Pre-Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

DMF-1220 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

DMF-1220 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Data Management Fundamentals
  • Last Update: Mar 18, 2025
  • Questions and Answers: 582
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

DMF-1220 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

DMF-1220 Practice Exam Questions with Answers Data Management Fundamentals Certification

Question # 6

Data Storage and Operations: The design, implementation and support of stored data to maximize its value.

A.

TRUE

B.

FALSE

Full Access
Question # 7

Data can be assessed based on whether it is required by:

A.

Regulatory reporting

B.

Capturing policy

C.

Ongoing operations

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Business policy

F.

Make the integration between data management and data analytics possible

Full Access
Question # 8

The deliverables in the data architecture context diagram include:

A.

Data flows

B.

Enterprise data

C.

Implementation roadmap

D.

Data Value Chains

E.

None of the above

F.

All of the above

Full Access
Question # 9

Please select the three types of data models:

A.

Innovative Data Model

B.

Logical Data Model

C.

Dimensional Data model

D.

Conceptual Data Model

E.

Idea Data Model

F.

Physical Data Model

Full Access
Question # 10

Several global regulations have significant implications on data management practices. Examples include:

A.

BCBS 239

B.

Data Standards

C.

Privacy laws

D.

Effectiveness of education Standards

E.

SPCA

F.

PCI-DSS

Full Access
Question # 11

Please select the two classifications of database types:

A.

Centralized

B.

Generic

C.

Distributed

D.

MapReduce

Full Access
Question # 12

The dependencies of enterprise technology architecture are that it acts on specified data according to business requirements.

A.

TRUE

B.

FALSE

Full Access
Question # 13

The roles associated with enterprise data architecture are data architect, data modellers and data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 14

Malware types include:

A.

Trojan horse

B.

Worm

C.

Weasel

D.

Virus

E.

Adware

F.

Camware

Full Access
Question # 15

Within each area of consideration mentioned in question 13, they should address morale adversity as per Ethical Risk Model for Sampling Projects.

A.

FALSE

B.

TRUE

Full Access
Question # 16

Traditional tool sin data visualtization have both a data and a graphical component. Advanced visualization and discovery tools use in-memory architecture to allow users to interact with the data.

A.

TRUE

B.

FALSE

Full Access
Question # 17

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Architects seek to design in a way that brings value to an organisation. To reach these goals, data architects define and maintain specifications that:

A.

Align data architecture with enterprise strategy and business architecture

B.

Provide a standard business vocabulary for data and components

C.

Outline high-level integrated designs to meet these requirements.

D.

Integrate with overall enterprise architecture roadmap

E.

Define the current state of data in the organization.

F.

Express strategic data requirements

Full Access
Question # 19

A Global ID is the MDM solution-assigned and maintained unique identifier attached to reconciled records.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.

A.

TRUE

B.

FALSE

Full Access
Question # 21

The need to manage data movement efficiently is a primary driver for Data Integration and Interoperability.

A.

TRUE

B.

FALSE

Full Access
Question # 22

An Operational Data Mart is a data mart focused on tactical decision support.

A.

TRUE

B.

FALSE

Full Access
Question # 23

CMDB provide the capability to manage and maintain Metdata specifically related to the IT assets, the relationships among them, and contractual details of the assets.

A.

TRUE

B.

FALSE

Full Access
Question # 24

Taxonomies can have different structures, including:

A.

Polyhierarchy

B.

Application

C.

Facet taxonomy

D.

Network taxonomy

E.

Flat taxonomy

F.

All of the above

Full Access
Question # 25

Security Risks include elements that can compromise a network and/or database.

A.

TRUE

B.

FALSE

Full Access
Question # 26

MPP is an abbreviation for Major Parallel Processing.

A.

TRUE

B.

FALSE

Full Access
Question # 27

Machine learning explores the construction and study of learning algorithms.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Business Intelligence tool types include:

A.

Technology reporting

B.

Operational reporting

C.

