Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The implementation of a Data Warehouse should follow guiding principles, including:

A.

Data Efficiency

B.

One size does not fit all

C.

Contracts

D.

Focus on the business goals

E.

Start with the end in mind

F.

Collaborate

Full Access
Question # 5

A System of Reference is an authoritative system where data consumers can obtain reliable data to support transactions and analysis, even if the information did not originate in the system reference.

A.

TRUE

B.

FALSE

Full Access
Question # 6

Effective document management requires clear policies and procedures, especially regarding retention and disposal of records.

A.

FALSE

B.

TRUE

Full Access
Question # 7

Which of these is not a goal of Data Governance and Stewardship?

A.

Define, approve, communicate, and implement principles, policies, procedures, metrics, tools, and responsibilities for data management

B.

Monitor and guide policy compliance, data usage, and management activities

C.

Help the data modelers to use data elements that have gone through Data Governance processes

D.

Enable an organization to manage its data as an asset

E.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Full Access
Question # 8

The load step of the ETL is physically storing or presenting the results of the transformation into the source system.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Please select the answer that best fits the following description: Contains only real-time data.

A.

Batch layer

B.

Speed layer

C.

Serving layer

D.

Real-time layer

Full Access
Question # 10

Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.

A.

TRUE

B.

FALSE

Full Access
Question # 11

In matching, false positives are three references that do not represent the same entity are linked with a single identifier.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?

A.

There has been too much investment in Data Governance and data management tools without improving the data

B.

The people who were new to the organization were assigned to Data Governance

C.

People were assigned roles based on a somewhat random connection to the data, and without a clear purpose

D.

The Data Governance initiative leaders are using outdated vocabulary

E.

The data standards are too general and high level for proper enforcement

Full Access
Question # 13

One of the key differences between operational systems and data warehouses is:

A.

Operational systems focus on data quality: data warehouses focus on datasecurity

B.

Operational systems focus on historical data; data warehouses contain currentdata

C.

Operational systems are available 24x7; data warehouses are available duringbusiness hours

D.

Operational systems focus on current data; data warehouses contain historicaldata

E.

Operational systems focus on business processes: data warehouses focus onbusiness strategies

Full Access
Question # 14

Please select the correct General Accepted Information Principles:

A.

Asset Principle

B.

Audit Principle

C.

Due Diligence Principle

D.

Going Concern Principle

E.

Ethical Principle

F.

All of the above

Full Access
Question # 15

The warehouse has a set of storage areas, including:

A.

Staging area

B.

Data marts

C.

Consistent object attributes

D.

Operational data store (ODS)

E.

Cubes

F.

Central warehouse

Full Access
Question # 16

Implementing a BI portfolio is about identifying the right tools for the right user communities within or across business units.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity

A.

FALSE

B.

TRUE

Full Access
Question # 18

Record management starts with a vague definition of what constitutes a record.

A.

TRUE

B.

FALSE

Full Access
Question # 19

Critical success factors throughout the BI/DW lifecycle include:

A.

Business readiness

B.

A clear and consistent focus

C.

Vision alignment

D.

Business sponsorship

E.

Linear symmetry

F.

A consistent line across display methods

Full Access
Question # 20

The failure to gain acceptance of a business glossary may be due to ineffective:

A.

Metadata Management

B.

Business Architecture

C.

Content and Document Management

D.

Data Governance

E.

Data Security

Full Access
Question # 21

When assessing security risks it is required to evaluate each system for the following:

A.

The current security protections in place

B.

The requirements to protect the data

C.

None of the above

D.

All of the above

E.

The complexity of the data stored or in transit

F.

The sensitivity of the data stored or in transit

Full Access
Question # 22

In the Abate Information Triangle the past moves through the following echelons befor it comes insight:

A.

Data

B.

Information

C.

Transactions

D.

Knowledge

E.

Big data

F.

Time

Full Access
Question # 23

Business glossaries have the following objectives:

A.

Improve the alignment between technology assets and the business organization

B.

All of the above

C.

Cultural factors that might improve the concepts and terminology

D.

Maximise search capability and enable access to documented institutional knowledge

E.

Enable common understanding of the core business concepts and terminology

F.

Reduce the risk that data will be misused due to inconsistent understanding of the business concepts.

Full Access
Question # 24

The Data Warehouse encompasses all components in the data staging and data presentation areas, including:

A.

Data Access Tool

B.

Application Tool

C.

Operational source systems

D.

Data staging area

E.

Data presentation area

F.

All of the above

Full Access
Question # 25

A metadata repository is essential to assure the integrity and consistent use of an enterprise data model across business processes.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Test environments serve many uses:

A.

Quality Assurance Testing (QA)

B.

Integration Testing

C.

User Acceptance Testing (UAT)

D.

Performance Testing

E.

All of the above

F.

None of the above

Full Access
Question # 27

In data modelling practice, entities are linked by:

A.

Relationships

B.

Processes

C.

Cardinality

D.

Indexes

E.

Triggers

Full Access
Question # 28

Some common data quality business rule types are:

A.

Definitional conformance

B.

Format compliance

C.

Range conformance

D.

Mapping conformance

Full Access
Question # 29

The percentage of enterprise computers having the most recent security patch

installed is a metric of which knowledge area?

A.

Data Quality

B.

Data Warehousing and Business Intelligence

C.

Data Storage and Operations

D.

Metadata Management

E.

