Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Logical abstraction entities become separate objects in the physical database design using one of two methods.

A.

The DAMA Wheel

B.

Supertype partition

C.

Subtype partition

D.

Subtype absorption

E.

Supertype absorption

Full Access
Question # 5

Typically, DW/BI projects have three concurrent development tracks, including:

A.

Technology

B.

Trickle Feeds

C.

Data

D.

BI Tools

E.

Messaging

F.

Streaming

Full Access
Question # 6

The accepted tenets of bioethics provide a starting point for the principles of data ethics. Which of the following tenets of bioethics is NOT included in the DMBOK2 Chapter on Data Handling Ethics?

A.

Non-Maleficence Principle implies that the harm should not outweigh the benefit

B.

None of these

C.

The Justice Principle considers the fair and equitable treatment of people

D.

The Respect for Persons Principle reflects the fundamental ethical requirement that people be treated in a way that respects their dignity and autonomy as human individuals

E.

The Beneficence Principle has two elements: first, do no harm; second, maximize possible benefits and minimize possible harms

Full Access
Question # 7

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Full Access
Question # 8

Developing complex event processing solutions require:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Full Access
Question # 9

Orchestration is the term used to describe how multiple processes are organized and executed in a system.

A.

TRUE

B.

FALSE

Full Access
Question # 10

Machine learning explores the construction and study of learning algorithms.

A.

TRUE

B.

FALSE

Full Access
Question # 11

What is the best reason for capturing synonyms in a data repository?

A.

Synonyms are good for indexing or for uncontrolled vocabularies

B.

You should capture all synonyms in one place so that Data Governance can decide on the best name for an element

C.

Synonyms are useful in discovering relationships between data elements

D.

Not all parts of an organization may name a field exactly the same, and the synonym will aid in data searches

E.

Without synonyms, you may not realize that two fields are the same

Full Access
Question # 12

All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Data quality management is a key capability of a data management practice and organization.

A.

TRUE

B.

FALSE

Full Access
Question # 14

ETL is the basic process which is central to all areas in Data Integration and Interoperability. It is an abbreviation for extract, transition and load.

A.

TRUE

B.

FALSE

Full Access
Question # 15

Data warehousing describes the operational extract, cleaning, transformation, control and load processes that maintain the data in a data warehouse.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Domains can be identified in different ways including: data type; data format; list; range; and rule-based.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Reference and Master data definition: Managing shared data to meet organizational goals, reduce risks associated with data redundancy, ensure higher quality, and reduce the costs of data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Do experts feel a Data Lake needs data management?

A.

No, metadata might keep sensitive data out of the data lake, and analysts need all the data

B.

Yes, metadata in a data lake prevents synchronization issues by providing both current state and history

C.

Yes, metadata creates an inventory of the data as it is ingested into the data lake

D.

No, a data lake should contain all the data whether it is inconsistent or not, otherwise data scientists don’t have full insight into the data

E.

No, a data lake should ingest streaming data without any restrictions

Full Access
Question # 19

A Metadata repository contains information about the data in an organization, including:

A.

Hierarchical

B.

Data structure

C.

Warped

D.

Business rules for managing data

E.

Content

F.

None of the above

Full Access
Question # 20

Data Quality rules and standards are a form of data. To be effective, they need to be managed, as data and rules should be:

A.

Managed outside of the repository and only the results of data quality assessments stored as rules metadata

B.

Documented consistently, tied to business impact, backed by data analysis, and accessible to all data consumers

C.

Organized with metrics so the data stewards can review the data and see what rules apply

D.

Focused on rules that can be integrated into application services

E.

Focused on managing relationships that have gone wrong in the past and may go wrong in the future

Full Access
Question # 21

A change management program supporting formal data governance should focus communication on:

Obtaining buy-in from all stakeholders

A.

Implementing data management training

B.

Monitoring the resistance

C.

Promoting the value of data assets

D.

Addressing all queries

E.

Implementing new metric and KPIs

Full Access
Question # 22

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Every DMM and Data Governance assessment must define how the assessment team will interact with its subjects (after defining the subject/stakeholder list). This is important because:

A.

Each type of stakeholder may need a different form of interaction, and each process evaluation may lend itself to a different form of information gathering

B.

Data management and Data Governance assessments will have different types of stakeholders

C.

The definition of stakeholder interaction depends on the executive sponsor

D.

Assessment teams may not know what a stakeholder is

E.

Each type of stakeholder may need a different form of data and security

Full Access
Question # 24

Instant Messaging (IM) allows a user to message each other in real-time.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Class operations can be:

A.

General: Hidden

B.

Public: Externally visible

C.

Internally visible: Visible to children objects

D.

Private: Hidden

Full Access
Question # 26

The process of identifying how different records may relate to a single entity is called:

A.

Meshing

B.

Munging

C.

Mirroring

D.

Matching

E.

Mangling

Full Access
Question # 27

Data lineage is useful to the development of the data governance strategy.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Assessment criteria are broken into levels, and most capability maturity models use five (5) levels. This is important since:

A.

It is not important how many levels there are; vendors do this to show they have a complex model

B.

Each capability level will have specific criteria associated with its completion. To move to the next higher level, all the capabilities of the current level must be satisfied

C.

Each capability is separate, so each level represents a separate stage in development

D.

Assessments are difficult and breaking them into levels makes them more difficult to perform

E.

The organization must be able to manage each criterion, and breaking them into levels is the only way to do that

Full Access
Question # 29

The roles associated with enterprise data architecture are data architect, data modellers and data stewards.

A.

TRUE

B.

FALSE

Full Access
Question # 30

Critical success factors throughout the BI/DW lifecycle include:

A.

Business readiness

B.

A clear and consistent focus

C.

Vision alignment

D.

Business sponsorship

E.

Linear symmetry

F.

A consistent line across display methods

Full Access
Question # 31

Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.

A.

TRUE

B.

FALSE

Full Access
Question # 32

Metrics tied to Reference and Master Data quality include:

A.

Strategic usage reporting

B.

Amsterdam Information Model

C.

Data change activity

D.

Total cost of ownership

Full Access
Question # 33

The business case for enterprise warehousing is:

A.

To increase data redundancy, align information glossaries, and enable anenterprise to exploit machine leaming techniques

B.

To align data systems, improve source system management, and to enable anenterprise exploit machine learning techniques

C.

To increase data distribution, improve information generation, and enable anenterprise to use its data to increase revenue

D.

To reduce data overload, improve information governance, and enable anenterprise to use its data to make better decisions

E.

To reduce data redundancy, improve information consistency, and enable anenterprise to use its data to make better decisions

Full Access
Question # 34

Data Storage and Operations: The design, implementation and support of stored data to maximize its value.

A.

TRUE

B.

FALSE

Full Access
Question # 35

The acronym BASE is made up of:

A.

Basically available

B.

Basically not available

C.

Software state

D.

Soft state

E.

Eventual consistency

F.

Everything considered

Full Access
Question # 36

Which of the following is NOT an objective of a business (data) glossary?

A.

Provide standard definitions for data and metadata

B.

Maximize search capability and enable access to documented institutional knowledge

C.

Improve the linkage between physical data assets and the business

D.

Reduce data misuse risk due to inconsistent management of a business concept

E.

Define business units, software, and other important glossary items

Full Access
Question # 37

Business Intelligence tool types include:

A.

Technology reporting

B.

Operational reporting

C.

Descriptive, self-service analytics

D.

Operations performance management (OPM)

E.

Business performance management (BPM)

F.

Predictive, self-service analytics

Full Access
Question # 38

The IBM Data Governance Council model is organized around four key categories. Select the answer that is not a category.

A.

Outcomes

B.

System Lifecycles

C.

Enablers

D.

Core disciplines

E.

Supporting disciplines

Full Access
Question # 39

The standard for a strong password is set by the:

A.

Data security standard

B.

Data access standard

C.

Identity management standard

D.

Data modelling standard

E.

Data naming standard

Full Access
Question # 40

Integration of ETL data flows will usually be developed within tools specialised to manage those flows in a proprietary way.

A.

TRUE

B.

FALSE

Full Access
Question # 41

In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.

A.

FALSE

B.

TRUE

Full Access
Question # 42

Some common data quality business rule types are:

A.

Definitional conformance

B.

Format compliance

C.

Range conformance

D.

Mapping conformance

Full Access
Question # 43

Content refers to the data and information inside a file, document or website.

A.

TRUE

B.

FALSE

Full Access
Question # 44

The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.

A.

FALSE

B.

TRUE

Full Access
Question # 45

Please select the three types of data models:

A.

Innovative Data Model

B.

Logical Data Model

C.

Dimensional Data model

D.

Conceptual Data Model

E.

Idea Data Model

F.

Physical Data Model

Full Access
Question # 46

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

A.

TRUE

B.

FALSE

Full Access
Question # 47

The goal of data architecture is to:

A.

Serve as a platform to enable data governance and management

B.

Bridge between business strategy and technology execution

C.

Provide the organisation with clear system of the architecture

D.

Make the integration between data management and data analytics possible

Full Access
Question # 48

Please select the 3 visuals that depict DAMA’s Data Management Framework.

A.

The DAMA Octagon

B.

The Knowledge Area Context Diagram

C.

The Data Quality Function Context Diagram

D.

The DAMA Wheel

E.

The Environmental Factors hexagon

Full Access
Question # 49

Databases are categorized in three general ways:

A.

Warped

B.

Non-relational

C.

Relational

D.

Accessible

E.

None of the above

F.

Hierarchical

Full Access
Question # 50

When reviewing data access plans, sequential searching is slowing the database. One

way to fix this is:

A.

Reducing the number of database users

B.

Creating new indexes

C.

Adding more memory

D.

Converting it to an in-memory database

E.

Moving the database to the cloud

Full Access
Question # 51

The Data Warehouse encompasses all components in the data staging and data presentation areas, including:

A.

Data Access Tool

B.

Application Tool

C.

Operational source systems

D.

Data staging area

E.

Data presentation area

F.

All of the above

Full Access
Question # 52

Layers of data governance are often part of the solution. This means determining where accountability should reside for stewardship activities and who the owners of the data are.

A.

FALSE

B.

TRUE

Full Access
Question # 53

With respect to health data, what is the difference between the privacy and the security of the data?

A.

Privacy is defined as the right for an individual to keep his individual health information from being disclosed. Security is defined as the mechanism used to protect privacy of information

B.

Privacy is defined as the right for an doctor to share health data with other doctors and insurance companies. Security is defined as keeping the data where it was recorded

C.

Privacy is defined as the right of the individual to see their own medical records. Security is defined as the laws that protect a person's privacy

D.

Privacy is only possible if a person signs an affidavit requesting privacy. Security is the placing of the document in a safe place

E.

Privacy means only an individual can give access to their medical records to another person. Security means their records are secure and will not be shared

Full Access
Question # 54

Change Data Capture is a method of reducing bandwidth by filtering to include only data that has been changed within a defined timeframe.

A.

TRUE

B.

FALSE

Full Access
Question # 55

The goals of implementing best practices around document and content management include:

A.

Ensuring effective and efficient retrieval and use of data and information in unstructured formats

B.

Ensuring integration capabilities between structured and unstructured data

C.

Complying with legal obligations and customer expectations

D.

Enduring integration competencies between semi-structured systems

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Full Access
Question # 56

The Data Warehouse has a set of storage areas, including:

A.

Staging areas

B.

Data marts

C.

Cubes

D.

Kubernetes

Full Access
Question # 57

Content management includes the systems for organizing information resources so that they can specially be stored.

A.

TRUE

B.

FALSE

Full Access
Question # 58

Veracity refers to how difficult the data is to use or to integrate.