Descriptive, self-service analytics

D.

Operations performance management (OPM)

E.

Business performance management (BPM)

F.

Predictive, self-service analytics

Full Access
Question # 29

Creating the CDM involves the following steps:

A.

Select Scheme

B.

Obtain Sign-off

C.

Complete Initial CDM

D.

Select Notation

E.

Incorporate Enterprise Technology

F.

All of the above

Full Access
Question # 30

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

A.

TRUE

B.

FALSE

Full Access
Question # 31

The business glossary application is structured to meet the functional requirements of the three core audiences:

A.

Data users

B.

Application users

C.

Innovation users

D.

Business users

E.

Data stewards

F.

Technical users

Full Access
Question # 32

Three data governance operating models types include:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Full Access
Question # 33

The list of V’s include:

A.

Volatility

B.

Volume

C.

Veracity

D.

Viscosity

E.

Variety

F.

Validity

Full Access
Question # 34

Characteristics that minimise distractions and maximise useful information include, but not limited to, consistent object attributes

A.

TRUE

B.

FALSE

Full Access
Question # 35

A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.

A.

FALSE

B.

TRUE

Full Access
Question # 36

The target of organizational change is expedition.

A.

TRUE

B.

FALSE

Full Access
Question # 37

Changes to reference data do not need to be management, only metadata should be managed.

A.

TRUE

B.

FALSE

Full Access
Question # 38

The neutral zone is one of the phases in the Bridges’ transition phases.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.

A.

FALSE

B.

TRUE

Full Access
Question # 40

The accuracy dimension of data quality refers to the degree that data correctly respresents ‘real-life’ entities.

A.

TRUE

B.

FALSE

Full Access
Question # 41

Data quality issues cannot emerge at any point in the data lifecycle.

A.

FALSE

B.

TRUE

Full Access
Question # 42

Type of Reference Data Changes include:

A.

Row level changes to internal Reference Data sets

B.

Row level changes to external Reference Data sets

C.

Creation of new Reference Data sets

D.

Business model changes on column level

E.

Structural changes to external Reference Data sets

F.

None of the above

Full Access
Question # 43

The goals of implementing best practices around document and content management include:

A.

Ensuring effective and efficient retrieval and use of data and information in unstructured formats

B.

Ensuring integration capabilities between structured and unstructured data

C.

Complying with legal obligations and customer expectations

D.

Enduring integration competencies between semi-structured systems

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Full Access
Question # 44

Data lineage is useful to the development of the data governance strategy.

A.

TRUE

B.

FALSE

Full Access
Question # 45

Data and enterprise architecture deal with complexity from two viewpoints:

A.

None of the above

B.

Implementation-orientated

C.

Quality-orientated

D.

Architecture-orientated

E.

Innovation-orientated

F.

Industry-orientated

Full Access
Question # 46

The DW encompasses all components in the data staging and data presentation areas, including:

A.

Operational source system

B.

Data access tools

C.

Data presentation area

D.

Data staging area

E.

All of the above

F.

Technology source system

Full Access
Question # 47

The implementation of a Data Warehouse should follow guiding principles, including:

A.

Data Efficiency

B.

One size does not fit all

C.

Contracts

D.

Focus on the business goals

E.

Start with the end in mind

F.

Collaborate

Full Access
Question # 48

Malware refers to any infectious software created to damage, change or improperly access a computer or network.

A.

TRUE

B.

FALSE

Full Access
Question # 49

The business glossary should capture business terms attributes such as:

A.

Lineage

B.

Utilization

C.

Common misunderstanding in terms

D.

System development

E.

Algorithms to supporting definitions

F.

All of the above

Full Access
Question # 50

Databases are categorized in three general ways:

A.

Warped

B.

Non-relational

C.

Relational

D.

Accessible

E.

None of the above

F.

Hierarchical

Full Access
Question # 51

Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity

A.

FALSE

B.

TRUE

Full Access
Question # 52

The operational data quality management procedures depend on the ability to measure and monitor the applicability of data.

A.

FALSE

B.

TRUE

Full Access
Question # 53

In the Abate Information Triangle the past moves through the following echelons befor it comes insight:

A.

Data

B.

Information

C.

Transactions

D.

Knowledge

E.

Big data

F.

Time

Full Access
Question # 54

Examples of transformation in the ETL process onclude:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Full Access
Question # 55

The four A’s in security processes include:

A.

Audit

B.

Authentication

C.

Access

D.

Authorization

E.

Aliment

F.

Applicable

Full Access
Question # 56

An image processing system captures, transforms and manages images of paper and electronic documents.

A.

TRUE

B.

FALSE

Full Access
Question # 57

There are three techniques for data-based change data capture, namely:

A.

The source system populates specific data elements.

B.

Application automated interfaces

C.

The source system processes copy data that has changed into a separate object as part of the transaction, which is then used for the extract process.

D.

The source systems send binary code through ASCI that makes the process rapid.

E.

The source system processes add to a simple list of objects and identifiers when changing data, which is then used to control selection of data extraction.

F.

None of the above

Full Access
Question # 58

For each subject area logical model: Decrease detail by adding attributes and less-significant entities and relationships.

A.

TRUE

B.

FALSE

Full Access
Question # 59

Value is the difference between the cost of a thing and the benefit derived from that thing.

A.

TRUE

B.

FALSE

Full Access
Question # 60

An input in the Metadata management context diagram does not include:

A.

Business requirements

B.

Business metadata

C.

Technical metadata

D.

Metadata standards

E.

Process Metadata

Full Access
Question # 61

Input in the Big Data and data science context diagram include:

A.

IT standards

B.

Data sources

C.

Business strategy & goals

D.

Database standards

Full Access
Question # 62

Self-service is a fundamental delivery channel in the BI portfolio.

A.

TRUE

B.

FALSE

Full Access
Question # 63

Types of metadata include:

A.

Strategic

B.

Business

C.

Column-orientated

D.

Operational

E.

Graph

F.

Technical

Full Access
Question # 64

The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.

A.

FALSE

B.

TRUE

Full Access
Question # 65

A limitation of the centralized metadata repository approach is it may be less expensive.

A.

TRUE

B.

FALSE

Full Access
Question # 66

The categories of the Data Model Scorecard with the highest weightings include:

A.

How well does the model capture the requirements?

B.

None of the above

C.

How good are the definitions?

D.

How complete is the model?

E.

How structurally sound is the model?

F.

All of the above

Full Access
Question # 67

Coupling describes the degree to which two systems are intertwined.

A.

FALSE

B.

TRUE

Full Access
Question # 68

The difference between warehouses and operational systems do not include the following element:

A.

Time variant

B.

Database

C.

Subject-orientated

D.

Historical

Full Access
Question # 69

It is unwise to implement data quality checks to ensure that the copies of the attributes are correctly stored.

A.

FALSE

B.

TRUE

Full Access
Question # 70

Examples of concepts that can be standardized within the data architecture knowledge area include:

A.

Enterprise data models

B.

System naming conventions

C.

None of the above

D.

Data security standards

E.

Data quality rules

F.

Tool standards

Full Access
Question # 71

Principles for data asset accounting include:

A.

Accounting Principle

B.

Due Diligence Principle

C.

Asset Principle

D.

Audit Principle

E.

Going Concern Principle

F.

All of the above

Full Access
Question # 72

The first two steps in the data science process are:

A.

Define Big Data data strategy & Business Need(s)

B.

Choose Data Sources

C.

Develop Data Science Hypotheses and Mehods

D.

Acquire & Ingest Data source(s)

Full Access
Question # 73

Accomplish repository scanning in two distinct approaches, including:

A.

Semi- proprietary integration

B.

Proprietary interface

C.

Semi-proprietary interface

D.

Proprietary integration

Full Access
Question # 74

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

A.

TRUE

B.

FALSE

Full Access
Question # 75

A business driver for Master Data Management program is managing data quality.

A.

TRUE

B.

FALSE

Full Access
Question # 76

The better an organization understands the lifecycle and lineage of its data, the better able it will be to manage its data. Please select correct implication of the focus of data management on the data lifecycle.

A.

Data Quality must be managed throughout the data lifecycle

B.

Data Security must only be managed at the start of the data lifecycle

C.

Metadata Quality is the most important part of the management process

D.

Data Management efforts should focus on the most critical data last

Full Access
Question # 77

A control activity in the metadata management environment includes loading statistical analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 78

DBAs exclusively perform all the activities of data storage and operations.

A.

TRUE

B.

FALSE

Full Access
Question # 79

Please select the user that best describes the following description: Uses the business glossary to make architecture, systems design, and development decisions, and to conduct the impact analysis.

A.

Business user

B.

Technical user

C.

Analytical user

D.

None of the above

E.

Advanced user

Full Access
Question # 80

Technical metadata describes details of the processing and accessing of data.

A.

FALSE

B.

TRUE

Full Access
Question # 81

The biggest business driver for developing organizational capabilities around Big Data and Data Science is the desire to find and act on business opportunities that may be discovered through data sets generated through a diversified range of processes.

A.

TRUE

B.

FALSE

Full Access
Question # 82

Release management is critical to batch development processes that grows new capabilities.

A.

TRUE

B.

FALSE

Full Access
Question # 83

A content strategy should end with an inventory of current state and a gap assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 84

Data Governance is at the centre if the data management activities, since governance is required for consistency within and balance between functions.

A.

FALSE

B.

TRUE

Full Access
Question # 85

Data profiling also includes cross-column analysis, which can identify overlapping or duplicate columns and expose embedded value dependencies.

A.

TRUE

B.

FALSE

Full Access
Question # 86

Lack of automated monitoring represents serious risks, including:

A.

Administrative and audit duties risk

B.

Risk of compliance

C.

Direction and recovery risk

D.

Risk of reliance on inadequate native

Full Access
Question # 87

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Those responsible for the data-sharing environment have an obligation to downstream data consumers to provide high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 89

Measuring the effects of change management on in five key areas including: Awareness of the need to change; Desire to participate and support the change; Knowledge about how to change; Ability to implement new skills and behaviors; and Reinforcement to keep the change in place.

A.

FALSE

B.

TRUE

Full Access
Question # 90

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

A.

TRUE

B.

FALSE

Full Access
Question # 91

The data in Data warehouses and marts differ. Data is organized by subject rather than function

A.

TRUE

B.

FALSE

Full Access
Question # 92

Data handling ethics are concerned with how to procure, store, manage, use and disposeof data in ways that are aligned with ethical principles.

A.

TRUE

B.

FALSE

Full Access
Question # 93

Three classic implementation approaches that support Online Analytical Processing include:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Full Access
Question # 94

CIF stands for:

A.

Company Information Factory

B.

Corporate Information Floor

C.

Corporate Information Factories

D.

Corporate Information Factory

Full Access
Question # 95

A general principle for managing metadata includes Responsibility.

A.

FALSE

B.

TRUE

Full Access
Question # 96

Examples of business metadata include:

A.

Data models

B.

Data quality rules

C.

Data usage notes

D.

Data Standards

Full Access
Question # 97

One of the deliverables in the Data Integration and Interoperability context diagram is:

A.

Data Integration and Interoperability Strategy

B.

Data hogging

C.

Data access agreements

D.

Data security plan

Full Access
Question # 98

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

A.

TRUE

B.

FALSE

Full Access
Question # 99

In gathering requirements for DW/BI projects, begin with the data goals and strategies first.

A.

TRUE

B.

FALSE

Full Access
Question # 100

Field overloading: Unnecessary data duplication is often a result of poor data management.

A.

TRUE

B.