Data Security

Full Access
Question # 30

All DMM and Data Governance assessments should identify its objectives and goals for improvement. This is important because:

A.

There is always room for improvement

B.

An assessment without goals and objectives will not have a conclusion

C.

The assessment team has to be aware of the objectives to be successful

D.

Data management and Data Governance assessments have different goals and objectives

E.

Assessment objectives start at the business drivers (for funding), goals to describe focus, and objectives to provide specific expectations and criteria for evaluation for success

Full Access
Question # 31

Referential Integrity (RI) is often used to update tables without human intervention. Would this be a good idea for reference tables?

A.

Yes, since Standards Bodies typically supply reference data, the enterprise can automatically update when a new code or value is received

B.

No, updates should always be made directly via data entry or through a specific batch interface based on operator-entered information partly because of regulatory reporting and archiving

C.

Yes, you do not have to worry about archived data with reference data so tables can be updated automatically

D.

No, but an enterprise can use program logic to do updates as there is little potential for problems to occur with reference data

E.

Yes, older transactions do not have to be removed because with the Cloud there is unlimited database storage

Full Access
Question # 32

Advantages if a centralized metadata repository include:

A.

Quick metadata retrieval

B.

None of the above

C.

Combining data from multiple other tables in advance to avoid costly run-time joins

D.

All of the above

E.

High availability

F.

Low latency, since it is independent of the source systems

Full Access
Question # 33

Reference and Master Data Management follow these guiding principles:

A.

Obtaining buy-in from all stakeholders

B.

Stewardship

C.

Monitoring the resistance

D.

Ownership

E.

Addressing all queries

F.

Controlled change

Full Access
Question # 34

Normalisation is the process of applying rules in order to organise business complexity into stable data structures.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Naming standards for data domains should:

A.

Contain acronyms that are relevant to the organization because everyone should know them

B.

Be approved by the database administrators

C.

Minimize name changes across environments

D.

Should reflect their specific environment such as QA, Pre-Prod and Production

E.

Be short for ease of use

Full Access
Question # 36

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Full Access
Question # 37

Corporate Information Factory (CIF) components include:

A.

Data marts

B.

Objectives

C.

Operational Reports

D.

Reduction of risk

E.

Staging Area

F.

Contributions to business objectives

Full Access
Question # 38

SSD is the abbreviation for Solid State Dimension.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Assessment capabilities are evaluated against a pre-determined scale with established criteria. This is important because:

A.

Each process that is being evaluated must show some financial justification.

B.

It is difficult to be objective when using an internally developed assessment

C.

Each process under evaluation must be rated objectively against best practices found in many organizations and industries.

D.

Pre-determined scales give organizations a way to justify their weaknesses

E.

Established criteria in an industry make each organization more likely to want to use the industry's assessment.

Full Access
Question # 40

Confirming and documenting understanding of different perspectives facilitate:

A.

Formalization

B.

Normalization

C.

Scope definition

D.

Knowledge retention/documentation

Full Access
Question # 41

Achieving security risk reduction in an organisation begins with developing what?

A.

A change management model, prioritising security changes and then updatingthe active directory

B.

An enterprise data model, rolling out data flow diagrams and enbedding securityinto the database

C.

A security model, classifying each organisational role and putting the physicaldata behind a firewall

D.

A classification model, classifying each data concept and locating the physicaldata

E.

A metadata model, locating the data and moving it into the metadata repository

Full Access
Question # 42

Data architect: A senior analyst responsible for data architecture and data integration.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Communication should start later in the process as too many inputs will distort the vision.

A.

TRUE

B.

FALSE

Full Access
Question # 44

Defining quality content requires understanding the context of its production and use, including:

A.

Producers

B.

Timing

C.

None of the above

D.

Delivery

E.

Consumers

F.

Format

Full Access
Question # 45

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Full Access
Question # 46

Database monitoring tools measure key database metrics, such as:

A.

Capacity, availability, backup instances, data quality

B.

Capacity, design, normalization, user access

C.

Create, read, update, delete

D.

Create, read, normalization, user access

E.

Capacity, availability, cache performance, user statistics

Full Access
Question # 47

Improving data quality requires a strategy that accounts for the work that needs to be done and the way people will execute it.

A.

TRUE

B.

FALSE

Full Access
Question # 48

Business requirements is an input in the Data Warehouse and Business Intelligence context diagram.

A.

TRUE

B.

FALSE

Full Access
Question # 49

Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.

A.

TRUE

B.

FALSE

Full Access
Question # 50

Please select the answer that does not represent a machine learning algorithm:

A.

Reinforcement learning

B.

Supervised learning

C.

Artificial learning

D.

Unsupervised learning

Full Access
Question # 51

Data lineage is useful to the development of the data governance strategy.

A.

TRUE

B.

FALSE

Full Access
Question # 52

Which of the following activities is most likely to maintain bias in data analysis?

A.

Re-baselining the data set after each period of analysis to remove assumptions

B.

Working with external stakeholders to assess data quality

C.

Using more data sets with same data

D.

Remove sources of likely bias from data sets before analysis

E.

Using more data sets with diverse data sources

Full Access
Question # 53

XML provides a language for representing both structures and unstructured data and information.

A.

TRUE

B.

FALSE

Full Access
Question # 54

A controlled vocabulary is a defined list of explicitly allowed terms used to index, categorize, tag, sort and retrieve content through browsing and searching.

A.

TRUE

B.

