Logical abstraction entities become separate objects in the physical database design using one of two methods.
Typically, DW/BI projects have three concurrent development tracks, including:
The accepted tenets of bioethics provide a starting point for the principles of data ethics. Which of the following tenets of bioethics is NOT included in the DMBOK2 Chapter on Data Handling Ethics?
Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?
Orchestration is the term used to describe how multiple processes are organized and executed in a system.
Machine learning explores the construction and study of learning algorithms.
All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.
Data quality management is a key capability of a data management practice and organization.
ETL is the basic process which is central to all areas in Data Integration and Interoperability. It is an abbreviation for extract, transition and load.
Data warehousing describes the operational extract, cleaning, transformation, control and load processes that maintain the data in a data warehouse.
Domains can be identified in different ways including: data type; data format; list; range; and rule-based.
Reference and Master data definition: Managing shared data to meet organizational goals, reduce risks associated with data redundancy, ensure higher quality, and reduce the costs of data integration.
A Metadata repository contains information about the data in an organization, including:
Data Quality rules and standards are a form of data. To be effective, they need to be managed, as data and rules should be:
A change management program supporting formal data governance should focus communication on:
Obtaining buy-in from all stakeholders
Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.
Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:
The process of identifying how different records may relate to a single entity is called:
Data lineage is useful to the development of the data governance strategy.
Assessment criteria are broken into levels, and most capability maturity models use five (5) levels. This is important since:
The roles associated with enterprise data architecture are data architect, data modellers and data stewards.
Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.
Data Storage and Operations: The design, implementation and support of stored data to maximize its value.
The IBM Data Governance Council model is organized around four key categories. Select the answer that is not a category.
Integration of ETL data flows will usually be developed within tools specialised to manage those flows in a proprietary way.
In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.
Content refers to the data and information inside a file, document or website.
The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.
A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.
When reviewing data access plans, sequential searching is slowing the database. One
way to fix this is:
The Data Warehouse encompasses all components in the data staging and data presentation areas, including:
Layers of data governance are often part of the solution. This means determining where accountability should reside for stewardship activities and who the owners of the data are.
With respect to health data, what is the difference between the privacy and the security of the data?
Change Data Capture is a method of reducing bandwidth by filtering to include only data that has been changed within a defined timeframe.
The goals of implementing best practices around document and content management include:
Content management includes the systems for organizing information resources so that they can specially be stored.
Integrating data security with document and content management knowledge areas.
guides the implementation of:
A content strategy should end with an inventory of current state and a gap assessment.
Several global regulations have significant implications on data management practices. Examples include:
Within projects, conceptual data modelling and logical data modelling are part of requirements planning and analysis activities, while physical data modelling is a design activity.
To mitigate risks, implement a network-based audit appliance, which can address most of the weaknesses associated with the native audit tools. This kind of appliance has the following benefits:
Characteristics that minimise distractions and maximise useful information include, but not limited to, consistent object attributes
Data architect: A senior analyst responsible for data architecture and data integration.
Regulations including the Sarbanes-Oxley Act require evidence of data lineage and accuracy. How can Data Governance aid organisations in achieving this goal?
An image processing system captures, transforms and manages images of paper and electronic documents.
There are three basic approaches to implementing a Master Data hub environment, including:
A control activity in the metadata management environment includes loading statistical analysis.
The most informal enterprise data model is the most detailed data architecture design document.
The purpose of data governance is to ensure that data is managed properly, according to policies and best practices. Data governance is focused on how decisions are made about data and how people and processes are expected to behave in relation to data.
Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.
Technical Metadata provides data about the technical data, the systems that store data, and the processes that move between systems.
Deliverables in the data management maturity assessment context diagram include:
Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:
The goal of Data Governance is to enable an organization to manage data as an asset. To achieve this overall goal, a DG program must be:
Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?
When presenting a case for an organization wide Data Governance program to your Senior Executive Board, which of these potential benefits would be of LEAST importance?
Data modelling tools are software that automate many of the tasks the data modeller performs.
The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.
Organizations conduct capability maturity assessments for a number of reasons, including:
One of the percentages to measure success of a records management system implantation is the percentage of the identified corporate records declared as such and put under records control.
When constructing models and diagrams during formalisation of data architecture there are certain characteristics that minimise distractions and maximize useful information. Characteristics include:
The operational data quality management procedures depend on the ability to measure and monitor the applicability of data.
A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.
If two data stores are able to be inconsistent during normal operations, then the
integration approach is:
Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.
What position is responsible for the quality and use of their organization's data
assets?
A database uses foreign keys from code tables for column values. This is a way of implementing:
Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.
Business requirements is an input in the Data Warehouse and Business Intelligence context diagram.
Examples of concepts that can be standardized within the data quality knowledge area include:
Over a decade an organization has rationalized implementation of party concepts from 48 systems to 3. This is a result of good:
When data is classified as either security data or regulatory data, the result will be:
Tools required to manage and communicate changes in data governance programs include
'Planning, implementation and control activities for lifecycle management of data and
information, found in any form or medium', pertains to which knowledge area?