A.

TRUE

B.

FALSE

Full Access
Question # 59

Integrating data security with document and content management knowledge areas.

guides the implementation of:

A.

Appropriate access and authorization to unstructured data

B.

Fitness for purpose metrics for unstructured data

C.

Appropriate privacy controls on data marts

D.

Appropriate access and authorization to structured data

E.

Straight-through processing for NoSQL queries

Full Access
Question # 60

A content strategy should end with an inventory of current state and a gap assessment.

A.

TRUE

B.

FALSE

Full Access
Question # 61

Several global regulations have significant implications on data management practices. Examples include:

A.

BCBS 239

B.

Data Standards

C.

Privacy laws

D.

Effectiveness of education Standards

E.

SPCA

F.

PCI-DSS

Full Access
Question # 62

Within projects, conceptual data modelling and logical data modelling are part of requirements planning and analysis activities, while physical data modelling is a design activity.

A.

TRUE

B.

FALSE

Full Access
Question # 63

To mitigate risks, implement a network-based audit appliance, which can address most of the weaknesses associated with the native audit tools. This kind of appliance has the following benefits:

A.

Granular transaction tracking

B.

High performance

C.

Transaction time

D.

Separation of duties

Full Access
Question # 64

Examples of interaction models include:

A.

Hub-and-spoke

B.

Publish - subscribe

C.

Point-to-point

D.

Wheel-and-spike

Full Access
Question # 65

Characteristics that minimise distractions and maximise useful information include, but not limited to, consistent object attributes

A.

TRUE

B.

FALSE

Full Access
Question # 66

Data architect: A senior analyst responsible for data architecture and data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 67

Regulations including the Sarbanes-Oxley Act require evidence of data lineage and accuracy. How can Data Governance aid organisations in achieving this goal?

A.

Capture and document all metrics and store in a central repository

B.

Undertake an audit of current process and produce a report

C.

Create a new data store for regulator required metrics

D.

Perform an 'as-is' review of data quality

E.

Provide the framework and guidance to enable a business led ongoing Data Governance process

Full Access
Question # 68

An image processing system captures, transforms and manages images of paper and electronic documents.

A.

TRUE

B.

FALSE

Full Access
Question # 69

There are three basic approaches to implementing a Master Data hub environment, including:

A.

Compliance hub

B.

Transaction hub

C.

Consolidated hub

D.

Emotions hub

E.

Location hub

F.

Registry

Full Access
Question # 70

Select three correct attributes a data governance programme must be:

A.

Embedded

B.

Flexible

C.

Measures

D.

Rigid

E.

Independent responsibility

F.

Sustainable

Full Access
Question # 71

A control activity in the metadata management environment includes loading statistical analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 72

What model is the highest level model within the enterprise data model?

A.

Logical model

B.

Physical model

C.

Conceptual model

D.

Subject Area model

Full Access
Question # 73

The most informal enterprise data model is the most detailed data architecture design document.

A.

TRUE

B.

FALSE

Full Access
Question # 74

The purpose of data governance is to ensure that data is managed properly, according to policies and best practices. Data governance is focused on how decisions are made about data and how people and processes are expected to behave in relation to data.

A.

TRUE

B.

FALSE

Full Access
Question # 75

Please select the four domains of enterprise architecture:

A.

Enterprise software architecture

B.

Enterprise technology architecture

C.

Enterprise business architecture

D.

Enterprise data architecture

E.

Enterprise hardware architecture

F.

Enterprise application architecture

Full Access
Question # 76

Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.

A.

TRUE

B.

FALSE

Full Access
Question # 77

Technical Metadata provides data about the technical data, the systems that store data, and the processes that move between systems.

A.

TRUE

B.

FALSE

Full Access
Question # 78

Data science depends on:

A.

Information alignment and analysis

B.

Presentation of findings and data insights

C.

Rich data sources

D.

Information delivery

Full Access
Question # 79

The goals of data storage and operations include:

A.

Managing performance of data assets

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Full Access
Question # 80

Critical Data is most often used in

A.

Regulatory, financial, or management reporting

B.

Business operational needs

C.

Measuring product quality and customer satisfaction

D.

Business strategy, especially efforts at competitive differentiation.

E.

All of these

Full Access
Question # 81

Managing business party Master Data poses these unique challenges:

A.

Difficulties in unique dimensions

B.

Difficulties in unique identification

C.

Reference data anomaly detection

D.

The number of data sources and the differences between them

Full Access
Question # 82

Deliverables in the data management maturity assessment context diagram include:

A.

Maturity baseline

B.

Roadmap

C.

Executive briefings

D.

Recommendations

E.

Risk assessment

F.

Ratings and ranks

Full Access
Question # 83

Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:

A.

Consistency

B.

Rich data sources

C.

Information alignment and analysis

D.

Information delivery

E.

Presentation of findings and data insights

F.

All of the above

Full Access
Question # 84

The goal of Data Governance is to enable an organization to manage data as an asset. To achieve this overall goal, a DG program must be:

A.

Modeled, sanctioned and readable

B.

Eloquent, transformative and explicit

C.

Horizontal, vertical and fluid

D.

Sustainable, embedded and measured

E.

Visionary, vertical and vivid

Full Access
Question # 85

Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?

A.

Each division of an enterprise may have its own way to describe its business and associated metrics

B.

There is disagreement among divisions on the meaning of key metrics

C.

There is typically significant waste in an enterprise through duplication of reports and metrics

D.

Increasing regulation in industry can impose real penalties in terms of substantial fines or jail terms for non-compliance to properly managed data (e.g. accurate reporting/accounting)

E.

I've been to a conference and found that lots of our competitors are doing it

Full Access
Question # 86

When presenting a case for an organization wide Data Governance program to your Senior Executive Board, which of these potential benefits would be of LEAST importance?

A.

Better corporate compliance with legal and regulatory demands, especially in relation to data protection, security and privacy

B.