FALSE

Full Access
Question # 55

Coupling describes the degree to which two systems are intertwined.

A.

FALSE

B.

TRUE

Full Access
Question # 56

The accuracy dimension has to do with the precision of data values.

A.

TRUE

B.

FALSE

Full Access
Question # 57

Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:

A.

The triggers for effective change

B.

Data architecture

C.

How people experience changes

D.

Data security

E.

The barriers to change

F.

Why change fails

Full Access
Question # 58

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

A.

Stakeholders

B.

Government regulations

C.

Proprietary business concerns

D.

Legitimate access needs

E.

Contractual obligations

F.

None of the above

Full Access
Question # 59

Data Management Professionals only work with the technical aspects related to data.

A.

TRUE

B.

FALSE

Full Access
Question # 60

The term data quality refers to both the characteristics associated with high quality data and to the processes used to measure or improve the quality of data.

A.

TRUE

B.

FALSE

Full Access
Question # 61

Which answer is considered to be the best definition of data security?

A.

Data security occurs when all metadata is tagged as either Confidential, Public or Sensitive

B.

Data security is only possible after Data Governance and Risk Management have looked at all the data, verified, definitions and conducted a impact analysis

C.

Data security can be described as having all of an organization's data in a repository along with a policy of limited access to only those employees managing the data

D.

Data security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization's data

E.

Data security is the ability to track who in the organization has access to metadata

Full Access
Question # 62

Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.

A.

FALSE

B.

TRUE

Full Access
Question # 63

Characteristics that minimise distractions and maximise useful information include, but not limited to, consistent object attributes

A.

TRUE

B.

FALSE

Full Access
Question # 64

A lineage data tool provides:

A.

Scope for reporting requirements

B.

A temporal distortion of data values across systems

C.

The capture and maintenance of source structures for each attribute on the datamodel

D.

Ancestral origin of data DNA

E.

A clean line between columns in the same entity

Full Access
Question # 65

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Full Access
Question # 66

Validity, as a dimension of data quality, refers to whether data values are consistent with a defined domain of values.

A.

TRUE

B.

FALSE

Full Access
Question # 67

Please select correct term for the following sentence: An organization shall assign a senior executive to appropriate individuals, adopt policies and processes to guide staff and ensure program audibility.

A.

Principle of integrity

B.

Principle of availability

C.

Principle of retention

D.

Principle of accountability

Full Access
Question # 68

GDPR came into affect in May. 2018. What organization is responsible for awarding compliance certificates for organizations?

A.

American Nations Standards Institute (ANSI)

B.

European Union

C.

British Computing Society (BCS)

D.

National Institute of Standards and Technology (NIST)

E.

None. There are no compliance certifications

Full Access
Question # 69

DBAs exclusively perform all the activities of data storage and operations.

A.

TRUE

B.

FALSE

Full Access
Question # 70

All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 71

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

A.

FALSE

B.

TRUE

Full Access
Question # 72

The goal of Data Governance is to enable an organization to manage data as an asset. To achieve this overall goal, a DG program must be:

A.

Modeled, sanctioned and readable

B.

Eloquent, transformative and explicit

C.

Horizontal, vertical and fluid

D.

Sustainable, embedded and measured

E.

Visionary, vertical and vivid

Full Access
Question # 73

According to the DMBoK, Data Governance is central to Data Management. In practical terms, what other functions of Data Management are required to ensure that your Data Governance programme is successful?

A.

Master Data, Data Quality, and Data Development

B.

Data Quality, Content and Document Management, and Data Development

C.

Data Modelling, Data Architecture and Master Data Management

D.

Data Quality, Data Architecture, and Metadata Management

E.

Data Architecture, Data Security, and Metadata Management

Full Access
Question # 74

Data governance can be understood in terms of political governance. It includes the following three function types:

A.

Legislative-like functions

B.

Judicial-like functions

C.

Ethical-like functions

D.

Executive functions

E.

Data-like functions

F.

Morality-like functions

Full Access
Question # 75

When we consider the DMBoK2 definition of Data Governance, and the various practitioner definitions that exist in the literature, what are some of the key elements of Data Governance?

A.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

B.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

C.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

D.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

E.

Alignment of Business and Technology strategies, definition of data standards, implementation of supporting metadata and process tools, management of responsibility

Full Access
Question # 76

Data Integration and Interoperability is dependent on these other areas of data management:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Full Access
Question # 77

What type of key is used in physical and sometimes logical relational data modelling schemes to represent a relationship?

A.

Primary key

B.

Foreign key

C.

Network key

D.

Applications key

E.

Door key

F.

All of the above

Full Access
Question # 78

All assessments should include a roadmap for phased implementation of the recommendations. This is important because:

A.

The roadmap shows how to implement the important assessment results, and when to do so

B.

A roadmap will highlight items in an implementation sequence and on other considerations (budget, resources, other programs, etc.)

C.

A roadmap is just another way of saying you should have a plan

D.

A roadmap is the only way for the organization to understand the results of the assessment

E.

A roadmap includes a project plan, which gives the stakeholders information on how each recommendation will be implemented

Full Access
Question # 79

When constructing an organization’s operating model cultural factors must be taken into consideration.

A.

TRUE

B.

FALSE

Full Access
Question # 80

Development of goals, principles and policies derived from the data governance strategy will not guide the organization into the desired future state.

A.

FALSE

B.