According to the DMBoK, Data Governance is central to Data Management. In practical terms, what other functions of Data Management are required to ensure that your Data Governance programme is successful?
The CAP theorem states that at most two of the three properties: consistency, availability and partition tolerance can exist in any shared data system.
In matching, false positives are three references that do not represent the same entity are linked with a single identifier.
Data Governance Office (DGO) focuses on enterprise-level data definitions and data management standards across all DAMA-DMBOK knowledge areas. Consists of coordinating data management roles.
Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?
Please select the incorrect item that does not represent a dimension in the Data Values category in Data Quality for the Information age.
Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.
Release management is critical to batch development processes that grows new capabilities.
An information maturity assessment provides a valuable input to Data Governance planning because it provides:
The repeated implementation of different CRM technologies with different data
structures is mostly a failure of:
When trying to integrate a large number of systems, the integration complexities can
be reduced by:
What techniques should be used and taught to produce the required ethical data handling deliverables?
Validity, as a dimension of data quality, refers to whether data values are consistent with a defined domain of values.
When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?
What are the three characteristics of effective Data Governance communication?
There are three basic approaches to implementing a Master Data hub environment, including:
The Data Governance Council (DGC) manages data governance initiatives, issues, and escalations.
Deliverables in the document and content management context diagram include:
No recorded negative ethical outcomes does not mean that the organization is processing data ethically. Legislation cannot keep up with the evolution of the data environment so how do we stay compliant?
An organization can enhance its Data Governance program and thereby improve its approach to enterprise data management. This is important for the following reason:
Why is it important to create short-term wins when rolling out a Data Governance initiative?
Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:
An effective Data Governance communication program should include the following:
Data Management Professionals only work with the technical aspects related to data.
Location Master Data includes business party addresses and business party location, as well as facility addresses for locations owned by organizations.
All organizations have the same Master Data Management Drivers and obstacles.
Effectiveness metrics for a data governance programme includes: achievement of goals and objectives; extend stewards are using the relevant tools; effectiveness of communication; and effectiveness of education.
Operational Metadata describes details of the processing and accessing of data. Which one is not an example:
Consistent input data reduces the chance of errors in associating records. Preparation processes include:
Confirming and documenting understanding of different perspectives facilitate:
Please select the correct general cost and benefit categories that can be applied consistently within an organization.
The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.
The advantage of a decentralised Data Governance model over a centralised model is:
The database administrator (DBA) is the most established and the most widely adopted data professional role.
ANSI standard 859 has three levels of control of data, based on the criticality of the data and the perceived harm that would occur if data were corrupt or otherwise unavailable, including:
Most people who work with data know that it is possible to use data to misrepresent facts. Which of the following is NOT a way in which data is used to misrepresent facts?
A data model that consists of a single fact table linked to important concepts of the
business is a:
Please select the answer that best fits the following description: Contains only real-time data.
A node is a group of computers hosting either processing or data as part of a distributed database.
Data and enterprise architecture deal with complexity from two viewpoints:
Document and content management is defined as planning, implementation and control activities for storage management of data and information found in any form or medium.
Data access control can be organized at an individual level or group level, depending on the need.
Those responsible for the data-sharing environment have an obligation to downstream data consumers to provide high quality data.
DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.
When measuring the value of data architecture one should be most concerned about
Which of the following is NOT required to effectively track data quality incidents?
A database uses foreign keys from code tables for column values. This is a way of
implementing:
Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.
The first two steps of the Reference data Change request process, as prescribed DMBOk2, include:
The difference between warehouses and operational systems do not include the following element:
Please select the user that best describes the following description: Uses the business glossary to make architecture, systems design, and development decisions, and to conduct the impact analysis.
Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.
How do data management professionals maintain commitment of key stakeholders to the data management initiative?
Elements that point to differences between warehouses and operational systems include:
A hacker is a person who finds unknown operations and pathways within complex computer system. Hackers are only bad.
Data governance requires control mechanisms and procedures for, but not limited to, identifying, capturing, logging and updating actions.
Please select correct term for the following sentence: Any collection of stored data regardless of structure or content. Some large databases refer to instances and schema.
In defining a Data Security Policy, what role should Data Governance play?
A weakness or defect in a system that allows it to be successfully attacked and
compromised is a:
The advantage of a decentralized data governance model over a centralized model is:
The library of Alexandria was one of the largest collection of books in the ancient
world. Which DMBoK knowledge area is most aligned with managing the collection?
There are numerous methods of implementing databases on the cloud. The most common are:
Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.
Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.
Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.
The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:
Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.
An advantage of a centralized repository include: Quick metadata retrieval, since the repository and the query reside together.
Metadata is essential to the management of unstructured data as it id to the management of structured data.
Data governance requires control mechanisms and procedures for, but not limited to, assignment and tracking of action items.
The implementation of a Data Warehouse should follow guiding principles, including:
Enterprise data architects in an application migration project are primarily concerned with: