0% found this document useful (0 votes)
33 views89 pages

QUIZ Merged Merged

The document outlines key concepts and responsibilities related to Data Governance, Data Quality Management, and Metadata Management. It emphasizes the importance of roles such as data stewards and the Data Governance Council, as well as the need for compliance with regulations and effective data management practices. Additionally, it discusses the significance of data security, document management, and the relationship between various data types and models.

Uploaded by

mekij
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views89 pages

QUIZ Merged Merged

The document outlines key concepts and responsibilities related to Data Governance, Data Quality Management, and Metadata Management. It emphasizes the importance of roles such as data stewards and the Data Governance Council, as well as the need for compliance with regulations and effective data management practices. Additionally, it discusses the significance of data security, document management, and the relationship between various data types and models.

Uploaded by

mekij
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

1.

Who is most responsible for communicating and promoting awareness on the value
of Data Governance in the organization?

Everyone in the Data Management Community

2. Which of these is NOT a standard motivation for Data Governance?

Devolved governance

3. When new governmental and industry regulations are formulated and enacted,
Data Governance plays a key role in the process of identifying the data and
information components for compliance. What do you see as their most important
role in any regulatory compliance project?

Working with business and technical leadership to find the best answers to a standard
set of regulatory compliance questions (How, Why, When, etc)

4. What are the primary responsibilities of a data steward?

A business role appointed to take responsibility for the quality and use of their
organization's data assets

5. Which of these does NOT characterize an effective data steward?

Is a highly experienced technical expert in a variety of data management disciplines &


tools

6. The needs of data protection require us to ensure that:

Data is processed only in ways compatible with the intended and communicated use it
was collected for, and respects the consent of the data subject

7. Which statement best describes the relationship between documents and records?

Records are a sub-set of documents

8. Which of the following are primary deliverables of proper document and record
management?

Managed records in many media formats, e-discovery records, policies and procedures,
contracts and financial documents

9. In 2009, ARMA International published GARP for managing records and information.
GARP stands for:

Generally Acceptable Recordkeeping Principles


10. A goal of 'Document and Content Management' is to ensure effective and efficient
retrieval and use of:

Data and information in unstructured formats

11. All of the following are TRUE statements on relationship types except:

A one-to-many relationship says that a child entity may have one or more parent entities

12. Identify who has primary responsibility for data capture and usage design within
programs.

Software Architects, Developers

13. Components of logical data models include:

All of the above

14. What is the difference between cardinality rules and data integrity rules?

Cardinality rules define the quantity of each entity instance that can participate in a
relationship between two entities, and referential integrity rules ensure valid values

15. In the conceptual data model an instantiation of a particular business entity is


described as:

Entity occurrence

16. A data quality program should limit its scope to:

The data most critical to the enterprise and its customers

17. The Data Quality Management cycle has four stages. Three are Plan, Monitor and
Act. What is the fourth stage?

Deploy

18. Which of these is NOT an expected role of a Data Quality Oversight Board?

Data profiling & analysis

19. Which of these is a key process in defining data quality business rules?

Separating data that does not meet business needs from data that does

20. Which of these statements is true?

Data Quality Management is a continuous process


21. Which of these are characteristics of an effective data security policy?

The defined procedures ensure that the right people can use and update data in the
right way, and that all inappropriate access and update is restricted

22. What is the role of the Data Governance Council in defining an Information
Security policy?

The Data Governance Council should review and approve the high level Data Security
Policy

23. Apart from security requirements internal to the organization, what other strategic
goals should a Data Security Management system address?

Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders

24. A RACI matrix is a useful tool to support the ______ in an outsourced arrangement.

Segregation of duties

25. How does Data Security contribute to competitive advantage?

Data Security helps to protect proprietary information and intellectual property, as well
as customer and partner information

26. When performing an evaluation of analytic applications, which of the following


questions is least relevant to identify the level of effort needed?

Annual costs such as license, maintenance, etc.

27. A data lineage tool enables a user to:

Track the data from source system to a target database; understanding its
transformations

28. Slice, Dice, Roll-up and Pivot are terms used in what kind of data processing?

OLAP

29. You need to discover possible relationships or to show data patterns in an


exploratory fashion when you do not necessarily have a specific question to ask. What
kind of data tool would you use to identify patterns of data using various algorithms?

Data Mining
30. Critical to the success of the data warehouse is the ability to explain the data. The
DMBoK knowledge area that practices these techniques is:

Metadata Management

31. Which of the following statements regarding a value domain is FALSE?

Value domains are defined by external standard organizations

32. Which of these is a valid definition of Master Data?

Data about the business entities that provide context for business transactions

33. Reference Data:

Usually has fewer attributes than Master Data

34. A type of Master data architecture is:

All of the above

35. Which of these is a valid definition of Reference Data?

Data used to classify or categorize other data

36. The MetaData repository enables us to establish multiple perspectives of data.


These are:

Business and Technical Perspective

37. The role of the Conceptual data model in the Metadata repository is:

To summarize the key data subject areas for a business area at a high level of
abstraction to enable the major data concepts to be understood

38. Metadata repository processes will not include:

Selecting Data Management Library software, search, and storage technologies

39. A business perspective product in the MetaData repository is:

Data Glossary

40. The number of artifacts that must be searched in the Metadata repository for all
Business change projects are:

There is no mandatory number of artefacts to be searched but it is highly recommended


that the library is examined
41. In the Information Management Lifecycle, the Data Governance Activity 'Define
the Data Governance Framework' is considered in which Lifecycle stage?

Plan

42. How do data management professionals maintain commitment of key


stakeholders to the data management initiative?

Continuous communication education and promotion of the importance and value of of


data and information assets

43. Data Governance touch points throughout the project lifecycle are facilitated by
this organization

The Data Governance Office

44. What Organization Structure should set the overall direction for Data Governance?

Data Governance Council

45. Non value-added information is often not removed because:

The policies are unclear of what is defined as non-value-added, storage is cheap so there
is no cost driver, and it takes more effort to dispose than to keep

46. An umbrella term for any classification or controlled vocabulary is:

Taxonomy

47. What are relationship labels?

The verb phrases describing the business rules in each direction between two entities

48. The highest level of these data model types is the:

Conceptual model

49. Dimension tables:

Have many columns but few rows

50. A Data Quality dimension is:

A measurable feature or characteristic of data


51. Which of the following is NOT a stage in the Shewhart / Deming Cycle that drives
the data quality improvement lifecycle?

Investigate

52. A data quality program should limit its scope to:

The data most critical to the enterprise and its customers

53. A Data Quality Service Level Agreement (SLA) would normally include which of
these?

Respective roles & responsibilities for data quality

54. When outsourcing information management functions, organizations can:

Transfer control but not accountability

55. Which of these are increasingly driving legislation for information security and data
privacy?

A recognition of Ethical issues in information management

56. Definition of Data Security Policies should be:

A collaborative effort between Business and IT

57. Apart from security requirements internal to the organization, what other strategic
goals should a Data Security Management system address?

Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders

58. One of the key differences between operational systems and data warehouses is:

Operational systems focus on current data; data warehouses contain historical data

59. Which of the following is not a good example of BI?

Statutory reporting to a Regulatory Body

60. Critical to the incremental development of the data warehouse is:

A strong release management process


61. Which approach is considered most effective when supporting multidimensional
business report requests?

OLAP

62. Master data differs from Reference data in the following way:

Unlike Reference data, Master data is not usually limited to predefined domain values

63. Reference data:

Is used to categorize and classify other data

64. What is a common motivation for Reference and Master Data Management?

The need to improve data quality and data integrity across multiple data sources

65. Which one of the following statements is true?

Master Data Management requires techniques for splitting or merging an instance of a


business entity

66. A type of Master data architecture is:

All of the above

67. The library of information about our data (our metadata) is built so that:

All of these

68. The role of the Physical data model in the Metadata repository is:

To describe how and where our data is stored in our systems applications or packages

69. According to the DAMA DMBoK, the Data Governance Council (DGC) is the highest
authority organization for data governance in an organization. Who should typically
chair this Council?

Chief Data Steward (Business) / Chief Data Officer

70. Which of the following is not a step in the 'document and content management
lifecycle'?

Create a content strategy

71. Complete the following statement. A business rule:

Defines constraints on what can and cannot be done


72. In a non-identifying relationship:

The primary key of the parent entity becomes a foreign key in the child entity

73. In Dimensional data models, which of these is NOT true regarding Measures?

Measures can always be added across all dimensions

74. What is Manual Directed Data Quality Correction?

The use of automated cleanse and correction tools with results manually checked before
committing outputs

75. Which of the following is NOT usually a feature of data quality improvement tools?

Data modelling

76. Which of these is NOT a typical activity in Data Quality Management?

Enterprise Data Modelling

77. Which of the following define the data security touch points in an organization?

Business rules and process workflow

78. Apart from security requirements internal to the organization, what other strategic
goals should a Data Security Management system address?

Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders

79. Plant Equipment is an example of:

Master Data

80. According to the DMBoK, the system that contains the best version of the Master
Data is the:

System of record

81. Reference data:

Is used to categorize and classify other data


82. To which of the following initiatives was the establishment of an industry Meta-
Data Standard essential?

EDI

83. What type of Meta-Data provides developers and administrators with knowledge
and information about systems?

Technical Operational Meta-Data

84. Documents and records should be classified based on the _______ level of
confidentiality for information found in the record

Highest

85. Data quality measurements can be taken at three levels of granularity. They are:

Data element value, data instance or record, and data set

86. Which of the following is the best example of the data quality dimension of
'consistency'?

All the records in the CRM have been accounted for in the data warehouse

87. Which of these statements best defines Data Security Management?

The planning, development, and execution of security policies and procedures to


provide proper authentication, authorization, access, and auditing of data and
information assets

88. A CRUD matrix helps organizations map responsibilities for data changes in the
business process work flow. CRUD stands for

Create, Read, Update, Delete

89. A Data Integration approach that updates a Data Warehouse with small changes
from Operational systems is called:

CDC

90. Which of the following is NOT a primary Master Data Management area of focus?

Producing read only versions of key data items

91. A common driver for initiating a Reference Data Management program is:

It will improve data quality and facilitate analysis across the organization
92. Which of these statements are true about Metadata?

Data models are components of a Metadata repository

93. We would expect to consult the Metadata Library when:

Assessing the impact of change

94. What is the difference between an Industry and a Consensus MetaData Standard?

The terms are used interchangeably to describe the same concept

95. When defining your business continuity plan, which of the following should one
consider doing?

Consider written policies and procedures, impact mitigating measures, required


recovery time and acceptable amount of disruption, the criticality of the documents

96. Which of these describes activities in the document/record management lifecycle?

Identification, management of policies, classification, retention, storage, retrieval and


circulation, preservation and disposal

97. Which of these statements has the most meaningful relationship label?

An order is composed of order lines

98. In a recursive relationship:

The foreign key must have a role name to avoid attribute duplication

99. A comparatively new architectural approach is where volatile data is provisioned in


a data warehouse structure to provide transactional systems with a combination of
historical and near real time data to meet customer needs. This is a definition of:

Active Data Warehousing

100. Master Data Management:

Controls the definition of business entities

101. What would you not expect to find in the MetaData repository?

Data storage devices


102. These are examples of which type of Meta-Data: Data Stores and Data Involved,
Government/ Regulatory Bodies; Roles and Responsibilities; Process Dependencies
and Decomposition?

Process Meta-Data

103. What is the difference between an Industry and a Consensus Meta-Data


Standard?

The terms are used interchangeably to describe the same concept

104. Every enterprise is subject to many governmental and industry regulations, many
of which regulate how data and information is used and managed. Part of the Data
Governance Function is to:

Monitor and ensure that organizations meet any regulatory compliance requirements

105. Which of these is NOT a type of key found in a data model?

Local key

106. Top down' and 'bottom up' data analysis and profiling is best done in concert
because:

It balances business relevance and the actual state of the data

107. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?

Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders

108. One of the difficulties when integrating multiple source systems is:

Determining valid links or equivalences between data elements

109. We do not expect to consult the MetaData repository when:

Updating the operating system that the Master Data management toolset is running on

110. A document management system is an application used to track and store


electronic documents and electronic images of paper documents which provides the
following capabilities:

Storage, versioning, security, meta-data management, indexing and retrieval


111. Which of the following statements about business rules is FALSE?

Data rules cannot be shown on a data model

112. Stakeholders whose concerns must be addressed in data security management


include:

Clients, Patients, Citizens, Suppliers, or Business Partners

113. When outsourcing information management functions, organizations can:

Transfer control but not accountability

114. A strong argument for pursuing a Reference Data and/or Master Data
management initiative is:

By centralizing the management of Reference and Master data, the organization can
conform critical data needed for analysis

115. Which of these are NOT true of Data Governance?

A DG initiative should always be led by the IT department

116. When outsourcing information management functions, organizations can:

Transfer control but not accountability

117. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?

Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders

118. A CRUD matrix helps organizations map responsibilities for data changes in the
business process work flow. CRUD stands for

Create, Read, Update, Delete

119. In its broadest context, the data warehouse includes:

Any data stores or extracts used to support the delivery for BI purposes

120. Reference data:

Is used to categorize and classify other data


121. Which of the following is a Meta-Data scheme focused specifically on documents?

Preservation Meta-Data

122. When outsourcing information management functions, organizations can:

Transfer control but not accountability

123. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?

Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
QUIZ4
pts Question 131
:A 'Data Governance Strategy' usually includes the following deliverables
Group of answer choices

A Program Plan, a Resource Plan, an Implementation Plan, and a Test


Plan

A Charter, an Operating Framework, an Implementation Roadmap, and a


Plan for Operational Success

A Charter, a Data Architecture, a Program Data Model, and a Plan for


Operational Success

A Statement of Intent, a Decision Framework, an Implementation


Roadmap, and a Governance Toolkit

A Charter, a Security Strategy, a Solution Roadmap, and a User


Experience Plan
-———

pts Question 141


The failure to gain acceptance of a business glossary may be due to
:ineffective
Group of answer choices

Metadata Management

Content and Document Management

Business Architecture

Data Security
Data Governance
————

pts Question 201


:Data architecture compliance rate measures
Group of answer choices

How complete an attribute list is in an entity

How closely projects are meeting their timelines

How closely projects comply with established data architectures

How fast the database can retrieve data

How closely projects comply with the development lifecycle


-——————

pts Question 251


:First Normal Form
Group of answer choices

Ensures that each entity has no hidden primary keys

Ensures that each attribute is atomic without repeating groups

Ensures that each attribute has a balanced proportion of neutrons and


protons

Ensures that each attribute has a definition that makes sense

Ensures that the Party Role structure is correctly represented


———

pts Question 341


Database performance depends upon two independent facets. These
:are
Group of answer choices

Distance to data center and network bandwidth


Availability and speed

Number of users and number of tables

Hardware and network

Choice of DBMS and programming language


————

pts Question 511


:Three common interaction models for data integration are
Group of answer choices

Plane to point, harvest and seed, publish and subscribe

Straight copy, curved copy, roundabout copy

Point to point, hub and spoke, publish and subscribe

Point to point, wheel and spoke, public and share

Record and pass, copy and send, read and write


-——————

pts Question 541


:The purpose and rationale for data integration should be defined by
Group of answer choices

The developers

Interoperability requirements

The business

Industry standards

Reporting requirements
-—————
pts Question 751
:A data lineage tool enables a user to
Group of answer choices

Track the historical changes to a data value

Visualize how the data gets to the data lake

Track the data from source system to a target database; understanding


its transformations

Enables rapid development of dashboard reporting

Line up the data to support sophisticated glossary management


——————

pts Question 761


:One of the principles for the implementation of a data warehouse is
Group of answer choices

Think and design globally; design internally and outsource build

Focus on project goals over business goals; design internally and


outsource build

Think and design globally; act and build locally

Think and design incrementally; act and build globally

Maintain original designs; adjust requirements to suit implementation


-————

pts Question 801


:A design approach for managing the risk of errors in data marts is
Group of answer choices

Purge the data in the data warehouse and reload from the source
systems

Purge the data in the data warehouse and copy back to the data mart
Purge the data in the data marts and reload from the data warehouse

Purge the data generally and reload from the best system

Purge the data in the source system and reload the data warehouse
————

pts Question 821


Descriptive metadata describes a resource, enabling its identification
.and retrieval
Group of answer choices

For example, a lump of coal burns about 100 degrees and gives off
carbon dioxide

For example, a document has a number of pages, number of chapters


and word count

For example, a record has version numbers, archive dates and purge
dates

For example, a car has a wheel, an engine and a transmission

For example, a book has author, title and subject associated with it
————

pts Question 851


?How does metadata prevent the use of out-of-date data
Group of answer choices

It constructs views over current data

Associating of event data, such as updated data, with the data

By establishing governance policies on data currency

It sends alerts to users when data becomes stale

By incorporating event data, such as updated data, in the data model


———

pts Question 991


A website that does not ask for agreement on intended data use is
?breaching which principle in the GDPR of the EU
Group of answer choices

Safeguards

Storage Limitations

Accuracy

Accountability

Purpose Limitation
-———

pts Question 971


:One way of defining ethics is
Group of answer choices

Doing it right when someone is looking

Doing it right when no one is looking

Doing it wrong, and then apologizing

Doing it wrong, and then expertly covering it up

Doing it wrong, and failing to covering it up


Quiz 2
Question 31 pts
Which of the following is NOT a goal of data management?
Group of answer choices

Capturing, storing, protecting and ensuring the integrity of data assets

Preventing unauthorized access, manipulation or use of data and information

Ensuring the quality of data and information

Ensuring the privacy and confidentiality of stakeholder data

Understanding the process needs of the enterprise

Q3Question 61 pts
Knowledge area activities are classified into four categories. They are:
Group of answer choices

Procurement, Detailing, Control and Organizing

Preparation, Detailing, Creating and Deployment

Planning, Development, Control and Operations

Planning, Detailing, Control and Organizing

Procurement, Development, Control and Operations

Q3 Question 81 pts
Information governance and data governance should be:
Group of answer choices
Managed as integrated functions, with data governance reporting to information
governance

Managed as separate functions

Managed as integrated functions, with information governance reporting to data


governance

Managed as a single function

Managed by the Chief Information Officer

Question 91 pts
A common driver for data governance is:
Group of answer choices

The appointment of a CDO

Irreconcilable figures in reports

Internal audits

Regulatory compliance

Outsourcing

Question 101 pts


Common understanding of the core business concepts and terminology is the objective
of which deliverable?
Group of answer choices

Data Dictionary

Data Warehouse Architecture

Business Glossary

Security Framework

Metadata Repositories
Question 191 pts
The goal of data architecture is to be:
Group of answer choices

A bridge too far

A bridge between business analysis and data modelling

A bridge between technology strategy and database design

A bridge between business strategy and technology execution

A bridge between business execution and technology strategy

Question 201 pts


The key architecture domains include:
Group of answer choices

Business, data, application and technology architectures

Business, data, infrastructure and technology architectures

Business, strategy, application and technology architectures

Process, database, software and technology architectures

Zachmann, TOGAF, Cobit, and Heath architectures

Question 211 pts


An annual enterprise data architecture report is comprised of a summary of enterprise
data model updates, project compliance and variances, and a measurement of:
Group of answer choices

Data landscape compliance

Data warehouse compliance

Database backup compliance


Reference and master data compliance

Data security compliance

Q3 Question 221 pts


The ability of an organisation to respond to changes in product configuration is easier
due to generalisation in the:
Group of answer choices

Technical architecture

Business architecture

Data architecture

Data warehousing

Data quality

Q3 Question 231 pts


The repeated implementation of different CRM technologies with different data
structures is mostly a failure of:
Group of answer choices

Data security

Data quality

Data warehousing

Data architecture

Data modelling

Q3 Question 241 pts


Over a decade an organisation has rationalised implementation of party concepts from
48 systems to 3. This is a result of good:
Group of answer choices
System rationalization and metadata management

Data quality and data governance

Data operations and system rationalization

Data architecture and data warehousing

Data architecture and data governance

Question 261 pts


Data Models are critical to effective management of data, because they:
Group of answer choices

Control the list of values in dropdown lists in applications

Strategically prepare organisations to quickly evolve their products and services

Determine which style of data schema is used in a data warehouse

Define the rules and approval mechanisms to make changes to the data structures

Provide a common vocabulary around data

Question 321 pts


The purpose for adding redundancy to a data model (denormalisation) is to:
Group of answer choices

Avoid the loss of data by storing key values more than once

Optimize overall database performance across both data access and data update
requests

Fully utilize all the indexes

Make it easier for developers to join tables

Ensure surrogate keys are retaining their unique values in all satellite tables
Q3 Question 341 pts
Database monitoring tools measure key database metrics, such as:
Group of answer choices

Capacity, availability, cache performance, user statistics

Capacity, design, normalization, user access

Create, read, update, delete

Create, read, normalization, user access

Capacity, availability, backup instances, data quality

Question 351 pts


Regulatory data retention requirements drive the need to keep data for set periods for:
Group of answer choices

Alternate backup sources

Customer analytics

Legal obligations

Submitting datasets to regulators

Historical reporting

Question 381 pts


A database whose index is updated with a crawler program is an example of:
Group of answer choices

Database technology called TRIP

Database technology called BASE

Database technology called NoSQL


Database technology called ACID

Database technology called SQL

Q3 Question 401 pts


Periodic archiving of transaction data from a production CRM system is critical for:
Group of answer choices

Training junior DBAs

Providing alternate sources for reporting systems

Enabling the distribution of transaction data across the enterprise

The maintenance of database performance

Managing deleted customer records

Question 411 pts


Information security begins by classifying an organisation's data in order to:
Group of answer choices

Identify which systems need better reporting

Identify which data needs protection

Identify the metadata classification values

Identify which subject area the data belongs in

Identify which departments need more data

Question 421 pts


A weakness or defect in a system that allows it to be successfully attacked and
compromised is a:
Group of answer choices

Chasm
Vulnerability

Risk

Feature

Threat

Q3 Question 431 pts


HTTPS:// indicates that the website is:
Group of answer choices

Equipped with a content management system

Equipped with 3rd party cookies

Equipped with a foreign language translator

Equipped with an underlying database

Equipped with a security layer

Q3 Question 441 pts


Primary drivers of data security activities are:
Group of answer choices

Risk reduction and business growth

Risk control and content management

Glossary management and risk reduction

Data quality and intellectual property protection

Data protection and flexible database design

Question 451 pts


A staff member has been detected inappropriately accessing client records from usage
logs. The security mechanism being used is an:
Group of answer choices

Authorisation

Authentication

Audit

Entitlement

Access

Question 501 pts


A document that stipulates the responsibilities and acceptable use of data to be
exchanged is a:
Group of answer choices

Data sharing agreement

Data model

Project charter

Interface contract

Data quality assessment

Q3 Question 521 pts


The need to manage data movement efficiently is a primary driver for:
Group of answer choices

Document and Content Management

Data Integration and Interoperability

Data Warehousing and Business Intelligence

Data Security

Data Storage and Operations


Question 541 pts
If two data stores are able to be inconsistent during normal operations, then the
integration approach is:
Group of answer choices

Synchronous

Uncontrolled

Streaming

Faulty

Asynchronous

Question 581 pts


An umbrella term for any classification or controlled vocabulary is:
Group of answer choices

English

Metadata

Data model

Dictionary

Taxonomy

Q3 Question 591 pts


Which of the following is a reason why organisations do not dispose of non-value-
adding information?
Group of answer choices

Storage is cheap and easily expanded


The organisation's data quality benchmark diminishes

The information is never out of date

The metadata repository can not be updated

Data modelling the content is hard to reproduce

Question 601 pts


Which statement best describes the relationship between documents and records?
Group of answer choices

Documents are a sub-set of records

Documents and records are the same thing

Records are a sub-set of documents

Documents are written and records are audio

Documents and records are not related

Question 611 pts


Sentiment analysis of call centre voice files is performed by text analysis and stored in a
relational database. Which of the following is true?
Group of answer choices

They are both unstructured data

The voice files are unstructured data and the sentiment analysis is structured data

The voice files are structured data and the sentiment analysis is unstructured data

They are both structured data

Structured and unstructured data are the same thing

Q3 Question 631 pts


The metadata structure for a content management system can be represented with a:
Group of answer choices

Authorization matrix

CRUD matrix

Mind map

Data model

Process model

Question 641 pts


A workforce is locked out of a building due to a threat to personnel. The BCP is stored
in the DMS. Luckily:
Group of answer choices

The workforce are expendable

The metadata repository holds the BCP

The security policy includes such a scenario

The data warehouse catalog is fully operational

The document is printed and stored off site

Q3 Question 651 pts


When assessing tools to implement master data management solutions, functionality
must include:
Group of answer choices

Advanced analytics capabilities

Backup and recovery utilities

Document and content management

Sophisticated integration capability

Auto-normalization features
Question 661 pts
The process of identifying how different records may relate to a single entity is called:
Group of answer choices

Matching

Mangling

Meshing

Mirroring

Munging

Q3 Question 701 pts


When trying to integrate a large number of systems, the integration complexities can be
reduced by:
Group of answer choices

The use of a common data model

Using data quality measures and targets.

Tackling the largest systems first

Clear business specification and priorities

The use of SQL

Question 711 pts


By comparing the system of record and systems of reference to each other, it is
possible to:
Group of answer choices

Validate the accuracy of the master data

Update the core reference values


Validate the consistency of the master data

Validate the completeness of the master data

Construct time variant sequences

Q3 Question 721 pts


All the systems in the enterprise, apart from a website, are showing updated pricing
information. This may be due to:
Group of answer choices

The website software not integrating with the reference data repository

The website software is not using standard XML schemas

The slowly changing dimension has both from and to dates

The pricing information is not updated in the reference data repository

The reference data strategy has not been approved by the executive

Question 741 pts


In its broadest context, the data warehouse includes:
Group of answer choices

An integrated data store, ETL logic, and extensive data cleansing routines

All the data in the enterprise

Data stores and extracts that can be transformed into star schemas

Either an Inmon or Kimball approach

Any data stores or extracts used to support the delivery for BI purposes

Question 761 pts


One of the key differences between operational systems and data warehouses is:
Group of answer choices

Operational systems focus on data quality; data warehouses focus on data security

Operational systems focus on current data; data warehouses contain historical data

Operational systems focus on historical data; data warehouses contain current data

Operational systems are available 24x7; data warehouses are available during business
hours

Operational systems focus on business processes; data warehouses focus on business


strategies

Question 771 pts


In order to speed up data warehouse development, the data vault approach focuses on
the management of:
Group of answer choices

Current data over historical data

Each data element in the source systems

Surrogate keys from operational systems

Alignment of the data dictionaries

Unique identifiers of enterprise concepts

Q3 Question 781 pts


The key concepts of the data vault are:
Group of answer choices

Keys, locks and combinations

Hubs, links and satellites

Facts, dimensions and time

Facts, links and satellites


Hubs, links and planets

Question 801 pts


The uncontrolled duplication of dimensions in a Kimball data warehouse is best
controlled by:
Group of answer choices

Establishing approval processes after user testing and before implementation

Adapting the data architecture techniques supporting an Inmon style

Increased reference data management in source systems

Replacing the data modelling team

Establishing approval processes during requirements and design

Question 811 pts


Well executed metadata management enables:
Group of answer choices

A consistent design for dimensional reporting

A consistent authorization framework

A consistent understanding of data resources

A consistent understanding of database design

A consistent approach to data modelling

Question 841 pts


Where is the best place to find the following metadata: database table names, column
names and indexes?
Group of answer choices

Security access authorisation

Detailed business processes


Enterprise data model

Logical data model

Database catalogue

Q3 Question 861 pts


A complexity in documenting data lineage is:
Group of answer choices

Establishing data quality metrics

Conflicting application requirements from data owners

Choosing which content management software to use

Different data element names and formats

Identifying source databases

Question 931 pts


When a data quality team has more issues than they can manage, they should look to:
Group of answer choices

Establish a program of quick wins targeting easy fixes over a short time period

Hire more people

Delete any issue that is greater than 6 months old

Implement data validation rules on data entry systems

Initiate data quality improvement cycles, focusing on achieving incremental


improvements

Question 961 pts


Which DMBoK knowledge area is most likely responsible for a high percentage of
returned mail?
Group of answer choices

Data Integration and Interoperability

Reference and Master Data

Data Quality

Data Warehousing and Business Intelligence

Metadata Management

Question 971 pts


A 'Data Lake' is an environment where a vast amount of data can be:
Group of answer choices

Digested, processed, deleted and visualized

Ingested, screened, obfuscated and purged

Updated, obfuscated, nullified and cleansed

Ingested, shared, assessed and analysed

Purged, sorted, split and scanned

Question 981 pts


A 'Data Swamp' is a data lake that has become:
Group of answer choices

Modeled, managed and muddy

Messy, unclean and inconsistent

A data asset that uses machine learning

Overly cataloged, holding information and data

Suitable for frogs, toads and salamanders


Q3 Question 991 pts
An organisation that parses its call centre audio files to assess the emotional state of its
callers is using:
Group of answer choices

Predictive analytics

Reactive analytics

Overly invasive monitoring analysis

Sentiment analysis

Voice recognition techniques

QUIZ 3
A document that describes how data will be made more accessible over 3-5 years
is called:
Group of answer choices

A data management strategy


Data quality metrics
A data collection standard
An analytics strategy
A data warehouse design
——————————-
Data governance represents:
Group of answer choices
A federated government style of data management

A joint effort in defining the data quality rules and profiling the data
An inherent separation of duty between oversight and execution
An organisation structure with a number of key roles
An initiative that addresses the financial accuracy of the balance sheet
——————————

Question 121 pts


The goal of data governance is to enable an organisation to manage data as an
asset. To achieve this, the DG programs must be:
Group of answer choices

Fixed to achieve a successful outcome in a defined time period

Represented by finance during the process for acquiring and disposing of the data
asset

Able to assign a dollar value to a data asset in order to determine the appropriate
cost-to-investment ratio for budgeting purposes

Sustainable, to be created as an ongoing practice with leadership, sponsorship


and ownership

Able to register the data asset with the financial controller to ensure it is
managed like all other assets
——————