TRUE

Full Access
Question # 81

Bias refers to an inclination of outlook. Please select the types of data bias:

A.

Data collection for pre-defined results

B.

Hunch and search

C.

Positive reinforcement

D.

Context and Emotion

E.

Biased use of data collected

F.

Biased sampling methodology

Full Access
Question # 82

What are the three characteristics of effective Data Governance communication?

A.

It must be clear, unambiguous, and consistent

B.

It must be consistent, unambiguous, engaging

C.

It must be viral, vital, and have volume

D.

It must be colorful, engaging, using multi-media

E.

It must be clear, structured, repetitive

Full Access
Question # 83

'Planning, implementation and control activities for lifecycle management of data and

information, found in any form or medium', pertains to which knowledge area?

A.

Document and Content Management

B.

Metadata Management

C.

Data Warehousing and Business Intelligence

D.

Data Storage and Operations

E.

Data Integration and Interoperability

Full Access
Question # 84

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Full Access
Question # 85

No recorded negative ethical outcomes does not mean that the organization is processing data ethically. Legislation cannot keep up with the evolution of the data environment so how do we stay compliant?

A.

Constant attention to ethical legislation and legal proceedings and international ethical bodies will enable the organization to recognize potential compliancy issues that can be addressed

B.

An active data quality and privacy assessment program can be used to detect ethical risks. Once identified, we can reduce the associated risks according to the organizations ethical values

C.

A healthy internal governance, risk and compliance function, including internal data audits will identify potential ethical issues

D.

An organization must develop and sustain a culture of ethical data handling to detect potential ethical risks. On identifying ethical risks, the onus is on the organization to modifying the processing to achieve acceptable data handling

E.

The best way to keep up with the evolution is to survey communities, customers and employees and what they consider to be appropriate use of the information

Full Access
Question # 86

Product Master data can only focus on an organization’s internal product and services.

A.

TRUE

B.

FALSE

Full Access
Question # 87

If two data stores are able to be inconsistent during normal operations, then the

integration approach is:

A.

Asynchronous

B.

Uncontrolled

C.

Synchronous

D.

Streaming

E.

Faulty

Full Access
Question # 88

Layers of data governance are often part of the solution. This means determining where accountability should reside for stewardship activities and who the owners of the data are.

A.

FALSE

B.

TRUE

Full Access
Question # 89

The four main types of NoSQL databases are:

A.

Document

B.

Row-orientated

C.

Graph

D.

Strategic

E.

Key-value

F.

Column-orientated

Full Access
Question # 90

Please select the answers that correctly describes the set of principles that recognizes salient features of data management and guide data management practice.

A.

Data is an asset with unique properties.

B.

It takes Metadata to manage data.

C.

The most important part of data management is security.

D.

Data management is lifecycle management.

E.

Effective data management requires leadership commitment.

F.

Efficient data management requires a team of IT professionals only.

Full Access
Question # 91

A sandbox is an alternate environment that allows write-only connections to production data and can be managed by the administrator.

A.

TRUE

B.

FALSE

Full Access
Question # 92

OCR is the abbreviation for Optical Character Recognition.

A.

TRUE

B.

FALSE

Full Access
Question # 93

In a data warehouse, where the classification lists for organisation type are

inconsistent in different source systems, there is an indication that there is a lack of

focus on:

A.

Metadata Management

B.

Data Storage

C.

Data Modelling

D.

Master Data

E.

Reference data

Full Access
Question # 94

The acronym ETL most commonly stands for:

A.

Extract Transpose Leverage

B.

Export Transform Log

C.

Extend Trim Load

D.

Extract Transform Load

E.

Efficient Trace Logging

Full Access
Question # 95

The business glossary application is structured to meet the functional requirements of the three core audiences:

A.

Data users

B.

Application users

C.

Innovation users

D.

Business users

E.

Data stewards

F.

Technical users

Full Access
Question # 96

The independent updating of data into a system of reference is likely to cause:

A.

Reference data inconsistencies

B.

Duplicate data

C.

Deadlocks in the database

D.

Master data inconsistencies

E.

Transaction data inconsistencies

Full Access
Question # 97

The Data Warehouse (DW) is a combination of three primary components: An integrated decision support database, related software programs and business intelligence reports.

A.

FALSE

B.

TRUE

Full Access
Question # 98

The database administrator (DBA) is the most established and the most widely adopted data professional role.

A.

TRUE

B.

FALSE

Full Access
Question # 99

SOR Stands for:

A.

Service of Record

B.

System of Record

C.

System on Record

D.

Service over Record

Full Access
Question # 100

Which of the following is an activity for defining a Data Governance strategy?

A.

Develop a Business Glossary

B.

Perform Readiness Assessment

C.

Develop Goals, Principles, and Policies

D.

Charter Data Governance Council

E.

Deliver a plan for mapping metadata

Full Access
Question # 101

Instant Messaging (IM) allows a user to message each other in real-time.

A.

TRUE

B.

FALSE

Full Access
Question # 102

Please select the two classifications of database types:

A.

Centralized

B.

Generic

C.

Distributed

D.

MapReduce

Full Access
Question # 103

Resource Description Framework (RDF), a common framework used to describe information about any Web resource, is a standard model for data interchange in the Web.

A.

FALSE

B.

TRUE

Full Access
Question # 104

What result(s) is/are Data Handling Ethics trying to avoid?

A.

Loss of reputation for the organization and loss of customers

B.