Lower operational costs resulting from better data quality and a reduced need for cost of failure and rework activities

C.

The current corporate information policy states that company data must be managed and effectively governed

D.

Enhanced customer perceptions of your company's brand and enhanced customer acquisition, retention and loyalty

E.

New sales and revenue opportunities that better managed data will enable

Full Access
Question # 87

Data modelling tools are software that automate many of the tasks the data modeller performs.

A.

FALSE

B.

TRUE

Full Access
Question # 88

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

A.

TRUE

B.

FALSE

Full Access
Question # 89

Organizations conduct capability maturity assessments for a number of reasons, including:

A.

Organizational change

B.

Data management issues

C.

Regulation

D.

Data governance

E.

Data modeling

F.

New technology

Full Access
Question # 90

The loading of country codes into a CRM is a classic:

A.

Reference data integration

B.

Fact data integration

C.

Master data integration

D.

Analytics data integration

E.

Transaction data integration

Full Access
Question # 91

One of the percentages to measure success of a records management system implantation is the percentage of the identified corporate records declared as such and put under records control.

A.

FALSE

B.

TRUE

Full Access
Question # 92

When constructing models and diagrams during formalisation of data architecture there are certain characteristics that minimise distractions and maximize useful information. Characteristics include:

A.

Linear symmetry

B.

A match between all diagram objects and the legend

C.

A clear and consistent legend

D.

A consistent line across display methods

E.

Consistent object attributes

F.

A clear and consistent line direction

Full Access
Question # 93

Data and text mining use a range of techniques, including:

A.

Profiling

B.

Application reduction

C.

Association

D.

Data reduction

E.

Clustering

F.

All of the above

Full Access
Question # 94

The operational data quality management procedures depend on the ability to measure and monitor the applicability of data.

A.

FALSE

B.

TRUE

Full Access
Question # 95

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

A.

TRUE

B.

FALSE

Full Access
Question # 96

If two data stores are able to be inconsistent during normal operations, then the

integration approach is:

A.

Asynchronous

B.

Uncontrolled

C.

Synchronous

D.

Streaming

E.

Faulty

Full Access
Question # 97

Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.

A.

TRUE

B.

FALSE

Full Access
Question # 98

What position is responsible for the quality and use of their organization's data

assets?

A.

Data Architect

B.

Data Steward

C.

Data Scientist

D.

Chief Information Officer

E.

Data Modeler

Full Access
Question # 99

A database uses foreign keys from code tables for column values. This is a way of implementing:

A.

Master data

B.

Event data

C.

Reference data

D.

Star schema data

E.

Temporal data

Full Access
Question # 100

Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.

A.

FALSE

B.

TRUE

Full Access
Question # 101

Business requirements is an input in the Data Warehouse and Business Intelligence context diagram.

A.

TRUE

B.

FALSE

Full Access
Question # 102

Examples of concepts that can be standardized within the data quality knowledge area include:

A.

Standard measurement methodologies

B.

Data security standards

C.

Data remediation standards and procedures

D.

None of the above

E.

Data quality rules

F.

Data quality rules

Full Access
Question # 103

Over a decade an organization has rationalized implementation of party concepts from 48 systems to 3. This is a result of good:

A.

Data operations and system rationalization

B.

Data quality and data governance

C.

System rationalization and metadata management

D.

Data architecture and data warehousing

E.

Data architecture and data governance

Full Access
Question # 104

When data is classified as either security data or regulatory data, the result will be:

A.

Business employees are restricted from viewing the data but technical employees can store the data in databases

B.

Employees will never see classified data for any reason

C.

Employees know they have to aggregate the data

D.

Employees, both business & technical know the sensitivity of the data

E.

Employees know they cannot use the data because it has been classified

Full Access
Question # 105

Tools required to manage and communicate changes in data governance programs include

A.

Ongoing business case for data governance

B.

Obtaining buy-in from all stakeholders

C.

Data governance roadmap

D.

Monitoring the resistance

E.

Business/Data Governance strategy map

F.

Data governance metrics

Full Access
Question # 106

The four main types of NoSQL databases are:

A.

Document

B.

Row-orientated

C.

Graph

D.

Strategic

E.

Key-value

F.

Column-orientated

Full Access
Question # 107

'Planning, implementation and control activities for lifecycle management of data and

information, found in any form or medium', pertains to which knowledge area?

A.

Document and Content Management

B.

Metadata Management

C.

Data Warehousing and Business Intelligence

D.

Data Storage and Operations

E.

Data Integration and Interoperability

Full Access
Question # 108

According to the DMBoK, Data Governance is central to Data Management. In practical terms, what other functions of Data Management are required to ensure that your Data Governance programme is successful?

A.

Master Data, Data Quality, and Data Development

B.

Data Quality, Content and Document Management, and Data Development

C.

Data Modelling, Data Architecture and Master Data Management

D.

Data Quality, Data Architecture, and Metadata Management

E.

Data Architecture, Data Security, and Metadata Management

Full Access
Question # 109

A DMZ is bordered by 2 firewalls. These are between the DMZ and the:

A.

Internet, for added security

B.

Korean peninsula

C.

Internet and internal systems

D.

Internet and intranet

E.

Internet and extranet

Full Access
Question # 110

Which of these is NOT a component of an enterprise wide data strategy?

A.

A business Case for better data management

B.

A description of data management roles & organizations

C.

An outline of 'as is' and 'to be' technical architectures

D.

A data management roadmap, highlighting major activities

E.

A vision statement for data management

Full Access
Question # 111

Reference and master data require governance processes, including:

A.

The data sources to be integrated

B.

Emotions matrix

C.

Compliance framework

D.

The priority and response levels of data stewardship efforts

E.

The conditions of use rules to be followed

F.

None of the above

Full Access
Question # 112

The CAP theorem states that at most two of the three properties: consistency, availability and partition tolerance can exist in any shared data system.

A.

TRUE

B.

FALSE

Full Access
Question # 113

In matching, false positives are three references that do not represent the same entity are linked with a single identifier.

A.

TRUE

B.

FALSE

Full Access
Question # 114

Data Governance Office (DGO) focuses on enterprise-level data definitions and data management standards across all DAMA-DMBOK knowledge areas. Consists of coordinating data management roles.

A.

TRUE

B.

FALSE

Full Access
Question # 115

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Full Access
Question # 116

The neutral zone is one of the phases in the Bridges’ transition phases.

A.

TRUE

B.

FALSE

Full Access
Question # 117

A key feature of Bill Inmon’s approach to data warehousing is:

A.

A tight management of data dimensions

B.

An exclusive focus on star schemas and cubes

C.

A normalized relational model to store and manage data

D.

A preference for supporting operational reporting

E.

Its ability to operate on open-source platforms

Full Access
Question # 118

Please select the incorrect item that does not represent a dimension in the Data Values category in Data Quality for the Information age.

A.

Currency

B.

Timeliness

C.

Consistency

D.

Completeness

Full Access
Question # 119

Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.

A.

Purpose Limitation

B.

Data Minimisation

C.

Accuracy

D.

Storage Limitation

E.

Accountability

F.

All of the above

Full Access
Question # 120

Release management is critical to batch development processes that grows new capabilities.

A.

TRUE

B.

FALSE

Full Access
Question # 121

An information maturity assessment provides a valuable input to Data Governance planning because it provides:

A.

An assessment of the ability of the organization to utilize data and information in an advanced manner

B.

A benchmark against the organization's peers to drive dissatisfaction with current state among senior leadership

C.

A detailed roadmap for information management related change in the organization

D.

It identifies key weaknesses in the Information Strategy of the organization which impede good governance

E.

Stakeholders require a visual representation in graphical form of their current state versus target state

Full Access
Question # 122
A.

FALSE

B.

TRUE

Full Access
Question # 123

Malware types include:

A.

Trojan horse

B.

Worm

C.

Weasel

D.

Virus

E.

Adware

F.

Camware

Full Access
Question # 124

The repeated implementation of different CRM technologies with different data

structures is mostly a failure of:

A.

Data security

B.

Data modelling

C.

Data architecture

D.

Data warehousing

E.

Data quality

Full Access
Question # 125

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Full Access
Question # 126

Inputs in the reference and master data context diagram include:

A.

None of the above

B.

Business Drivers

C.

Business model

D.

Data Glossary

E.

Cultural Drivers

F.

All of the above

Full Access
Question # 127

SOA stand for Service Orchestrated Architecture

A.

TRUE

B.

FALSE

Full Access
Question # 128

Inputs in the data quality context diagram include:

A.

Data stores

B.

Data lakes

C.

Business requirements

D.

Data quality expectations

Full Access
Question # 129

What techniques should be used and taught to produce the required ethical data handling deliverables?

A.

Change, Communication and training techniques need to be established

B.

A privacy impact assessment (PIA) is critical to ensuring that we are adhering to ethical data management

C.

Do an ethical impact assessment framework for all projects and activities involved in data management

D.

Due to fact that ethics are constantly changing we need to constantly affirm the organizations ethic statements on an annual basis

E.

Data Governance should define the set of ethical practices that are good for the organization

Full Access
Question # 130

Validity, as a dimension of data quality, refers to whether data values are consistent with a defined domain of values.

A.

TRUE

B.

FALSE

Full Access
Question # 131

When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?

A.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

B.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

C.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

D.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

E.

Alignment of Business and Technology strategies, definition of data standards, implementation of supporting metadata and process tools, management of responsibility

Full Access
Question # 132

A design approach for managing the risk of errors in data marts is:

A.

Purge the data in the data marts and reload from the data warehouse

B.

Purge the data in the source system and reload the data warehouse

C.

Purge the data in the data warehouse and copy back to the data mart

D.

Purge the data in the data warehouse and reload from the source systems

E.

Purge the data generally and reload from the best system

Full Access
Question # 133

What are the three characteristics of effective Data Governance communication?

A.

It must be clear, unambiguous, and consistent

B.

It must be consistent, unambiguous, engaging

C.

It must be viral, vital, and have volume

D.

It must be colorful, engaging, using multi-media

E.

It must be clear, structured, repetitive

Full Access
Question # 134

There are three basic approaches to implementing a Master Data hub environment, including:

A.

Transaction hub

B.

Distributed hub

C.

Registry

D.

Consolidated approach

E.

Eventual consistency

F.

Transparent hub

Full Access
Question # 135

The Data Governance Council (DGC) manages data governance initiatives, issues, and escalations.

A.

TRUE

B.

FALSE

Full Access
Question # 136

Deliverables in the document and content management context diagram include:

A.

Metadata and reference data

B.

Policy and procedure

C.

Data governance

D.

Content and records management strategy

E.

Audit trail and log

F.

Data storage and operations

Full Access
Question # 137

No recorded negative ethical outcomes does not mean that the organization is processing data ethically. Legislation cannot keep up with the evolution of the data environment so how do we stay compliant?

A.

Constant attention to ethical legislation and legal proceedings and international ethical bodies will enable the organization to recognize potential compliancy issues that can be addressed

B.

An active data quality and privacy assessment program can be used to detect ethical risks. Once identified, we can reduce the associated risks according to the organizations ethical values

C.

A healthy internal governance, risk and compliance function, including internal data audits will identify potential ethical issues

D.

An organization must develop and sustain a culture of ethical data handling to detect potential ethical risks. On identifying ethical risks, the onus is on the organization to modifying the processing to achieve acceptable data handling

E.

The best way to keep up with the evolution is to survey communities, customers and employees and what they consider to be appropriate use of the information

Full Access
Question # 138

An organization can enhance its Data Governance program and thereby improve its approach to enterprise data management. This is important for the following reason:

A.

Since most organizations start Data Governance in silos and not at the enterprise level, it is important to be able to assess current state and determine desired targeted state that supports the overall vision

B.

Often organizations have a data repository or dictionary that is just as good as Data Governance

C.

Data Governance programs are rarely enhanced once they are launched

D.

Assessing current state for Data Governance may not tell the organization the current state of other components

E.

Starting a Data Governance program does not require that the organization start a data management program

Full Access
Question # 139

Why is it important to create short-term wins when rolling out a Data Governance initiative?

A.

Staff turnover in most organisations makes longer term planning impossible

B.

Short term wins help ensure on-going political support

C.

Short term wins help to distract stakeholders from delayed delivery on bigger issues

D.

You need to align your deliverables with internal project budgeting cycles

E.

People find it hard to sustain commitment to change if they do not see compelling results within a relatively short time period

Full Access
Question # 140

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:

A.

Specific risk management

B.

General risk management

C.

Data ethics

D.

Data security

E.

Publicity

F.

Privacy

Full Access
Question # 141

An effective Data Governance communication program should include the following:

A.

All of these

B.

A Data Governance Portal

C.

Events that encourage informal networking

D.

A custom training program

E.

Regular newsletters

Full Access
Question # 142

Data Management Professionals only work with the technical aspects related to data.

A.

TRUE

B.

FALSE

Full Access
Question # 143

What is the most critical task for a new Data Governance team?

A.

To begin developing the Business Data Glossary

B.

To identify metrics for data quality issues in the organisation

C.

To define the requirements for technologies to support DG activities

D.

To collate an Information Risk Register

E.

To establish its purpose, process, and measures of team progress

Full Access
Question # 144

The acronym ETL most commonly stands for:

A.

Extract Transpose Leverage

B.

Export Transform Log

C.

Extend Trim Load

D.

Extract Transform Load

E.

Efficient Trace Logging

Full Access
Question # 145

Location Master Data includes business party addresses and business party location, as well as facility addresses for locations owned by organizations.

A.

TRUE

B.

FALSE

Full Access
Question # 146

All organizations have the same Master Data Management Drivers and obstacles.

A.

TRUE

B.

FALSE

Full Access
Question # 147

Effectiveness metrics for a data governance programme includes: achievement of goals and objectives; extend stewards are using the relevant tools; effectiveness of communication; and effectiveness of education.

A.

FALSE

B.

RRUE

Full Access
Question # 148

The deliverables in the data architecture context diagram include:

A.

Data flows

B.

Enterprise data

C.

Implementation roadmap

D.

Data Value Chains

E.

None of the above

F.

All of the above

Full Access
Question # 149

Operational Metadata describes details of the processing and accessing of data. Which one is not an example:

A.

Error logs

B.

Schedule anomalies

C.

Purge criteria

D.

Failure logs

Full Access
Question # 150

Reduced risk is a benefit of high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 151

Please select the two classifications of database types:

A.

Centralized

B.

Generic

C.

Distributed

D.

MapReduce

Full Access
Question # 152

Consistent input data reduces the chance of errors in associating records. Preparation processes include:

A.

Standardization

B.

EnrichmentC Validation

C.

Database management

Full Access
Question # 153

The accuracy dimension has to do with the precision of data values.

A.

TRUE

B.

FALSE

Full Access
Question # 154

Confirming and documenting understanding of different perspectives facilitate:

A.

Formalization

B.

Normalization

C.

Scope definition

D.

Knowledge retention/documentation

Full Access
Question # 155

Database monitoring tools measure key database metrics, such as:

A.

Capacity, availability, backup instances, data quality

B.

Capacity, design, normalization, user access

C.

Create, read, update, delete

D.

Create, read, normalization, user access

E.

Capacity, availability, cache performance, user statistics

Full Access
Question # 156

Please select the correct general cost and benefit categories that can be applied consistently within an organization.

A.

Cost of erasing data from servers

B.

Cost of improving data

C.

What the data could be sold for

D.

Benefit of higher quality data

E.

Cost of replacing data if it were lost

F.

What competitors would pay for data

Full Access
Question # 157

Issues caused by data entry processes include:

A.

Training issues

B.

List entry replacement

C.

Software issues

D.

Soft state issues

E.

Change to business processes

F.

Inconsistent business process execution

Full Access
Question # 158

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

A.

TRUE

B.

FALSE

Full Access
Question # 159

The advantage of a decentralised Data Governance model over a centralised model is:

A.

An increased level of ownership from local decision making groups

B.

The cheaper execution of Data Governance operations

C.

Having a common approach to resolving Data Governance issues

D.

The common metadata repository configurations

E.

The easier implementation of industry data models

Full Access
Question # 160

The database administrator (DBA) is the most established and the most widely adopted data professional role.

A.

TRUE

B.

FALSE

Full Access
Question # 161

ANSI standard 859 has three levels of control of data, based on the criticality of the data and the perceived harm that would occur if data were corrupt or otherwise unavailable, including:

A.

Basic

B.

Formal

C.

Informal

D.

Custody

E.

Revision

F.

None of the above

Full Access
Question # 162

Most people who work with data know that it is possible to use data to misrepresent facts. Which of the following is NOT a way in which data is used to misrepresent facts?

A.

Data collected with bias to prove a pre-conceived idea is correct

B.

Leaving out required context in a report resulting in ambiguity and assumptions being made about the data points

C.

Omission or inclusion of certain data points in a report or activity based on timing

D.

Providing transparency on the sources, uses, and intent of the data used in a report

E.

Leaving out the relationship between data points in a chart

Full Access
Question # 163

Enterprise data architecture project-related activities include:

A.

Define maturity assessment

B.

Define scope

C.

Design

D.

Implement

E.

None of the above

F.

All of the above

Full Access
Question # 164

A data model that consists of a single fact table linked to important concepts of the

business is a:

A.

elational Model

B.

Dimensional Model

C.

Transition State Model

D.