Question 141 pts


Data Stewards are most likely to be responsible for:
Group of answer choices

Data Integration and Interoperability

Data Modelling and Data Security

Data Governance and Data Quality

Content and Document Management

Data Storage and Operations


——————-

Question 171 pts


An enterprise data model would be composed of:
Group of answer choices

Enterprise models, data models and compositional models

Logical models, physical models and infrastructure models


Conceptual models, logical models and physical models

Conceptual models, subject area models and logical models

Conceptual models, star schema models and interface models


——————

The necessity of representing organisational data at different levels of abstraction


is:
Group of answer choices

Because most database administrators need specifications to build databases


with appropriate response times

Because most organisations have more data than individual people can
comprehend, understand and make decisions about

Because most Chief Data Officers do not have the technical background to be held
accountable for complex data diagrams

Because most organisations need to accommodate to the different points of view


of information architecture and data architecture

Because most architects want to deploy a complete suite of drawings for project
deliverables
————-

Question 261 pts


Which of the following is not a type of data that is commonly modelled?
Group of answer choices

Business Event information

Detail transaction information

Category information

Historical information

Resource information
————-

A data model that consists of a single fact table linked to important concepts of
the business is a:
Group of answer choices

Transition State Model

Process Model
Relational Model

Machine Learning Model

Dimensional Model

————-

Question 281 pts


A data model:
Group of answer choices

Must exist in a data modelling tool

Documents a concise definition of data structures and relationships

Governs the implementation of the 'order to pay' business process lifecycle

Records recent user access to enable the assessment of security anomalies

Documents how data is passed between systems


————-
Question 291 pts
A relationship that allows an address to be used by multiple people, and each
person can have multiple addresses, can be resolved:
Group of answer choices

By changing the role names of the foreign keys on Person and Address to ensure
referential integrity

With an associative entity called Person Address Usage and two, 'one to many'
relationships

By changing the primary keys on Person and Address to ensure referential


integrity

With an additional relationship describing the address usage

With a partnership entity called Person Address Usage and two, 'one to many'
relationships

——————

Question 311 pts


A project scope includes the collection, exchange and reporting of data from
multiple systems. Conceptual, logical and physical data models are maintained.
How many models of each type can be expected?
Group of answer choices
The same number of each of the model types

More physical data models than logical data models, and more logical data
models than conceptual data models

More conceptual data models than logical data models, and more logical data
models than physical data models

More logical data models than physical data models, and more logical data
models than conceptual data models

Only 1 conceptual data model, 1 logical data model and 1 physical data model
——————-

Question 331 pts


The goals of data storage and operations are:
Group of answer choices

Managing user experience, ensuring data access and managing data lifecycles

Managing accessibility, ensuring authorized access and managing performance

Managing user experience, ensuring consistency and managing glossaries


Managing availability, ensuring consistency and managing glossaries

Managing availability, ensuring integrity and managing performance


——-1

Question 371 pts


The best way to validate that a database backup is working, is to:
Group of answer choices

Periodically recover from the backup file

Appoint a special DBA in charge of backups

Check the size of the backup file

Check for the automatic email notification of backup success

Check the backup logs every day


———

Question 411 pts


In data security, which of the following is not one of the four A's:
Group of answer choices
Agile

Access

Authorization

Audit

Authentication

—————

Question 451 pts


The requirement to enter a username, a password and then a code sent to an
authentication app is called:
Group of answer choices

Biometric authentication

3-factor authentication

Mobile authentication

Proactive authentication
2-factor authentication
———

Question 511 pts


Integrating two data stores using batch or real-time synchronous approaches
results in a difference in:
Group of answer choices

Source of truth

Lethargy

Timestamping

Data quality

Latency

——————-

Question 561 pts


Misclassification of transactions through integration is often caused by
inconsistent:
Group of answer choices
Reference data

Data quality

Master data

Business intelligence

Content management

—————-

Question 591 pts


In 2009, ARMA International published GARP for managing records and
information. GARP stands for:
Group of answer choices

Global Accredited Recordkeeping Principles

G20 Approved Recordkeeping Principles

Gregarious Archive of Recordkeeping Processes

Generally Acceptable Recordkeeping Principles


Generally Available Recordkeeping Practices

—————-

Question 611 pts


The addition of workflow to a content management system will:
Group of answer choices

Restructure an enterprise glossary

Enable the controlled review and approval of documents

Implement a data warehouse landing zone

Allow the approval of system access requests

Enforce the controlled review and approval of database designs

———-

Question 651 pts


An authoritative system where data is created/captured, and/or maintained
through a defined set of rules and expectations is called:
Group of answer choices
A System of Systems

A System of Record

A System of Reference

A System of Retirement

A System of Referential Integrity

———-

Question 681 pts


Master data is data about:
Group of answer choices

Data values stored and displayed in uppercase

Authority to grant access to data across an organisation

Business transactions, e.g. financial transactions, enquiries and service call


interactions

Business entities, e.g. products, customers, assets and locations


Database structures and response time performance targets

————-/

Initiatives focused on building a 'single view of customer' mainly rely on which


DMBOK knowledge area?
Group of answer choices

Reference and Master Data

Data Security

Data Storage and Operations

Data Architecture

Metadata Management

———-

Question 731 pts


Critical to the incremental development of the data warehouse is:
Group of answer choices

A strong capacity management process


A agile development team

The assurance to include velocity, variety and veracity measurement

A strong release management process

A strong incident management process

————

Question 821 pts


Data provenance and data lineage are examples of:
Group of answer choices

Technical metadata

Strategic metadata

Business metadata

Industry metadata

Operational metadata
————-

Question 831 pts


By setting, enforcing and auditing metadata standards, organisations hope to:
Group of answer choices

Provide activities for the data governance office

Ease of understanding data dictionaries

Simplify integration and enable use

Standardize business rules in operational processes

Ensure the appropriate classification or meta-metadata


———

Question 841 pts


The ISO Metadata Registry Standard that provides a framework for defining a
metadata registry is:
Group of answer choices

ISO MD 1

ISO / IEC 11179


ISO 4-20-99

ISO 9001

ISO 4590
————-

Question 871 pts


The disclosure of sensitive addresses may occur through:
Group of answer choices

Software ignoring privacy tags on the data.

Stored procedures being called directly

Inappropriate use of photocopier toner

Cloud-based databases

Ineffective implementation of data architecture


———-

Question 891 pts


Data quality measurements can be taken at three levels of granularity. They are:
Group of answer choices

Departmental data, regional data, and enterprise data

Person data, location data, and product data

Fine data, coarse data, and rough data

Data element value, data instance or record, and data set

Historical data, current data and future dated data

————-

Question 921 pts


Which of the following is NOT required to effectively track data quality incidents?
Group of answer choices

An operational workflow that ensures effective resolution

An effective service level agreement with defined rewards and penalties

A standard vocabulary for classifying data quality issues


An assignment process to appropriate individuals and teams

A well defined system of escalation based on the impact, duration, or urgency of


an issue

————

Question 961 pts


A pensioner who was sent a $100,000,000 electricity bill was a victim of poor data
quality checks in which dimension?
Group of answer choices

Timeliness

Heuristics

Precision

Accuracy

Reasonableness

——————
Question 971 pts
Big data management requires:
Group of answer choices

Big ideas with big budgets

No discipline at all

More discipline than relational data management

Less discipline than relational data management

A certification in data science


—————

Question 981 pts


Big data is often defined by three characteristics. They are:
Group of answer choices

Expansive, Engaged and Enormous

Volume, Variety and Velocity

Direction, Depth and Details


Size, Speed and Sensitivity

Complexity, Compliance and Completeness


————
Question 1001 pts
In data handling ethics, 'social licence' refers to the alignment between:
Group of answer choices

Public perception and published fact

Social and political decision matrices

Stakeholder expectations and the organisation

Stakeholder demands and technology deliverables

Society's needs and their right to access data


—————
Question 11 pts
The 'Data Management Body of Knowledge' is produced by:
Group of answer choices
The Project Management Institute
The Data Practitioner Association
The Data Analysis Association
The Data Management Authority
The Data Management Association

Question 21 pts
Which of the following is NOT an approach to data valuation?
Group of answer choices
Enterprise data modelling.
What the data could be sold for.
Cost of obtaining and storing data.
Expected revenue from innovative uses of data.
Cost of replacing data if it were lost.

Question 31 pts
Data management is the development, execution and supervision of plans, policies,
programs and practices that deliver control, protect and enhance:
Group of answer choices
enterprise management capabilities.
the value of information assets.
the value of data assets.
the value of data and information assets.
data and information assets.

Question 41 pts
The DAMA Wheel contains:
Group of answer choices
knowledge areas
data strategy initiatives
data management processes
data management deliverables
maturity model dimensions
Question 51 pts
Data and information are:
Group of answer choices
completely separate things.
representations of truth.
used only in the context of business intelligence.
intertwined and dependent on each other.
pillars of the modern organisational Parthenon.

Question 61 pts
The 'DMBOK Environmental Factors hexigon' shows the relationship between:
Group of answer choices
people, process and technology.
people, software and tools.
DMBOK knowledge areas.
inputs, activities and deliverables.
business, application and technology architecture.

Question 71 pts
In the common enterprise architecture model coded BIAT, the 'I' stands for:
Group of answer choices
Instance
Interoperability
Identification
Integration
Information

Question 81 pts
Information is created and used by:
Group of answer choices
processes
computers
users
technology
applications
Question 91 pts
The Data Governance Steering Committee is best described as:
Group of answer choices
the representatives of data use on project steering committees.
the primary and highest authority responsible for the oversight and support of data
governance activities.
the local or divisional council, working under auspices of the CDO.
a burden to the agile delivery in a modern enterprise.
the community of interest, focused on specific subject areas or projects.

Question 101 pts


What area do you not consider when developing a 'data governance operating model'?
Group of answer choices
The value of data to the organisation.
Cultural factors - such as acceptance of discipline and adaptability to change.
The business model - decentralised versus centralised.
The availability of industry data models.
Impact of regulation.

Question 111 pts


The primary role of a data steward is:
Group of answer choices
to encourage certification in data management best practices across the
organisation.
to manage data assets on behalf of others and in the best interests of the
organisation.
to manage the data quality business unit.
to interfere in IT projects.
to perform program code reviews.

Question 121 pts


The purpose of data governance is to ensure that:
Group of answer choices
data can be reported on by the business line.
data is managed properly, according to policies and best practices.
data will be understood by all stakeholders.
data is backed up every night.
data is available for other systems to use.
Question 131 pts
An effective Data Governance communication program should include the following:
Group of answer choices
Regular newsletters.
A custom training program.
Events that encourage informal networking.
All answers.
A Data Governance Portal.

Question 141 pts


The steps followed in managing data issues include:
Group of answer choices
Standardisation, Allocation, Assignment, and Correction
Escalation, Review, Allocation and Completion
Read, Guess, Code, Release
Standardisation, Explanation, Ownership, and Completion
Standardisation, Assignment, Escalation, and Completion

Question 151 pts


The advantage of a decentralised data governance model over a centralised model is:
Group of answer choices
an increased level of ownership from local decision making groups.
the cheaper execution of data governance operations.
the common metadata repository configurations.
the easier implementation of industry data models.
having a common approach to resolving data governance issues.

Question 161 pts


Following the rollout of a data issue process, there have been no issues recorded in the
first month. The reason for this might be:
Group of answer choices
Staff staying back late to enter the issues into the system.
The denial of overtime requests.
Lack of credibility in the data governance process to affect changes.
The automatic deletion of all issues in the database.
There are no data issues in the enterprise.
Question 171 pts
Data flows can be represented by:
Group of answer choices
two dimensional matrices showing the relationships between data users and data
consumers.
two dimensional matrices showing the relationships between data entities and data
quality.
two dimensional matrices showing the relationships between data facts and data
dimensions.
two dimensional matrices showing the relationships between data entities and
business processes.
two dimensional matrices showing the relationships between data users and
business processes.

Question 181 pts


When a project specification is reviewed by the enterprise data architect, which of the
following is not a consideration:
Group of answer choices
whether entities and definitions need to be generalised or improved to handle future
trends.
whether entities on individual screens and reports align with the database.
whether to reuse existing, or develop new data delivery architectures.
what entities in the requirements should be included back into the overall enterprise
data architecture.
whether enterprise-wide entities conform to agreed standards.

Question 191 pts


"According to the ISO/IEC 42010:2007 Software and Systems Engineering -
Architecture Description, which of the following describes the definition of architecture:"
Group of answer choices
the fundamental responsibility for delivering the best systems at the lowest cost.
the fundamental rules for ensuring the information captured in the architected
solution is enforcing data quality and completeness.
the fundamental view of how the system should be built and how it will be
maintained.
"the fundamental organisation of a system, and the principles governing its design
and evolution."
the fundamental collection of all artefacts that describes a system and how they work
together.
Question 201 pts
Which of the following activities is NOT a way that enterprise data architecture
influences the scope boundaries of projects:
Group of answer choices
providing enterprise data requirement for projects.
enforcing data architecture standards.
ensuring enterprise business processes are effectively documented.
ensuring sufficient data replication controls are in place.
performing design reviews to ensure support of long-term organisational strategy.

Question 211 pts


The implementation of data architecture exposes the transformation of data as it moves
across the landscape. A common name for this concept is:
Group of answer choices
data discovery.
data interfacing.
data modelling.
"extract, transformation and load."
data lineage.

Question 221 pts


A data architecture team is best described as:
Group of answer choices
a group of strong database administrators.
an operational data provisioning group.
the authors of reference data.
a strategic planning and compliance team.
a well-managed project of architectural development.

Question 231 pts


A data architect is best deployed:
Group of answer choices
to manage the delivery of all the data aspects of a program.
after the project completes to identify weaknesses and lessons learned.
to build the database solution.
during the early stages of a project to define and shape a strategic solution.
by project managers to sign off all data deliverables.
Question 241 pts
The data architect needs to propagate data across the landscape in real time. This
requires the leveraging of the following DMBoK knowledge areas:
Group of answer choices
"data architecture, data modelling and design, and data security."
"data architecture, integration and interoperability, data storage and operations."
"data architecture, data governance and metadata management."
"data architecture, data quality and content, and document management."
"data architecture, metadata management and data security."

Question 251 pts


A lineage data tool provides:
Group of answer choices
a temporal distortion of data values across systems.
ancestoral origin of data DNA.
a clean line between columns in the same entity.
the capture and maintenance of source structures for each attribute on the data
model.
scope for reporting requirements.

Question 261 pts


In data modelling practice, entities are linked by:
Group of answer choices
cardinality
indexes
triggers
processes
relationships

Question 271 pts


The deliverables for a data modelling process does not have to include:
Group of answer choices
lineage describing where the data came from.
definitions for entities, attributes and relationships.
one or more diagrams.
issues and outstanding questions.
the steps in the business process that use the data.
Question 281 pts
The implementation of a 'Super Type - Sub Type' structure can use the following 2
options:
Group of answer choices
Subtype Absorption and Supertype Partition
Super-Subtype Merge and Super-Subtype Split
Supertype Rollover and Subtype Rollunder
Super-Subtype Split and Super-Subtype Merge
Supertype Absorption and Subtype Partition

Question 291 pts


In a data model, domains can be used for:
Group of answer choices
reducing the amount of coding required in the database.
separating concepts into business ideas.
consolidation of data into subject areas.
consistency and standarisation of data values.
public viewing of the data model.

Question 301 pts


Each person has zero or more addresses, and each address must be allocated to 1
person. This is an example of:
Group of answer choices
a 'one to one' relationship
a 'zero to many' relationship
an indirect foreign key
a 'one to many' relationship
a 'many to many' relationship

Question 311 pts


During the intial scoping of a project, a data model can be used to:
Group of answer choices
determine the impact of business processes and customer lifecycles.
plan the structure of the metadata repository.
identify detailed impact on all the tables in a database that must be changed.
determine the security requirements for accessing the data.
provide a clear definition of affected and non-affected data entities.
Question 321 pts
Significant operational issues have been caused by the implementation of a data model
that represents a Customer Agreement as a ternierary relationship between the
Enterprise, a Customer, and their Contact Person. Which of the following describes the
likely operational issue?
Group of answer choices
Every time the Customer Agreement was renewed, a new Contact Person record
was required.
Every time the customer changes addresses the address for the contact person
must change as well.
In the event of a merger between enterprises, the contact person addresses need to
be updated.
Response time for retrieving the Customer Agreement degrades rapidly due to the
lack of indexing.
Every time the contact person changes, the customer agreement needs to be re-
established.

Question 331 pts


The acroymn ACID stands for:
Group of answer choices
available, corrupt, isolation and durable.
available, completeness, isolation and dangerous.
actual, created, identified and deleted.
atomicity, consistency, isolation and durability.
atomicity, completeness, independence and durability.

Question 341 pts


Production DBA's would not normally take responsibility for:
Group of answer choices
implementing mechanisms for clustering and failovers of the database.
the fitness of purpose for data in the database.
executing other database maintenance activities, such as archiving.
implementing backup and recovery mechanisms.
ensuring performance and reliability of the database.
Question 351 pts
Data replication is useful as it provides:
Group of answer choices
opportunities to secure sensitive data.
an alternative to backups.
the ability to spread the workload across multiple databases.
insights into customer retention.
enables different table structures to be built.

Question 361 pts


A sandbox is a type of database environment used for:
Group of answer choices
low budget projects.
remote users.
proofs of concept and to test hypotheses.
production backups.
user acceptance testing.

Question 371 pts


A database that is growing at 100% per annum compound will be:
Group of answer choices
2 times its original size at the end of year 5.
6 times its original size at the end of year.
3 times its original size at the end of year 2.
4 times its original size at the end of year 2.
half its original size at the end of year 2.

Question 381 pts


When reviewing data access plans, sequential searching is slowing the database. One
way to fix this is:
Group of answer choices
reducing the number of database users.
creating new indexes.
adding more memory.
moving the database to the cloud.
converting it to an in-memory database.
Question 391 pts
An application uses a single service account for all database access. One of the risks of
this approach is:
Group of answer choices
the application freezes more often.
the ability to trace who made changes to the data.
the data becomes out of order.
it constrains the application from running parallel processes.
the database runs out of threads.

Question 401 pts


A database uses foreign keys from code tables for column values. This is a way of
implementing:
Group of answer choices
event data.
master data.
temporal data.
star schema data.
reference data.

Question 411 pts


The standard for a strong password is set by the:
Group of answer choices
data modelling standard.
data security standard.
data access standard.
data naming standard.
identity management standard.

Question 421 pts


The percentage of enterprise computers having the most recent security patch installed
is a metric of which knowledge area?
Group of answer choices
Data Warehousing and Business Intelligence
Data Quality
Data Storage and Operations
Metadata Management
Data Security
Question 431 pts
The stakeholder requirements for privacy and confidentiality are goals found in:
Group of answer choices
metadata management.
data security.
document and content management.
data quality.
data architecture.

Question 441 pts


Obfuscation of data is to:
Group of answer choices
collect data from obscure sources.
put it in different databases.
make it obscure or unclear.
use synonyms for the same term.
make the result clear.

Question 451 pts


A security mechanism that searches for customer bank account details in outgoing
emails is achieving the goal of:
Group of answer choices
ensuring stakeholder requirements for response time and availability levels are met.
ensuring stakeholder requirements for service design and experience are met.
ensuring stakeholder requirements for concise definitions and usage are met.
ensuring stakeholder requirements for openness and transparency are met.
ensuring stakeholder requirements for confidentiality and privacy are met.

Question 461 pts


A denial of service attack is typically accomplished by:
Group of answer choices
flooding the target machine with superfluous requests.
corrupting the user name and passwords.
a stop-work action by the workforce.
emailing virus laden attachments.
interrupting the mains electricity supply.
Question 471 pts
Compound authorisation groups provide a means to:
Group of answer choices
obfuscate a user's actual access to a system.
distract the data security officer.
encrypt sensitive transmissions of data.
effectively prepare for data security audits.
precisely configure an individual's access to a system.

Question 481 pts


A DMZ is bordered by 2 firewalls. These are between the DMZ and the:
Group of answer choices
internet; for added security.
internet and intranet.
Korean peninsula.
internet and extranet.
internet and internal systems.

Question 491 pts


Data that is used infrequently or not at all may be moved to an alternative data store.
This is called:
Group of answer choices
auditing
authentication
archiving
replication
analysis

Question 501 pts


Mapping requirements and rules for moving data from source to target enables:
Group of answer choices
extract
load
backups
transformation
analysis
Question 511 pts
Integrating two data stores using batch or real-time synchronous approaches results in
a difference in:
Group of answer choices
latency
data quality
source of truth
lethargy
timestamping

Question 521 pts


In data integration, the goal of data discovery is to:
Group of answer choices
identify potential sources and assure data recovery processes are compliant.
identify key users and perform high level assessment of data quality.
assign data glossary terms and data formats.
assign data glossary terms and canonical models.
identify potential sources and perform high-level assessment of data quality.

Question 531 pts


Implementing a services-oriented architecture will often use:
Group of answer choices
a data lake.
an enterprise services bus.
ETL servers.
data visualisation tools.
a data modelling tool.

Question 541 pts


The ability of a photo app to share its images with various social media applications, is
an example of:
Group of answer choices
metadata
replication
rendering
integration
interoperability
Question 551 pts
The creation of overly complex enterprise integration over time is often a symptom of:
Group of answer choices
multiple integration technologies.
multiple data owners.
multiple data warehouses.
multiple metadata tags.
multiple application coding languages.

Question 561 pts


The implementation of a 'master data repository', which is integrated across the
enterprise, is an example of which integration approach?
Group of answer choices
Replication
Change Data Capture
Hub and Spoke
Publish and Subscribe
Point to Point

Question 571 pts


An enterprise content management system (ECM) stores the following:
Group of answer choices
backups of the enterprise's data warehouse.
"documents and images, but not multi-media."
Kanban boards.
information to be displayed on websites and contained in documents.
code and test scripts for enterprise development environments.

Question 581 pts


A goal of 'Document and Content Management' is to ensure effective and efficient
retrieval and use of:
Group of answer choices
data and information in relational formats.
"data, but not information in unstructured formats."
data and information in unstructured formats.
"information, but not data in unstructured formats."
data and information in structured formats.
Question 591 pts
Which of the following is not a step in the 'document and content management
lifecycle'?
Group of answer choices
Manage retention and disposal.
Audit documents and records.
Manage versions and control.
Create a content strategy.
Capture records and content.