Unethical use of information by staff to achieve business outcomes; customers trust so they are willing to pay more

C.

Increased Risk for people whose data is exposed and criminal proceedings

D.

Ensure that Data Governance is in line with Corporate Governance and ethic business statements

E.

Ensure that organizations are adhering to ethical standards set by industry and bodies such as the World Economic Forum

Full Access
Question # 105

Data profiling also includes cross-column analysis, which can identify overlapping or duplicate columns and expose embedded value dependencies.

A.

TRUE

B.

FALSE

Full Access
Question # 106

Please select valid modelling schemes or notations

A.

NoSQL

B.

Dimensional

C.

Relational

D.

Object-orientated

E.

Fact-based

F.

Matrix-based

Full Access
Question # 107

E-discovery is the process of finding electronic records that might serve as evidence in a legal action.

A.

TRUE

B.

FALSE

Full Access
Question # 108

The language used in file-based solutions is called MapReduce. This language has three main steps:

A.

Map

B.

Shuffle

C.

Free

D.

Terminate

E.

Integrate

F.

Reduce

Full Access
Question # 109

Which of the following answers best describes an Active Data Dictionary?

A.

A dictionary that is active 24 hours a day

B.

Any data dictionary is considered active because it has codes and values used in the enterprise

C.

An integrated dictionary that is managed automatically by the database management system software

D.

A dictionary that allows users to enter data in an 'active' or open manner

E.

A dictionary that can be activated by the metadata team

Full Access
Question # 110

The business case for enterprise warehousing is:

A.

To increase data redundancy, align information glossaries, and enable anenterprise to exploit machine leaming techniques

B.

To align data systems, improve source system management, and to enable anenterprise exploit machine learning techniques

C.

To increase data distribution, improve information generation, and enable anenterprise to use its data to increase revenue

D.

To reduce data overload, improve information governance, and enable anenterprise to use its data to make better decisions

E.

To reduce data redundancy, improve information consistency, and enable anenterprise to use its data to make better decisions

Full Access
Question # 111

Activities that drive the goals in the context diagram are classified into the following phases:

A.

Plan, Develop, Operate, Control

B.

Plan, Do, Check, Act

C.

Measure, Develop, Implement, Monitor, Improve

D.

Planning, Analysis, Design, Implementation & Maintenance

Full Access
Question # 112

Metadata management solutions include architectural layers including:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Full Access
Question # 113

Developing complex event processing solutions require:

A.

Preparation of historical data and pre-population of a predictive model

B.

Integration testing for subsequent logging requirements

C.

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.

Executing the triggered action in response to the prediction

E.

All of the above

F.

None of the above

Full Access
Question # 114

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

A.

TRUE

B.

FALSE

Full Access
Question # 115

Select three correct attributes a data governance programme must be:

A.

Embedded

B.

Flexible

C.

Measures

D.

Rigid

E.

Independent responsibility

F.

Sustainable

Full Access
Question # 116

The four A’s in security processes include:

A.

Audit

B.

Authentication

C.

Access

D.

Authorization

E.

Aliment

F.

Applicable

Full Access
Question # 117

How can the Data Governance process in an organisation best support the requirements of various Regulatory reporting needs?

A.

By creating a map of where the enterprise data is located in IT systems.

B.

By providing a Business Glossary based look up facility for data definitions.

C.

By ensuring that data is properly categorized, owned, understood, defined, documented and controlled

D.

By highlighting the challenges of multiple data definitions within the enterprise

E.

By performing an as-is data audit

Full Access
Question # 118

Business Intelligence, among other things, refer to the technology that supports this kind of analysis.

A.

FALSE

B.

TRUE

Full Access
Question # 119

Communications are essential to the success of a DMM or Data Governance assessment. Communications are important because:

A.

Communications can influence the socialization and acceptance of the results and implementation of a data management or Data Governance program

B.

Many organizations will overlook the communications aspect of a data management or Data Governance assessment

C.

Findings may affect stakeholder's positions and roles

D.

Each organization will approach data management and Data Governance communications differently

E.

Data management and Data Governance communications are different from each other

Full Access
Question # 120

When presenting a case for an organization wide Data Governance program to your Senior Executive Board, which of these potential benefits would be of LEAST importance?

A.

Better corporate compliance with legal and regulatory demands, especially in relation to data protection, security and privacy

B.

Lower operational costs resulting from better data quality and a reduced need for cost of failure and rework activities

C.

The current corporate information policy states that company data must be managed and effectively governed

D.

Enhanced customer perceptions of your company's brand and enhanced customer acquisition, retention and loyalty

E.

New sales and revenue opportunities that better managed data will enable

Full Access
Question # 121

The best preventative action to prevent poor quality data from entering an organisation include:

A.

Institute a formal change control

B.

Define and enforce rules

C.

Implement data governance and stewardship

D.

None of the above

E.

Train data procedures

F.

Establish data entry controls

Full Access
Question # 122

Some document management systems have a module that may support different types of workflows such as:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Full Access
Question # 123

The Data Governance Council (DGC) manages data governance initiatives, issues, and escalations.

A.

TRUE

B.

FALSE

Full Access
Question # 124

Primary deliverables of the Data Warehouse and Business Intelligence context diagram include:

A.

Data Products

B.

Data Stewardship

C.

Governance Activities

D.

Release Plan

E.

Load Tuning Activities

F.