Process Model

E.

Machine Leaming Model

Full Access
Question # 165

Please select the answer that best fits the following description: Contains only real-time data.

A.

Batch layer

B.

Speed layer

C.

Serving layer

D.

Real-time layer

Full Access
Question # 166

The disclosure of sensitive addresses may occur through:

A.

Inappropriate use of photocopier toner

B.

Cloud-based databases

C.

Software ignoring privacy tags on the data

D.

Ineffective implementation of data architecture

E.

Stored procedures being called directly

Full Access
Question # 167

A node is a group of computers hosting either processing or data as part of a distributed database.

A.

TRUE

B.

FALSE

Full Access
Question # 168

Data and enterprise architecture deal with complexity from two viewpoints:

A.

None of the above

B.

Implementation-orientated

C.

Quality-orientated

D.

Architecture-orientated

E.

Innovation-orientated

F.

Industry-orientated

Full Access
Question # 169

Document and content management is defined as planning, implementation and control activities for storage management of data and information found in any form or medium.

A.

TRUE

B.

FALSE

Full Access
Question # 170

Data access control can be organized at an individual level or group level, depending on the need.

A.

TRUE

B.

FALSE

Full Access
Question # 171

RACI is an acronym that is made up of the following terms.

A.

Control

B.

Responsible

C.

Accountable

D.

Informed

E.

Reliable

F.

Consulted

Full Access
Question # 172

Those responsible for the data-sharing environment have an obligation to downstream data consumers to provide high quality data.

A.

TRUE

B.

FALSE

Full Access
Question # 173

DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.

A.

FALSE

B.

TRUE

Full Access
Question # 174

During the intial scoping of a project, a data model can be used to:

A.

Identify detailed impact on all the tables in a database that must be changed

B.

Determine the security requirements for accessing the data

C.

Provide a clear definition of affected and non-affected data entities

D.

Determine the impact of business processes and customer lifecycles

E.

Plan the structure of the metadata repository

Full Access
Question # 175

When measuring the value of data architecture one should be most concerned about

A.

Improved coding efficiency

B.

Project speed

C.

Number of Projects reviewed

D.

Added business value

E.

Cost savings

Full Access
Question # 176

Which of the following is NOT required to effectively track data quality incidents?

A.

An effective service level agreement with defined rewards and penalties

B.

An assignment process to appropriate individuals and teams

C.

A standard vocabulary for classifying data quality issues

D.

A well defined system of escalation based on the impact, duration, or urgency ofan issue

E.

An operational workflow that ensures effective resolution

Full Access
Question # 177

A database uses foreign keys from code tables for column values. This is a way of

implementing:

A.

Event data

B.

Temporal data

C.

Reference data

D.

Master data

E.

Star schema data

Full Access
Question # 178

What is one of the most important things about collecting data?

A.

To share the data across the organization

B.

To keep data away from the public

C.

To resolve many-to-many relationships

D.

To collect as much data as possible into the data repository

E.

To keep data for each department separate because no one needs all the data

Full Access
Question # 179

Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.

A.

FALSE

B.

TRUE

Full Access
Question # 180

The first two steps of the Reference data Change request process, as prescribed DMBOk2, include:

A.

Decide and Communicate

B.

Receive Change Request

C.

Update and Inform

D.

Identify Stakeholder

E.

Identify Impact

Full Access
Question # 181

Identify indicative components of a Data Strategy.

A.

Vision, case studies, succession plans, functional requirements

B.

Vision, data invoice, payment receipts, confirmations

C.

Vision, business surveys, employee performance goals

D.

Vision, business case, data models, employee goals

E.

Vision, business case, principles, goals, and measures

Full Access
Question # 182

Data models are critical to effective management of data. They:

A.

Provide a common vocabulary around data

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Serve as a primary communication tool during projects

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Provide the organisation with clear system of the architecture

F.

Make the integration between data management and data analytics possible

Full Access
Question # 183

The first two steps in the data science process are:

A.

Define Big Data data strategy & Business Need(s)

B.

Choose Data Sources

C.

Develop Data Science Hypotheses and Mehods

D.

Acquire & Ingest Data source(s)

Full Access
Question # 184

The difference between warehouses and operational systems do not include the following element:

A.

Time variant

B.

Database

C.

Subject-orientated

D.

Historical

Full Access
Question # 185

Category information is one of the types of data that can be modelled.

A.

TRUE

B.

FALSE

Full Access
Question # 186

Please select the user that best describes the following description: Uses the business glossary to make architecture, systems design, and development decisions, and to conduct the impact analysis.

A.

Business user

B.

Technical user

C.

Analytical user

D.

None of the above

E.

Advanced user

Full Access
Question # 187

The second stage of Kotter’s eight stage process is:

A.

Developing a vision and a strategy

B.

Establishing a sense of urgency

C.

Creating short term wins

D.

Creating the guiding coalition

Full Access
Question # 188

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.

A.

FALSE

B.

TRUE

Full Access
Question # 189

How do data management professionals maintain commitment of key stakeholders to the data management initiative?

A.

Talking to a stakeholder when passing them in the passage

B.

Weekly email reports showing metrics on data management progress/lack thereof

C.

Rely on the stakeholder group to be self-sustaining

D.

This is not necessary, stakeholders signed up at the beginning of the program

E.

Continuous communication identifying and promoting the value of data and information assets to the organization

Full Access
Question # 190

Adoption of a Data Governance program is most likely to succeed:

A.

When the CDO is a charismatic leader

B.

In 1 or 2 months with a large consulting team

C.

When the entire enterprise is partaking at once

D.

When dictated by senior executives

E.

With an incremental rollout strategy

Full Access
Question # 191

Data flows map and document relationships between data and:

A.

Locations where local differences occur

B.

Situations where local differences occur

C.

Network segments

D.

Applications within a business process

E.

None of the above

F.

All of the above

Full Access
Question # 192

Elements that point to differences between warehouses and operational systems include:

A.

