformation include:

A.

Format changes, structure changes, replication conversion, re-duplication anddata ordering

B.

Application changes, infrastructure changes, software conversion, de-duplicationand re-ordering

C.

Data modelling changes, structure changes, metric conversion, de-duplicationand reordering

D.

Format changes, structure changes, semantic conversion, de-duplication and re-ordering

E.

Organisation changes, location changes, business strategy conversion, down-sizing and outsourcing

Full Access
Question # 127

The accuracy dimension has to do with the precision of data values.

A.

TRUE

B.

FALSE

Full Access
Question # 128

A goal of reference and master data is to provide authoritative source of reconciled and quality-assessed master and reference data.

A.

TRUE

B.

FALSE

Full Access
Question # 129

Control activities to manage metadata stores include:

A.

Roadmap extrapolation

B.

Load statistical analysis

C.

Lineage

D.

Missing metadata reports

E.

Definitions resolutions improvement

F.

Job scheduling and monitoring

Full Access
Question # 130

Data governance requires control mechanisms and procedures for, but not limited to, assignment and tracking of action items.

A.

FALSE

B.

TRUE

Full Access
Question # 131

The list of V’s include:

A.

Volatility

B.

Volume

C.

Veracity

D.

Viscosity

E.

Variety

F.

Validity

Full Access
Question # 132

All metadata management solutions include architectural layers including:

A.

Metadata Quality Assurance Testing

B.

Metadata integration

C.

Metadata usage

D.

Metadata delivery

E.

Metadata control and management

F.

None of the above

Full Access
Question # 133

XML provides a language for representing both structures and unstructured data and information.

A.

TRUE

B.

FALSE

Full Access
Question # 134

A sandbox is an alternate environment that allows write-only connections to production data and can be managed by the administrator.

A.

TRUE

B.

FALSE

Full Access
Question # 135

Sustainable Data Governance depends on:

A.

Rapid response to critical data issues

B.

The maturity level of the organization

C.

Business leadership, sponsorship, and ownership

D.

Well-documented policies

E.

Definition of 10-11 principles

Full Access
Question # 136

The business glossary should capture business terms attributes such as:

A.

Lineage

B.

Utilization

C.

Common misunderstanding in terms

D.

System development

E.

Algorithms to supporting definitions

F.

All of the above

Full Access
Question # 137

DAMA International’s Certified Data Management Professional (CDMP) certification required that data management professionals subscribe to a formal code of ethics, including an obligation to handle data ethically for the sake of society beyond the organization that employs them.

A.

TRUE

B.

FALSE

Full Access
Question # 138

A data lineage tool enables a user to:

A.

Track the data from source system to a target database; understanding itstransformations

B.

Track the historical changes to a data value

C.

Visualize how the data gets to the data lake

D.

Enables rapid development of dashboard reporting

E.

Line up the data to support sophisticated glossary management

Full Access
Question # 139

Data architect: A senior analyst responsible for data architecture and data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 140

Data Management Professionals only work with the technical aspects related to data.

A.

TRUE

B.

FALSE

Full Access
Question # 141

Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.

A.

TRUE

B.

FALSE

Full Access
Question # 142

Developing complex event processing solutions require:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Full Access
Question # 143

Which of these is NOT likely in the scope of Data Governance and Stewardship?

A.

Data asset valuation in order to allocate priority to data quality management

B.

Ensure the privacy needs of stakeholders are enforced and audited

C.

To train staff on data governance principles, embedding them in everyday decision making

D.

To adjust the definitions of items in the chart of accounts to improve financial management

E.

Monitor compliance to record management policies

Full Access
Question # 144

Resource Description Framework (RDF), a common framework used to describe information about any Web resource, is a standard model for data interchange in the Web.

A.

FALSE

B.

TRUE

Full Access
Question # 145

OCR is the abbreviation for Optical Character Recognition.

A.

TRUE

B.

FALSE

Full Access
Question # 146

Communication should start later in the process as too many inputs will distort the vision.

A.

TRUE

B.

FALSE

Full Access
Question # 147

Organizations conduct capability maturity assessments for a number of reasons, including:

A.

Organizational change

B.

Data management issues

C.

Regulation

D.

Data governance

E.

Data modeling

F.

New technology

Full Access
Question # 148

Dimensions of data quality include:

A.

Validity

B.

Privacy

C.

Innovation

D.

Accessibility

E.

Currency

F.

All of the above

Full Access
Question # 149

Companies do not rely on their information systems to run their operations.

A.

TRUE

B.

FALSE

Full Access
Question # 150

Corrective actions are implemented after a problem has occurred and been detected.

A.

FALSE

B.

TRUE

Full Access
Question # 151

Data Governance deliverables commonly include:

A.

Data value chains

B.

IT methodology and practices

C.

Business culture assessment

D.