BI Activity Monitoring

Full Access
Question # 125

Input in the Big Data and data science context diagram include:

A.

IT standards

B.

Data sources

C.

Business strategy & goals

D.

Database standards

Full Access
Question # 126

Data quality rules and standards are a critical form of Metadata. Ti be effective they need to be managed as Metadata. Rules include:

A.

None of the above

B.

Tied to business impact

C.

Document consistency

D.

Accessible to all data customers

E.

Hierarchical consistency

F.

Confirmed by SMEs

Full Access
Question # 127

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

A.

TRUE

B.

FALSE

Full Access
Question # 128

What is one of the most important things about collecting data?

A.

To share the data across the organization

B.

To keep data away from the public

C.

To resolve many-to-many relationships

D.

To collect as much data as possible into the data repository

E.

To keep data for each department separate because no one needs all the data

Full Access
Question # 129

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Full Access
Question # 130

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:

A.

Regulatory compliance

B.

Data quality improvements

C.

Metadata management

D.

Efficiency in development projects

E.

Vendor management

F.

All of the above

Full Access
Question # 131

The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:

A.

What -> The inventory Column

B.

What -> The entity column

C.

When -> The timing column

D.

Why -> The motivation column

E.

Who -> The responsibility column

F.

How -> The process column

Full Access
Question # 132

Sample value metrics for a data governance program include:

A.

Reduction of risk

B.

Improved efficiency in operations

C.

Effectiveness of education

D.

Achievements of goals and objectives

E.

Contributions to business objectives

F.

Effectiveness of communication

Full Access
Question # 133

A goal of a Reference and Master Data Management program include enabling master and reference data to be shared across enterprise functions and applications.

A.

FALSE

B.

TRUE

Full Access
Question # 134

When trying to integrate a large number of systems, the integration complexities can

be reduced by:

A.

The use of 5QL

B.

Clear business specification and priorities

C.

The use of a common data model

D.

Tackling the largest systems first

E.

Using data quality measures and targets.

Full Access
Question # 135

Please select the user that best describes the following description: Uses the business glossary to make architecture, systems design, and development decisions, and to conduct the impact analysis.

A.

Business user

B.

Technical user

C.

Analytical user

D.

None of the above

E.

Advanced user

Full Access
Question # 136

The neutral zone is one of the phases in the Bridges’ transition phases.

A.

TRUE

B.

FALSE

Full Access
Question # 137

Which Data Architecture artefact contains the names of key business entities, their

relationships, critical guiding business rules and critical attributes?

A.

Enterprise Data Standards

B.

Enterprise Business Glossary

C.

Enterprise Semantic Model

D.

Enterprise Data Model

E.

Enterprise Data Flows

Full Access
Question # 138

ECM is an abbreviation for:

A.

Enterprise compliance management

B.

Enterprise compliance manager

C.

Enterprise component management

D.

Enterprise content management

Full Access
Question # 139

Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.

A.

TRUE

B.

FALSE

Full Access
Question # 140

The purpose of data governance is to ensure that data is managed properly, according to policies and best practices. Data governance is focused on how decisions are made about data and how people and processes are expected to behave in relation to data.

A.

TRUE

B.

FALSE

Full Access
Question # 141

An input in the Metadata management context diagram does not include:

A.

Business requirements

B.

Business metadata

C.

Technical metadata

D.

Metadata standards

E.

Process Metadata

Full Access
Question # 142

Effectiveness metrics for a data governance programme includes: achievement of goals and objectives; extend stewards are using the relevant tools; effectiveness of communication; and effectiveness of education.

A.

FALSE

B.

RRUE

Full Access
Question # 143

Please select the incorrect item that does not represent a dimension in the Data Values category in Data Quality for the Information age.

A.

Currency

B.

Timeliness

C.

Consistency

D.

Completeness

Full Access
Question # 144

A Global ID is the MDM solution-assigned and maintained unique identifier attached to reconciled records.

A.

TRUE

B.

FALSE

Full Access
Question # 145

Poorly managed metadata leads to:

A.

Row-orientated metadata

B.

Graph metadata issues

C.

Redundant data and data management processes

D.

Doubt about the reliability of metadata and data

E.

Redundant master data

F.

Document inefficiencies

Full Access
Question # 146

The biggest business driver for developing organizational capabilities around Big Data and Data Science is the desire to find and act on business opportunities that may be discovered through data sets generated through a diversified range of processes.

A.

TRUE

B.

FALSE

Full Access
Question # 147

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:

A.

Specific risk management

B.

General risk management

C.

Data ethics

D.

Data security

E.

Publicity

F.

Privacy

Full Access
Question # 148

Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?

A.

Data Security

B.

Record Retention Department

C.

Data Owners

D.

Regulations/Laws

E.

Business Analysts

Full Access
Question # 149

Examples of interaction models include:

A.

Hub-and-spoke

B.

Publish - subscribe

C.

Point-to-point

D.

Wheel-and-spike

Full Access
Question # 150

One common KPI of e-discovery is cost reduction.

A.

FALSE

B.

TRUE

Full Access
Question # 151

What areas should you consider when constructing an organization's Data Governance operating model?

A.

Cultural factors. Governance strategy will need to advocate for an operating model that fits with organizational culture, while still progressing change

B.

What is their Business Model (decentralized vs. centralized, local vs. international, etc.)

C.

Impact of regulation. Highly regulated organizations will have a different mindset and operating model of Data Governance than those less regulated

D.