Historical

B.

Data security standards

C.

Subject-orientated

D.

Non-volatile

E.

Data quality

F.

Integrated

Full Access
Question # 193

Please select the correct General Accepted Information Principles:

A.

Asset Principle

B.

Audit Principle

C.

Due Diligence Principle

D.

Going Concern Principle

E.

Ethical Principle

F.

All of the above

Full Access
Question # 194

The TOGAF framework does NOT include a(n):

A.

Business focus

B.

Enterprise continuum approach

C.

Metamodel

D.

Methods

E.

Maturity model

Full Access
Question # 195

Key processing steps for MDM include:

A.

Data model management

B.

Data acquisition

C.

Data validation, standardization and enrichment

D.

Entity resolution

E.

Data sharing and stewardship

F.

None of the above

Full Access
Question # 196

The acronym CMDB stands for:

A.

Customization management tools or databases

B.

Classic management technologies or databases

C.

Cached management technologies or databases

D.

Configuration management tools or databases

E.

Cached management tools or databases

F.

Classic monitoring technologies or databases

Full Access
Question # 197

A hacker is a person who finds unknown operations and pathways within complex computer system. Hackers are only bad.

A.

TRUE

B.

FALSE

Full Access
Question # 198

Data governance requires control mechanisms and procedures for, but not limited to, identifying, capturing, logging and updating actions.

A.

FALSE

B.

TRUE

Full Access
Question # 199

Please select correct term for the following sentence: Any collection of stored data regardless of structure or content. Some large databases refer to instances and schema.

A.

Schema

B.

Database

C.

Node

D.

Instance

Full Access
Question # 200

In defining a Data Security Policy, what role should Data Governance play?

A.

Write the Data Security Policy

B.

Send all Data Security questions to the legal department

C.

Have no role in the Data Security Policy

D.

Review and approve the Data Security Policy

E.

Own and maintain the Data Security Policy

Full Access
Question # 201

A weakness or defect in a system that allows it to be successfully attacked and

compromised is a:

A.

Risk

B.

Threat

C.

Feature

D.

Vulnerability

E.

Chasm

Full Access
Question # 202

The advantage of a decentralized data governance model over a centralized model is:

A.

The common metadata repository configurations

B.

Having a common approach to resolving data governance issues

C.

The easier implementation of industry data models

D.

An increased level of ownership from local decision making groups

E.

The cheaper execution of data governance operations

Full Access
Question # 203

The library of Alexandria was one of the largest collection of books in the ancient

world. Which DMBoK knowledge area is most aligned with managing the collection?

A.

Data Integration and Interoperability

B.

Reference and Master Data

C.

Data Security

D.

Document and Content Management

E.

Data Govemance

Full Access
Question # 204

There are numerous methods of implementing databases on the cloud. The most common are:

A.

Virtual machine image

B.

Distributed machine image

C.

DAAS

D.

Managed database hosting on the cloud

Full Access
Question # 205

Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.

A.

Principle of integrity

B.

Principle of availability

C.

Principle of retention

D.

Principle of accountability

Full Access
Question # 206

What key components must be included in the Implementation Roadmap?

A.

Timeframes and resources for data quality requirements, policies and directives and testing standards

B.

Data metrics, physical data structures, and data model designs

C.

Timeframes and resources for Policies and Directives, a Business Glossary Architecture, Business and IT processes and role descriptions

D.

Testing requirements, risk assessment, data security and privacy policies and database design

E.

Timeframes and resources for policies and directives Architecture, Tools and Control Metrics

Full Access
Question # 207

High quality data definition exhibit three characteristics:

A.

Clearness

B.

Clarity

C.

Accuracy

D.

Completeness

Full Access
Question # 208

Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.

A.

TRUE

B.

FALSE

Full Access
Question # 209

Data handling ethics are concerned with how to procure, store, manage, use and dispose of data in ways that are aligned with ethical principles.

A.

TRUE

B.

FALSE

Full Access
Question # 210

The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:

A.

Level 2 In Development

B.

Level 4 Proactive

C.

Level 2 Sub-standard

D.

Level 4 Proactive

E.

Level 3 Transformational

F.

Level 3 Essential

Full Access
Question # 211

Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.

A.

TRUE

B.

FALSE

Full Access
Question # 212

Data replication has two dimensions of scaling: diagonal and lateral

A.

FALSE

B.

TRUE

Full Access
Question # 213

Data Governance deliverables commonly include:

A.

Data value chains

B.

IT methodology and practices

C.

Business culture assessment

D.

Roadmaps and implementation strategy

E.

Regulatory requirements

Full Access
Question # 214

An advantage of a centralized repository include: Quick metadata retrieval, since the repository and the query reside together.

A.

TRUE

B.

FALSE

Full Access
Question # 215

Metadata is essential to the management of unstructured data as it id to the management of structured data.

A.

TRUE

B.

FALSE

Full Access
Question # 216

Data governance requires control mechanisms and procedures for, but not limited to, assignment and tracking of action items.

A.

FALSE

B.

TRUE

Full Access
Question # 217

The goals of Metadata management include:

A.

Managing performance of data assets

B.

Ensure metadata quality, consistency, currency and security

C.

Managing the availability of data throughout the data lifecycle

D.

Provide standard ways to make metadata accessible to metadata consumers

E.

Managing the performance of data transactions

F.

Establish or enforce the use of technical Metadata standards to enable data exchange

Full Access
Question # 218

The implementation of a Data Warehouse should follow guiding principles, including:

A.

Data Efficiency

B.

One size does not fit all

C.

Contracts

D.

Focus on the business goals

E.

Start with the end in mind

F.

Collaborate

Full Access
Question # 219

Enterprise data architects in an application migration project are primarily concerned with:

A.

Mapping of data to business processes

B.

Changes to business processes

C.

Resolving data complexity

D.

Data mapping specifications

E.

Mapping outliers

Full Access