FALSE

Full Access
Question # 101

SLA Stands for:

A.

Service Level Agreement

B.

System Lifecycle Audit

C.

System Latitude Audit

D.

Service Lifecycle Audit

Full Access
Question # 102

Triplestores can be classified into these categories:

A.

Native triplestores

B.

All of the above

C.

None of the above

D.

RDMS-backed triplestores

E.

NoSQL triplestores

F.

MapReduce triplestores

Full Access
Question # 103

Data security internal audits ensure data security and regulatory compliance policies are followed should be conducted regularly and consistently.

A.

TRUE

B.

FALSE

Full Access
Question # 104

A node is a group of computers hosting either processing or data as part of a distributed database.

A.

TRUE

B.

FALSE

Full Access
Question # 105

Please select the answers that correctly describes the set of principles that recognizes salient features of data management and guide data management practice.

A.

Data is an asset with unique properties.

B.

It takes Metadata to manage data.

C.

The most important part of data management is security.

D.

Data management is lifecycle management.

E.

Effective data management requires leadership commitment.

F.

Efficient data management requires a team of IT professionals only.

Full Access
Question # 106

Effective data management involves a set of complex, interrelated processes that disable an organization to use its data to achieve strategic goals.

A.

FALSE

B.

TRUE

Full Access
Question # 107

Different levels of policy are required to govern behavior to enterprise security. For example:

A.

Data security policy

B.

Business Security Policy

C.

IT security policy

D.

Enterprise security policy

E.

All of the above

F.

None of the above

Full Access
Question # 108

What type of key is used in physical and sometimes logical relational data modelling schemes to represent a relationship?

A.

Primary key

B.

Foreign key

C.

Network key

D.

Applications key

E.

Door key

F.

All of the above

Full Access
Question # 109

A roadmap for enterprise data architecture describes the architecture’s 3 to 5-year development path. The roadmap should be guided by a data management maturity assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 110

Effective document management requires clear policies and procedures, especially regarding retention and disposal of records.

A.

FALSE

B.

TRUE

Full Access
Question # 111

Issues caused by data entry processes include:

A.

Training issues

B.

List entry replacement

C.

Software issues

D.

Soft state issues

E.

Change to business processes

F.

Inconsistent business process execution

Full Access
Question # 112

Enterprise service buses (ESB) are the data integration solution for near real-time sharing of data between many systems, where the hub is a virtual concept of the standard format or the canonical model for sharing data in the organization.

A.

FALSE

B.

TRUE

Full Access
Question # 113

Managing business party Master Data poses these unique challenges:

A.

Difficulties in unique dimensions

B.

Difficulties in unique identification

C.

Reference data anomaly detection

D.

The number of data sources and the differences between them

Full Access
Question # 114

Data governance can be understood in terms of political governance. It includes the following three function types:

A.

Legislative-like functions

B.

Judicial-like functions

C.

Ethical-like functions

D.

Executive functions

E.

Data-like functions

F.

Morality-like functions

Full Access
Question # 115

The DMBOK support’s DAMA’s mission by:

A.

Establish a common vocabulary

B.

Guides IT personnel to improve data management

C.

Serving as the fundamental reference guide

D.

roviding a functional framework

Full Access
Question # 116

Test environments serve many uses:

A.

Quality Assurance Testing (QA)

B.

Integration Testing

C.

User Acceptance Testing (UAT)

D.

Performance Testing

E.

All of the above

F.

None of the above

Full Access
Question # 117

Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:

A.

Consistency

B.

Rich data sources

C.

Information alignment and analysis

D.

Information delivery

E.

Presentation of findings and data insights

F.

All of the above

Full Access
Question # 118

What ISO standard defines characteristics that can be tested by any organisation in the data supply chain to objectively determine conformance of the data to this ISO standard.

A.

ISO 9000

B.

ISO 7000

C.

ISO 8000

D.

ISO 9001

Full Access
Question # 119

The database administrator (DBA) is the most established and the most widely adopted data professional role.