All of these

E.

Value of the data to the organization. Is their Data a crucial commodity (do they sell the data)

Full Access
Question # 152

Snowflaking is the term given to normalizing the flat, single-table, dimensional structure in a star schema into the respective component hierarchical or network structures.

A.

TRUE

B.

FALSE

Full Access
Question # 153

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

A.

TRUE

B.

FALSE

Full Access
Question # 154

Issue management is the process for identifying, quantifying, prioritizing, and resolving Data Governance issues. Which of the following are areas where that issues might arise:

A.

Contract negotiations regarding data sharing & resolution of data quality issues

B.

Documenting accounting procedures

C.

Documenting physical assets

D.

Authority and decision rights Change management escalations Meeting Compliance requirements

E.

Conformance issues related to policies, standards and principles

Full Access
Question # 155

Master data management includes several basic steps, which include: Develop rules for accurately matching and merging entity instances.

A.

TRUE

B.

FALSE

Full Access
Question # 156

A goal of Data warehouse and business intelligence is to support and enable ineffective business analysis and decision making by knowledge workers.

A.

TRUE

B.

FALSE

Full Access
Question # 157

Data management organizational constructs include the following type of model.

A.

Network operating model

B.

Decentralized operating model

C.

Centralized operating model

D.

Federation operating model

E.

Hybrid operating model

F.

Integrated operating model

Full Access
Question # 158

Data Stewards are most likely to be responsible for:

A.

Data Modelling and Data Security

B.

Data Integration and Interoperability

C.

Data Storage and Operations

D.

Content and Document Management

E.

Data Governance and Data Quality

Full Access
Question # 159

Differentiating between data and information. Please select the correct answers based on the sentence below: Here is a marketing report for the last month [1]. It is based on data from our data warehouse[2]. Next month these results [3] will be used to generate our month-over-month performance measure [4].

A.

[1] Information, [2] Information, [3] Data, [4] Information

B.

[1] Data, [2] Information, [3] Data, [4] Data

C.

[1] Data, [2] Data, [3] Data, [4] Information

D.

[1] Information, [2] Data, [3] Data, [4] Information

Full Access
Question # 160

Business glossary is not merely a list of terms. Each term will be associated with other valuable metadata such as synonyms, metrics, lineage, or:

A.

Sanctioned rules

B.

Archive Rules

C.

Business Rules

D.

Database Type

E.

Data Length

Full Access
Question # 161

The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.

A.

FALSE

B.

TRUE

Full Access
Question # 162

Business people must be fully engaged in order to realize benefits from the advanced analytics.

A.

TRUE

B.

FALSE

Full Access
Question # 163

The goals of Data Integration and Interoperability include:

A.

Provide data securely, with regulatory compliance, in the format and timeframe needed.

B.

Lower cost and complexity of managing solutions by developing shared models and interfaces.

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Identify meaningful events and automatically trigger alerts and actions.

F.

Support business intelligence, analytics, master data management and operational efficiency efforts.

Full Access
Question # 164

SOA stands for:

A.

Service orchestrated architecture

B.

Service orientated access

C.

Service orientated architecture

D.

Service overall architecture

Full Access
Question # 165

Real-time data integration is usually triggered by batch processing, such as historic data.

A.

TRUE

B.

FALSE

Full Access
Question # 166

Top down' and "bottom up' data analysis and profiling is best done in concert

because:

A.

It gets everyone involved

B.

It balances business relevance and the actual state of the data

C.

Data quality tools are more productive when they are effectively configured

D.

It gives something for the architects to do while the profilers get on with thework

E.

It allows the profiler to show the business the true state of the data

Full Access
Question # 167

An enterprise's organisation chart has multiple levels, each with a single reporting

line. This is an example of a:

A.

Ecological taxonomy

B.

Hierarchical taxonomy

C.

Flat taxonomy

D.

Compound taxonomy

E.

Hybrid taxonomy

Full Access
Question # 168

Deliverables in the data quality context diagram include:

A.

DQM Procedures

B.

Data architecture

C.

Data governance

D.

DQ Policies and guidelines

E.

Analyses from data profiling

F.

Data quality Service Level Agreements

Full Access
Question # 169

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

A.

All of the above

B.

Streaming

C.

Messaging

D.

Technology

E.

Data

F.

Trickle Feeds

Full Access
Question # 170

Data can be assessed based on whether it is required by:

A.

Regulatory reporting

B.

Capturing policy

C.

Ongoing operations

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Business policy

F.

Make the integration between data management and data analytics possible

Full Access
Question # 171

JSON is an open, lightweight standard format for data interchange.

A.

FALSE

B.

TRUE

Full Access
Question # 172

Data modeller: responsible for fata model version control an change control

A.

TRUE

B.

FALSE

Full Access
Question # 173

Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.

A.

TRUE

B.

FALSE

Full Access
Question # 174

Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?

A.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

B.

Alignment of Business and IT strategies, definition of data standards, implementation of Data Governance and metadata software tools

C.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

D.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

E.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

Full Access
Question # 175

High quality data definition exhibit three characteristics:

A.

Clearness

B.

Clarity

C.

Accuracy

D.

Completeness

Full Access
Question # 176

Examples of the ‘What’ entity category include the following nouns:

A.

Product

B.

Service

C.

Time

D.

Sales amount

E.

Payment quantity

F.

All of the above

Full Access
Question # 177

Field overloading: Unnecessary data duplication is often a result of poor data management.