Roadmaps and implementation strategy

E.

Regulatory requirements

Full Access
Question # 152

Most document programs have policies related to:

A.

Scope and compliance audits

B.

Proper destruction of records

C.

Proper construction of records

D.

Identification and protection of vital records

E.

Partition tolerance

F.

All of the above

Full Access
Question # 153

Metadata is described using different set of categories, including:

A.

Descriptive Metadata, Structural Metada, Administrative Metadata

B.

Diagnostic Metadata, Structural Metada, Administrative Metadata

C.

Prescriptive Metadata, Serial Metada, Administrative Metadata

D.

Descriptive Metadata, Serial Metada, Administrative Metadata

E.

None of the above

Full Access
Question # 154

Measuring the effects of change management on in five key areas including: Awareness of the need to change; Desire to participate and support the change; Knowledge about how to change; Ability to implement new skills and behaviors; and Reinforcement to keep the change in place.

A.

FALSE

B.

TRUE

Full Access
Question # 155

Operationality and interoperability depends on the data quality. In order to measure the efficiency of a repository the data quality needs to be:

A.

Stored in a Cloud for easy access

B.

Quantified by some type of metrics

C.

Be certified by a Data Governance team

D.

Have complete definitions

E.

Verified by the organization's legal department

Full Access
Question # 156

Customer relationship management systems manage Master Data about customers.

A.

TRUE

B.

FALSE

Full Access
Question # 157

In designing and building the database, the DBA should keep the following design principles in mind:

A.

Assessments

B.

Maintainability

C.

Reusability

D.

Performance and ease of use

E.

Security

F.

Integrity

Full Access
Question # 158

The failure to gain acceptance of a business glossary may be due to ineffective:

A.

Metadata Management

B.

Business Architecture

C.

Content and Document Management

D.

Data Governance

E.

Data Security

Full Access
Question # 159

Data governance can be understood in terms of political governance. It includes the following three function types:

A.

Legislative-like functions

B.

Judicial-like functions

C.

Ethical-like functions

D.

Executive functions

E.

Data-like functions

F.

Morality-like functions

Full Access
Question # 160

The language used in file-based solutions is called MapReduce. This language has three main steps:

A.

Map

B.

Shuffle

C.

Free

D.

Terminate

E.

Integrate

F.

Reduce

Full Access
Question # 161

Data quality rules and standards are a critical form of Metadata. Ti be effective they need to be managed as Metadata. Rules include:

A.

None of the above

B.

Tied to business impact

C.

Document consistency

D.

Accessible to all data customers

E.

Hierarchical consistency

F.

Confirmed by SMEs

Full Access
Question # 162

A database uses foreign keys from code tables for column values. This is a way of

implementing:

A.

Event data

B.

Temporal data

C.

Reference data

D.

Master data

E.

Star schema data

Full Access
Question # 163

Barriers to effective management of data quality include:

A.

Inappropriate or ineffective instruments to measure value

B.

Lack of awareness on the part of leadership and staff

C.

Lack of leadership and management

D.

Lack of business governance

E.

None of the above

F.

Difficulty in justification of improvements

Full Access
Question # 164

The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:

A.

Level 2 In Development

B.

Level 4 Proactive

C.

Level 2 Sub-standard

D.

Level 4 Proactive

E.

Level 3 Transformational

F.

Level 3 Essential

Full Access
Question # 165

Sample value metrics for a data governance program include:

A.

Reduction of risk

B.

Improved efficiency in operations

C.

Effectiveness of education

D.

Achievements of goals and objectives

E.

Contributions to business objectives

F.

Effectiveness of communication

Full Access
Question # 166

The goals of data security include:

A.

Managing performance of data assets

B.

Enable appropriate access to enterprise data assets

C.

Managing the availability of data throughout the data lifecycle

D.

Understand and comply with all relevant regulations and policies for privacy and confidentiality

E.

Managing the performance of data transactions

F.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Full Access
Question # 167

A ‘Content Distribution Network’ supporting a multi-national website is likely to use:

A.

An extract, transform, and load solution

B.

An archiving solution

C.

A replication solution

D.

A database backup and restore solution

E.

A records disposal solution

Full Access
Question # 168

With reliable Metadata an organization does not know what data it has, what the data represents and how it moves through the systems, who has access to it, or what it means for the data to be of high quality.

A.

TRUE

B.

FALSE

Full Access
Question # 169

Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as

A.

TRUE

B.

FALSE

Full Access
Question # 170

Small reference data value sets in the logical data model can be implemented in a physical model in three common ways:

A.

Create a matching separate code table

B.

Create a master shared code table

C.

None of the above

D.

Program integration by joining tables

E.

Embed rules or valid codes into the appropriate object’s definition.

F.

Roadmap Development

Full Access
Question # 171

Normalisation is the process of applying rules in order to organise business complexity into stable data structures.

A.

TRUE

B.

FALSE

Full Access
Question # 172

A weak point in an organization’s defenses is a:

A.

Anti-virus software

B.

Security model problem

C.

Penetration

D.

Vulnerability

E.

Firewall

Full Access
Question # 173

Basic profiling of data involves analysis of:

A.

Data sources, data visualizations, data latency, and ownership

B.

Data formats, data values, patterns, and relationships

C.

Data criteria, data acquisition, data policy, and procedures inside data governance

D.

Data clusters, data clouds, data repositories, and metadata libraries

E.

Data lakes, data warehouses, and operational data stores

Full Access
Question # 174

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.

A.

FALSE

B.

TRUE

Full Access
Question # 175

What are the three characteristics of effective Data Governance communication?

A.

It must be clear, unambiguous, and consistent

B.

It must be clear, structured, repetitive

C.

It must be viral, vital, and have volume

D.

It must be colorful, engaging, using multi-media

E.

It must be consistent, unambiguous, engaging

Full Access
Question # 176

Deliverables in the data management maturity assessment context diagram include:

A.

Maturity baseline

B.

Roadmap

C.

Executive briefings

D.

Recommendations

E.

Risk assessment

F.

Ratings and ranks

Full Access
Question # 177

Time-based patterns are used when data values must be associated in chronological order and with specific time values.

A.

TRUE

B.

FALSE

Full Access
Question # 178

Uniqueness, as a dimension of data quality, states no entity exists more than once within the data set.

A.

TRUE

B.

FALSE

Full Access
Question # 179

Poorly managed metadata leads to:

A.

Row-orientated metadata

B.

Graph metadata issues

C.

Redundant data and data management processes

D.

Doubt about the reliability of metadata and data

E.

Redundant master data

F.

Document inefficiencies

Full Access
Question # 180

An advantage of a centralized repository include: High availability since it is independent of the source systems.

A.

TRUE

B.

FALSE

Full Access
Question # 181

Use business rules to support Data Integration and Interoperability at various points, to:

A.

Direct the flow of data in the organization

B.

Monitor the organization’s operational data

C.

Software alerts when events are triggered

D.

Direct when to automatically trigger events and alerts

E.

Consistency in allocation event resources

F.

None of the above

Full Access
Question # 182

Data quality issues only emerge at initial stages of the data lifecycle.

A.

TRUE

B.

FALSE

Full Access
Question # 183

The library of Alexandria was one of the largest collection of books in the ancient

world. Which DMBoK knowledge area is most aligned with managing the collection?

A.

Data Integration and Interoperability

B.

Reference and Master Data

C.

Data Security

D.

Document and Content Management

E.

Data Govemance

Full Access
Question # 184

Where does the ethical responsibility lie with respect to managing data to reduce risks of misrepresentation, misuse, or misunderstanding?

A.

Business owns the data and is therefore ethically responsible for managing data across the data lifecycle

B.

Everybody that makes use of data within the organization is responsible for the ethical use of the data

C.

Data modellers carry responsibility to ensure that data handling ethics are achieved by design

D.

The ethical responsibility lies with Data Management professionals to manage data and to manage the associated risks

E.

Risk Management is responsible for ethical data management

Full Access
Question # 185

Reference and Master Data Management follow these guiding principles:

A.

Quality

B.

Stewardship

C.

Authority

D.

Ownership

E.

Exclusivity

F.

Inclusivity

Full Access
Question # 186

The most common drivers for initiating a Mater Data Management Program are:

A.

Metadata insecurity

B.

Managing data quality

C.

Reducing risk

D.

Managing the costs of data integration

E.

Meeting organizational data requirements

F.

Reducing latency

Full Access
Question # 187

Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.

A.

TRUE

B.

FALSE

Full Access
Question # 188

In an information management context, the short-term wins and goals often arise from the resolution of an identified problem.

A.

TRUE

B.

FALSE

Full Access
Question # 189

Factors that have shown to play a key role in the success in the success of effective data management organizations does not include:

A.

Clear vision

B.

Orientation and training

C.

Leadership alignment

D.

IT sponsorship

Full Access
Question # 190

In the Abate Information Triangle the past moves through the following echelons befor it comes insight:

A.

Data

B.

Information

C.

Transactions

D.

Knowledge

E.

Big data

F.

Time

Full Access
Question # 191

Data Governance focuses exclusively on:

A.

The management of data assets and of data as an asset

B.

Alignment of IT strategies and investments with enterprise goals and strategies

C.

Decisions about IT investments

D.

Rules and regulations including GDPR

E.

The COBIT (Control Objectives for Information and Related Technology) framework

Full Access
Question # 192

Typically, DW/BI have three concurrent development tracks:

A.

Data mart

B.