A.

TRUE

B.

FALSE

Full Access
Question # 120

Some document management systems have a module that may support different types of workflows such as:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Full Access
Question # 121

Metadata management solutions include architectural layers including:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Full Access
Question # 122

Structural Metadata describe srealtionships within and among resource and enables identification and retrieval.

A.

FALSE

B.

TRUE

Full Access
Question # 123

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.

A.

TRUE

B.

FALSE

Full Access
Question # 124

One common KPI of e-discovery is cost reduction.

A.

FALSE

B.

TRUE

Full Access
Question # 125

Inputs in the data modelling and design context diagram include:

A.

Data standards

B.

Data sets

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Enterprise taxonomy

Full Access
Question # 126

Different storage volumes include:

A.

Gigabyte

B.

Petabyte

C.

Perabyte

D.

Exabyte

E.

Tetrabyte

F.

Terabyte

Full Access
Question # 127

The number of entities in a relationship is the arity of the relationship. The most common are:

A.

Unary

B.

Binary

C.

Trinary

D.

Ternary

Full Access
Question # 128

A ‘Golden Record’ means that it is always a 100% complete and accurate representation of all entities within the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 129

Issues caused by data entry processes include:

A.

Data entry interface issues

B.

List entry placement

C.

Field overloading

D.

None of the above

E.

Training issues

F.

Changes to business processes

Full Access
Question # 130

Volume refers to the amount of data. Big Data often has thousands of entities or elements in billions of records.

A.

TRUE

B.

FALSE

Full Access
Question # 131

The term data quality refers to both the characteristics associated with high quality data and to the processes used to measure or improve the quality of data.

A.

TRUE

B.

FALSE

Full Access
Question # 132

Data governance program must contribute to the organization by identifying and delivering on specific benefits.

A.

TRUE

B.

FALSE

Full Access
Question # 133

Lack of automated monitoring represents serious risks, including compliance risk.

A.

TRUE

B.

FALSE

Full Access
Question # 134

Change Data Capture is a method of reducing bandwidth by filtering to include only data that has been changed within a defined timeframe.

A.

TRUE

B.

FALSE

Full Access
Question # 135

An application DBA leads the review and administration of procedural database objects.

A.

TRUE

B.

FALSE

Full Access
Question # 136

Elements that point to differences between warehouses and operational systems include:

A.

Historical

B.

Data security standards

C.

Subject-orientated

D.

Non-volatile

E.

Data quality

F.

Integrated

Full Access
Question # 137

The warehouse has a set of storage areas, including:

A.

Staging area

B.

Data marts

C.

Consistent object attributes

D.

Operational data store (ODS)

E.

Cubes

F.

Central warehouse

Full Access
Question # 138

Reduced risk is a benefit of high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 139

When constructing an organization’s operating model cultural factors must be taken into consideration.

A.

TRUE

B.

FALSE

Full Access
Question # 140

Please select the answer that best fits the following description: Contains only real-time data.

A.

Batch layer

B.

Speed layer

C.

Serving layer

D.

Real-time layer

Full Access
Question # 141

The primary goal of data management capability assessment is to evaluate the current state of critical data management activities in order to plan for improvement.

A.

TRUE

B.

FALSE

Full Access
Question # 142

While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.

A.

TRUE

B.

FALSE

Full Access
Question # 143

Analytics models are associated with different depths of analysis, including:

A.

Quality testing

B.

Explanatory modeling

C.

Descriptive modeling

D.

Performance modeling

E.

All of the above

F.

None of the above

Full Access
Question # 144

Enterprise data architecture usually include the following work streams:

A.

Strategy

B.

Governance

C.

Organization

D.

Results

E.

Working methods

F.

All of the above

Full Access
Question # 145

RACI is an acronym that is made up of the following terms.

A.

Control

B.

Responsible

C.

Accountable

D.

Informed

E.

Reliable

F.

Consulted

Full Access