A.

TRUE

B.

FALSE

Full Access
Question # 178

What is the main purpose of developing a Data Architecture Roadmap?

A.

To help forward-looking decision making

B.

To help the management of the organization to see the trade-offs

C.

To manage the data dependencies that require active management

D.

To formulate a plan to address architectural problems in the business

E.

To ensure that projects are aligned with business needs and opportunities

Full Access
Question # 179

Barriers to effective management of data quality include:

A.

Inappropriate or ineffective instruments to measure value

B.

Lack of awareness on the part of leadership and staff

C.

Lack of leadership and management

D.

Lack of business governance

E.

None of the above

F.

Difficulty in justification of improvements

Full Access
Question # 180

Technical metadata describes details of the processing and accessing of data.

A.

FALSE

B.

TRUE

Full Access
Question # 181

The loading of country codes into a CRM is a classic:

A.

Reference data integration

B.

Fact data integration

C.

Master data integration

D.

Analytics data integration

E.

Transaction data integration

Full Access
Question # 182

Metadata is essential to the management of unstructured data as it id to the management of structured data.

A.

TRUE

B.

FALSE

Full Access
Question # 183

The advantage of a decentralized data governance model over a centralized model is:

A.

The common metadata repository configurations

B.

Having a common approach to resolving data governance issues

C.

The easier implementation of industry data models

D.

An increased level of ownership from local decision making groups

E.

The cheaper execution of data governance operations

Full Access
Question # 184

When doing reference data management, there many organizations that have standardized data sets that are incredibly valuable and should be subscribed to. Which of these organizations would be least useful?

A.

The company registration organization

B.

Wikipedia

C.

ISO

D.

IEEE

E.

The national post office

Full Access
Question # 185

For each subject area logical model: Decrease detail by adding attributes and less-significant entities and relationships.

A.

TRUE

B.

FALSE

Full Access
Question # 186

The creation of overly complex enterprise integration over time is often a symptom

of:

A.

Multiple data warehouses

B.

Multiple integration technologies

C.

Multiple metadata tags

D.

Multiple application coding languages

E.

Multiple data owners

Full Access
Question # 187

When it comes to Data Governance, what does the Operations Plan include?

A.

The list of events required to implement and operate Data Governance activities

B.

A risk assessment for the enterprise

C.

The types of enterprise operations that need Data Governance

D.

The metrics needed for each department within the organization

E.

The list of activities the Data Stewards will follow to define the data

Full Access
Question # 188

The goals of data storage and operations include:

A.

Managing performance of data assets

B.

Capture and document explicit knowledge about an organization’s data and systems

C.

Managing the availability of data throughout the data lifecycle

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Managing the performance of data transactions

F.

Make the integration between data management and data analytics possible

Full Access
Question # 189

A change management program supporting formal data governance should focus communication on:

Obtaining buy-in from all stakeholders

A.

Implementing data management training

B.

Monitoring the resistance

C.

Promoting the value of data assets

D.

Addressing all queries

E.

Implementing new metric and KPIs

Full Access
Question # 190

Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as

A.

TRUE

B.

FALSE

Full Access
Question # 191

The placement of Data Governance is most effective when:

A.

It is defined by Compliance because most of what is governed is driven by regulatory and compliance issues

B.

The Database Administrators incorporate Data Governance in their database design

C.

It has a Data Governance manager and some data stewards

D.

Defined at the department level at which is most important

E.

When it is at the enterprise level so it can support all other data management initiatives that cross functional boundaries

Full Access
Question # 192

It is unwise to implement data quality checks to ensure that the copies of the attributes are correctly stored.

A.

FALSE

B.

TRUE

Full Access
Question # 193

In gathering requirements for DW/BI projects, begin with the data goals and strategies first.

A.

TRUE

B.

FALSE

Full Access
Question # 194

Enterprise data architecture usually include the following work streams:

A.

Strategy

B.

Governance

C.

Organization

D.

Results

E.

Working methods

F.

All of the above

Full Access
Question # 195

Which of the following is NOT a responsibility of a Data Steward?

A.

Data Standards

B.

Operational Data Activities

C.

Data Quality

D.

Performance Tuning

E.

Metadata Management

Full Access
Question # 196

Type of Reference Data Changes include:

A.

Row level changes to internal Reference Data sets

B.

Row level changes to external Reference Data sets

C.

Creation of new Reference Data sets

D.

Business model changes on column level

E.

Structural changes to external Reference Data sets

F.

None of the above

Full Access
Question # 197

Bold means doing something that might cause short term pain, not just something that looks good in a marketing email.

A.

TRUE

B.

FALSE

Full Access
Question # 198

A "Data Governance strategy" usually includes the following deliverables:

A.

A Statement of Intent, a Decision Framework, an Implementation Roadmap, and a Governance Toolkit

B.

A Charter, a Data Architecture, a Program Data Model, and a Plan for Operational Success

C.

A Program Plan, a Resource Plan, an Implementation Plan, and a Test Plan

D.

A Charter, an Operating Framework, an Implementation Roadmap, and a Plan for Operational Success

E.

A Charter, a Security Strategy, a Solution Roadmap, and a User Experience Plan

Full Access
Question # 199

Data science merges data mining, statistical analysis, and machine learning with the integration and data modelling capabilities, to build predictive models that explore data content patterns.

A.

FALSE

B.

TRUE

Full Access