Business Intelligence tools

C.

Data

D.

System development

E.

Techonology

F.

None of the above

Full Access
Question # 193

Data science merges data mining, statistical analysis, and machine learning with the integration and data modelling capabilities, to build predictive models that explore data content patterns.

A.

FALSE

B.

TRUE

Full Access
Question # 194

The independent updating of data into a system of reference is likely to cause:

A.

Reference data inconsistencies

B.

Duplicate data

C.

Deadlocks in the database

D.

Master data inconsistencies

E.

Transaction data inconsistencies

Full Access
Question # 195

The goal of data architecture is to:

A.

Serve as a platform to enable data governance and management

B.

Bridge between business strategy and technology execution

C.

Provide the organisation with clear system of the architecture

D.

Make the integration between data management and data analytics possible

Full Access
Question # 196

Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:

A.

The triggers for effective change

B.

Data architecture

C.

How people experience changes

D.

Data security

E.

The barriers to change

F.

Why change fails

Full Access
Question # 197

A business driver for Master Data Management program is managing data quality.

A.

TRUE

B.

FALSE

Full Access
Question # 198

The need to manage data movement efficiently is a primary driver for Data Integration and Interoperability.

A.

TRUE

B.

FALSE

Full Access
Question # 199

Three classic implementation approaches that support Online Analytical Processing include:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Full Access
Question # 200

Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.

A.

TRUE

B.

FALSE

Full Access
Question # 201

Types of metadata include:

A.

Strategic

B.

Business

C.

Column-orientated

D.

Operational

E.

Graph

F.

Technical

Full Access
Question # 202

An Operational Data Mart is a data mart focused on tactical decision support.

A.

TRUE

B.

FALSE

Full Access
Question # 203

Examples of data enhancement includes:

A.

All of the above

B.

Audit data

C.

Contextual information

D.

Incorporate Enterprise Technology

E.

Reference vocabularies

F.

Select Notation

Full Access
Question # 204

Deliverables in the data quality context diagram include:

A.

DQM Procedures

B.

Data architecture

C.

Data governance

D.

DQ Policies and guidelines

E.

Analyses from data profiling

F.

Data quality Service Level Agreements

Full Access
Question # 205

A primary business driver of data storage and operations is:

A.

Business data modelling

B.

Business rules

C.

Business continuity

D.

Hardware sales

E.

Business process optimization

Full Access
Question # 206

What position is responsible for the quality and use of their organization’s data assets?

A.

Chief Information Officer

B.

Data Scientist

C.

Data Steward

D.

Data Modeler

E.

Data Architect

Full Access
Question # 207

Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.

A.

TRUE

B.

FALSE

Full Access
Question # 208

A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.

A.

FALSE

B.

TRUE

Full Access
Question # 209

Select the areas to consider when constructing an organization’s operating model:

A.

Cultural Factors

B.

Business model

C.

Impact of the regulation

D.

None of the above

E.

Value of the data to the organisation

F.

All of the above

Full Access
Question # 210

Which Data Architecture Artifact describes how data transforms into business

assets?

A.

Implementation Roadmap

B.

Data Value Chain

C.

Master Data Models

D.

Business Value Chains

E.

Data Flows

Full Access
Question # 211

Well prepared records have characteristics such as:

A.

Context

B.

Content

C.

Compliance

D.

Timeliness

Full Access
Question # 212

If the target system has more transformation capability than either the source or the intermediary application system, the order of processes may be switched to ELT – Extract Load Tranform.

A.

TRUE

B.

FALSE

Full Access
Question # 213

Who should write the main content for a security policy for an organisation?

A.

A security knowledge area specialist

B.

A data governance knowledge area specialist

C.

The data warehouse developer

D.

The database administrator

E.

The data steward associated with the data

Full Access
Question # 214

Machine learning explores the construction and study of learning algorithms.

A.

TRUE

B.

FALSE

Full Access
Question # 215

All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 216

Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.

A.

FALSE

B.

TRUE

Full Access
Question # 217

Which of the following answers best describes an Active Data Dictionary?

A.

A dictionary that is active 24 hours a day

B.

Any data dictionary is considered active because it has codes and values used in the enterprise

C.

An integrated dictionary that is managed automatically by the database management system software

D.

A dictionary that allows users to enter data in an 'active' or open manner

E.

A dictionary that can be activated by the metadata team

Full Access
Question # 218

Data and enterprise architecture deal with complexity from two viewpoints:

A.

None of the above

B.

Implementation-orientated

C.

Quality-orientated

D.

Architecture-orientated

E.

Innovation-orientated

F.

Industry-orientated

Full Access
Question # 219

The acronym BASE is made up of:

A.

Basically available

B.

Basically not available

C.

Software state

D.

Soft state

E.

Eventual consistency

F.

Everything considered

Full Access