Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

DMF-1220 PDF

$44

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

DMF-1220 PDF + Testing Engine

$70.4

$175.99

3 Months Free Update

  • Exam Name: Data Management Fundamentals
  • Last Update: Apr 19, 2024
  • Questions and Answers: 486
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

DMF-1220 Engine

$52.8

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

DMF-1220 Practice Exam Questions with Answers Data Management Fundamentals Certification

Question # 6

Deliverables in the data management maturity assessment context diagram include:

A.

Maturity baseline

B.

Roadmap

C.

Executive briefings

D.

Recommendations

E.

Risk assessment

F.

Ratings and ranks

Full Access
Question # 7

The data in Data warehouses and marts differ. Data is organized by subject rather than function

A.

TRUE

B.

FALSE

Full Access
Question # 8

Three classic implementation approaches that support Online Analytical Processing include:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Full Access
Question # 9

Architecture is the fundamental organization of a system, embodied in its components, their relationships to each other and the environment and the principles governing its design and evolution.

A.

TRUE

B.

FALSE

Full Access
Question # 10

The language used in file-based solutions is called MapReduce. This language has three main steps:

A.

Map

B.

Shuffle

C.

Free

D.

Terminate

E.

Integrate

F.

Reduce

Full Access
Question # 11

An advantage of a centralized repository include: Quick metadata retrieval, since the repository and the query reside together.

A.

TRUE

B.

FALSE

Full Access
Question # 12

A hacker is a person who finds unknown operations and pathways within complex computer system. Hackers are only bad.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Creating the CDM involves the following steps:

A.

Select Scheme

B.

Obtain Sign-off

C.

Complete Initial CDM

D.

Select Notation

E.

Incorporate Enterprise Technology

F.

All of the above

Full Access
Question # 14

Please select the correct General Accepted Information Principles:

A.

Asset Principle

B.

Audit Principle

C.

Due Diligence Principle

D.

Going Concern Principle

E.

Ethical Principle

F.

All of the above

Full Access
Question # 15

Data models comprise and contain metadata essential to data consumers.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Inputs in the Data Integration and Interoperability context diagram include:

A.

Data needs & standards

B.

Data semantics

C.

Business goals & strategies

D.

Source data

Full Access
Question # 17

When constructing models and diagrams during formalisation of data architecture there are certain characteristics that minimise distractions and maximize useful information. Characteristics include:

A.

Linear symmetry

B.

A match between all diagram objects and the legend

C.

A clear and consistent legend

D.

A consistent line across display methods

E.

Consistent object attributes

F.

A clear and consistent line direction

Full Access
Question # 18

A roadmap for enterprise data architecture describes the architecture’s 3 to 5-year development path. The roadmap should be guided by a data management maturity assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 19

Key processing steps for MDM include:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Full Access
Question # 20

There are numerous methods of implementing databases on the cloud. The most common are:

A.

Virtual machine image

B.

Distributed machine image

C.

DAAS

D.

Managed database hosting on the cloud

Full Access
Question # 21

Normalisation is the process of applying rules in order to organise business complexity into stable data structures.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Taxonomies can have different structures, including:

A.

Polyhierarchy

B.

Application

C.

Facet taxonomy

D.

Network taxonomy

E.

Flat taxonomy

F.

All of the above

Full Access
Question # 23

The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:

A.

Level 2 In Development

B.

Level 4 Proactive

C.

Level 2 Sub-standard

D.

Level 4 Proactive

E.

Level 3 Transformational

F.

Level 3 Essential

Full Access
Question # 24

DAMA International’s Certified Data Management Professional (CDMP) certification required that data management professionals subscribe to a formal code of ethics, including an obligation to handle data ethically for the sake of society beyond the organization that employs them.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Examples of business processes when constructing data flow diagrams include:

A.

Order Management

B.

Marketing & Sales

C.

Sales order

D.

Invoicing

E.

Product Development

F.

Customer

Full Access
Question # 26

Metadata is described using three sets od categories, including:

A.

Structural Metadata

B.

Descriptive Metadata

C.

Generic Metadata

D.

Administrative metadata

E.

Conceptual Metadata

Full Access
Question # 27

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Developing complex event processing solutions require:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Full Access
Question # 29

The Data Model Scorecard provides 10 data model quality metrics

A.

TRUE

B.

FALSE

Full Access
Question # 30

Please select the correct types of data stewards:

A.

Executive Data Steward

B.

Chief Data Steward

C.

Enterprise Data Steward

D.

Business Data Steward

E.

A Data Seller

F.

All of the above

Full Access
Question # 31

Business activity information is one of the types of data that can be modelled.

A.

TRUE

B.

FALSE

Full Access
Question # 32

Data Governance is at the centre if the data management activities, since governance is required for consistency within and balance between functions.

A.

FALSE

B.

TRUE

Full Access
Question # 33

Inputs in the reference and master data context diagram include:

A.

None of the above

B.

Business Drivers

C.

Business model

D.

Data Glossary

E.

Cultural Drivers

F.

All of the above

Full Access
Question # 34

An organization will create an uncover valuable Metadata during the process of developing Data Integration and Interoperability solutions.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Operational reports are outputs from the data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 36

High quality data definition exhibit three characteristics:

A.

Clearness

B.

Clarity

C.

Accuracy

D.

Completeness

Full Access
Question # 37

The Belmont principles that may be adapted for Information Management disciplines, include:

A.

Respect for Persons

B.

Respect for Machines

C.

Beneficence

D.

Criminality

E.

Justice

Full Access
Question # 38

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Three data governance operating models types include:

A.

Centralized

B.

Decentralized

C.

Feathered

D.

Federated

E.

Replicated

F.

Duplicated

Full Access
Question # 40

Hierarchical database model is the newest database model

A.

TRUE

B.

FALSE

Full Access
Question # 41

The roles associated with enterprise data architecture are data architect, data modellers and data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 42

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Examples of transformation in the ETL process onclude:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Full Access
Question # 44

Analytics models are associated with different depths of analysis, including:

A.

Quality testing

B.

Explanatory modeling

C.

Descriptive modeling

D.

Performance modeling

E.

All of the above

F.

None of the above

Full Access
Question # 45

Select the areas to consider when constructing an organization’s operating model:

A.

Cultural Factors

B.

Business model

C.

Impact of the regulation

D.

None of the above

E.

Value of the data to the organisation

F.

All of the above

Full Access
Question # 46

Examples of concepts that can be standardized within the data architecture knowledge area include:

A.

Enterprise data models

B.

System naming conventions

C.

None of the above

D.

Data security standards

E.

Data quality rules

F.

Tool standards

Full Access
Question # 47

A synonym for transformation in ETL is mapping. Mapping is the process of developing the lookup matrix from source to target structures, but not the result of the process.

A.

TRUE

B.

FALSE

Full Access
Question # 48

Types of metadata include:

A.

Strategic

B.

Business

C.

Column-orientated

D.

Operational

E.

Graph

F.

Technical

Full Access
Question # 49

Functionality-focused requirements associated with a comprehensive metadata solution, include:

A.

Synchronization

B.

Structure

C.

None of the above

D.

History

E.

Volatility

F.

Access rights

Full Access
Question # 50

One of the deliverables in the Data Integration and Interoperability context diagram is:

A.

Data Integration and Interoperability Strategy

B.

Data hogging

C.

Data access agreements

D.

Data security plan

Full Access
Question # 51

Domains can be identified in different ways including: data type; data format; list; range; and rule-based.

A.

TRUE

B.

FALSE

Full Access
Question # 52

Metadata is described using different set of categories, including:

A.

Descriptive Metadata, Structural Metada, Administrative Metadata

B.

Diagnostic Metadata, Structural Metada, Administrative Metadata

C.

Prescriptive Metadata, Serial Metada, Administrative Metadata

D.

Descriptive Metadata, Serial Metada, Administrative Metadata

E.

None of the above

Full Access
Question # 53

Poorly managed Metadata leads to, among other, redundant data and data management processes.

A.

TRUE

B.

FALSE

Full Access
Question # 54

Within the Data Handling Ethics Context Diagram a key deliverable is the Ethical Data Handling Strategy.

A.

TRUE

B.

FALSE

Full Access
Question # 55

Please select the four domains of enterprise architecture:

A.

Enterprise software architecture

B.

Enterprise technology architecture

C.

Enterprise business architecture

D.

Enterprise data architecture

E.

Enterprise hardware architecture

F.

Enterprise application architecture

Full Access
Question # 56

A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.

A.

FALSE

B.

TRUE

Full Access
Question # 57

Data professionals involved in Business Intelligence, analytics and Data Science are often responsible for data that describes: who people are; what people do; where people live; and how people are treated. The data can be misused and counteract the principles underlying data ethics.

A.

FALSE

B.

TRUE

Full Access
Question # 58

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Full Access
Question # 59

A business driver for Master Data Management program is managing data quality.

A.

TRUE

B.

FALSE

Full Access
Question # 60

SOA is an abbreviation for service orientated architecture.

A.

FALSE

B.

TRUE

Full Access
Question # 61

Please select the incorrect item that does not represent a dimension in the Data Values category in Data Quality for the Information age.

A.

Currency

B.

Timeliness

C.

Consistency

D.

Completeness

Full Access
Question # 62

Data Governance Office (DGO) focuses on enterprise-level data definitions and data management standards across all DAMA-DMBOK knowledge areas. Consists of coordinating data management roles.

A.

TRUE

B.

FALSE

Full Access
Question # 63

Data quality issues only emerge at initial stages of the data lifecycle.

A.

TRUE

B.

FALSE

Full Access
Question # 64

Release management is critical to batch development processes that grows new capabilities.

A.

TRUE

B.

FALSE

Full Access
Question # 65

All organizations have the same Master Data Management Drivers and obstacles.

A.

TRUE

B.

FALSE

Full Access
Question # 66

Please select the correct component pieces that form part of an Ethical Handling Strategy and Roadmap.

A.

Emotions matrix

B.

None of the above

C.

All of the above

D.

Compliance framework

E.

Values Statement

F.

Roadmap

Full Access
Question # 67

Logical abstraction entities become separate objects in the physical database design using one of two methods.

A.

The DAMA Wheel

B.

Supertype partition

C.

Subtype partition

D.

Subtype absorption

E.

Supertype absorption

Full Access
Question # 68

Data governance program must contribute to the organization by identifying and delivering on specific benefits.

A.

TRUE

B.

FALSE

Full Access
Question # 69

E-discovery is the process of finding electronic records that might serve as evidence in a legal action.

A.

TRUE

B.

FALSE

Full Access
Question # 70

The acronym BASE is made up of:

A.

Basically available

B.

Basically not available

C.

Software state

D.

Soft state

E.

Eventual consistency

F.

Everything considered

Full Access
Question # 71

Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.

A.

TRUE

B.

FALSE

Full Access
Question # 72

When assessing security risks it is required to evaluate each system for the following:

A.

The current security protections in place

B.

The requirements to protect the data

C.

None of the above

D.

All of the above

E.

The complexity of the data stored or in transit

F.

The sensitivity of the data stored or in transit

Full Access