Question 601 pts


"Planning, implementation and control activities for lifecycle management of data and
information, found in any form or medium, pertain to which knowledge area?"
Group of answer choices
Metadata Management
Document and Content Management
Data Warehousing and Business Intelligence
Data Integration and Interoperability
Data Storage and Operations

Question 611 pts


Users continue to use a shared drive instead of a new document management system.
This may be due to:
Group of answer choices
the document management system is too expensive.
a failure to backup the shared drive.
concern about the ability to version documents.
concurrent updates to the document are handled better by the shared drive.
onerous classification requirements when adding documents.

Question 621 pts


"An enterprise's organisation chart has multiple levels, each with a single reporting line.
This is an example of a:"
Group of answer choices
hierarchical taxonomy.
ecological taxonomy.
compound taxonomy.
flat taxonomy.
hybrid taxonomy.
Question 631 pts
A search engine database is populated by a web crawler or spider software that usually
processes as:
Group of answer choices
"continually repeating, always performing (CRAP)."
"basically available, soft state, eventually consistent (BASE)."
"atomic, consistent, isolated, durable (ACID)."
"linearly independent, near exact (LINE)."
"fundamentally available, consistently true (FACT)."

Question 641 pts


"Integrating data security with document and content management knowledge areas,
guides the implementation of:"
Group of answer choices
fitness for purpose metrics for unstructured data.
appropriate access and authorisation to unstructured data.
straight-through processing for NoSQL queries.
appropriate access and authorisation to structured data.
appropriate privacy controls on data marts.

Question 651 pts


Reference data is used to:
Group of answer choices
describe backup strategies.
populate fact tables in a data mart.
categorise or classify data.
enforce enterprise security standards.
dedupe customer records.

Question 661 pts


A goal of reference and master data management is for data to ensure shared data is:
Group of answer choices
secure, auditable, complete and relevant
secure, auditable, publicly available and free.
complete, consistent, content and relevant.
continuous, consistent, current and private.
complete, consistent, current and authoritative.
Question 671 pts
One of the first steps in a master data management program is to:
Group of answer choices
secure funding for 20 years of operations.
build multiple data marts.
decommission similar data collection systems.
review data security protocols.
evaluate and assess data sources.

Question 681 pts


Data that is required across business processes, areas and systems is called:
Group of answer choices
Reference and Master Data.
Event Data.
Important Data.
A Data Mart.
Static Data.

Question 691 pts


In order to gain endorsement to extend the use of reference and master data across the
enterprise, a key supporting DMBOK knowledge area is:
Group of answer choices
Data Storage and Operations.
Data Architecture.
Data Governance.
Document and Content Management.
Data Security.

Question 701 pts


The loading of country codes into a CRM is a classic:
Group of answer choices
transaction data integration.
reference data integration.
master data integration.
analytics data integration.
fact data integration.
Question 711 pts
The independent updating of data into a system of reference is likely to cause:
Group of answer choices
reference data inconsistencies.
duplicate data.
transaction data inconsistencies.
master data inconsistencies.
deadlocks in the database.

Question 721 pts


Emergency contact phone number would be found in which master data management
program?
Group of answer choices
Product
Asset
Service
Location
Employee

Question 731 pts


The business case for enterprise warehousing is:
Group of answer choices
to reduce data redundancy, improve information consistency, and enable an
enterprise to use its data to make better decisions.
to increase data redundancy, align information glossaries, and enable an enterprise
to exploit machine learning techniques.
to reduce data overload, improve information governance, and enable an enterprise
to use its data to make better decisions.
to increase data distribution, improve information generation, and enable an
enterprise to use its data to increase revenue.
to align data systems, improve source system management, and to enable an
enterprise exploit machine learning techniques.
Question 741 pts
Critical to the success of the data warehouse is the ability to explain the data. The
DMBoK knowledge area that practices these techniques is:
Group of answer choices
Metadata Management
Data Storage and Operations
Data Architecture
Document & Content Management
Reference and Master Data

Question 751 pts


During the implementation of a data warehouse, a roadmap is used to:
Group of answer choices
construct intricate securty authorisation.
articulate user requirements.
demonstrate progress towards the desired end state.
articulate data quality checkpoints.
demonstrate alignment to the project plan.

Question 761 pts


One of the difficulties when integrating multiple source systems is:
Group of answer choices
determining valid links or equivalences between data elements.
maintaining documentation describing the data warehouse operation.
completing the data architecture on time for the first release.
modifying the source systems to align to the enterprise data model.
having a data quality rule applicable to all source systems.

Question 771 pts


A data warehouse deployment with multiple ETL, storage and querying tools often
suffers due to the lack of:
Group of answer choices
disk space on the big data platform.
integration of the dictionaries to achieve common understanding.
quality data modellers.
common data types in the source datasets.
conflict between software vendors.
Question 781 pts
A key feature of the Bill Inmon's approach to data warehousing is:
Group of answer choices
its ability to operate on open source platforms.
a preference for supporting operational reporting.
a normalised relational model to store and manage data.
a tight management of data dimensions.
an exclusive focus on star schemas and cubes.

Question 791 pts


De-identifying sensitive data in a data warehouse enables:
Group of answer choices
a reduced complexity in the data models.
increased utilisation without compromising data privacy.
a bypass in the need to assess data quality.
a focus on re-identifying records with 3rd party datasets.
certainty of complete datasets for interrogation.

Question 801 pts


In a data warehouse, where the classification lists for organisation type are inconsistent
in different source systems, there is an indication that there is a lack of focus on:
Group of answer choices
Data Modelling
Master Data
Metadata Management
Reference data
Data Storage

Question 811 pts


Discovering and documenting metadata about physical data assets provides:
Group of answer choices
an estimation of balance sheet value of enterprise data.
information on how data is transformed as it moves between systems.
scoping boundaries of the data dictionary.
effective project scope management.
insights into the temporal data quality.
Question 821 pts
A goal of metadata management is to manage data related business terminology in
order to:
Group of answer choices
ensure people understand data definition in BI systems.
ensure accurate data requirements are gathered for reporting.
ensure people understand data content and can use data consistently.
successfully size the database.
ensure the business processes align to the data model.

Question 831 pts


Metadata is often categorized into three types, they are:
Group of answer choices
business, technical and strategic
business, strategic and meta-metadata
operational, reporting and analytical
business, technical and operational
technical, infrastructure and instance

Question 841 pts


The role of Metadata in Data Management is:
Group of answer choices
to help organisations understand its data, its systems and its workflows
to display appropriate data on screens and reports
to provide effective decision making
to group common data concepts
to build a big data solution

Question 851 pts


Tagging a column as personally identifiable information is an example of:
Group of answer choices
Data dictionary
Metadata
Data Architecture
Data Quality
Data profiling
Question 861 pts
One of a business data steward's key responsibilities is to:
Group of answer choices
manage data storage and operations
manage the calendar of the business data owner
manage metadata
manage business process implementation
manage the availability of the business intelligence solution

Question 871 pts


A report displaying birth date contains possible but incorrect values. What is a possible
explanation?
Group of answer choices
Birth date is populated from a single source system; which contains missing values.
Birth date is populated from two source systems; one of which stores marriage date
in the birth date field.
Birth date is populated from two source systems; both of which record the birth date
in the birth date field.
Birth date is populated from a single source system; which does not contain birth date.
Birth date is populated from a single source system ; where the date field is an offset value of 1601.

Question 881 pts


The search function associated with a document management store is failing to return
known artefacts. This is due to a failure of:
Group of answer choices
maintaining appropriate metadata on each document.
data privacy and confidentiality procedures.
effective data quality metrics.
business intelligence implementation.
maintaining public access to all documents in the document management store.

Question 891 pts


A Data Quality dimension is:
Group of answer choices
a valid value in a list.
a core concept in dimensional modelling.
the value of a particular piece of data.
a measurable feature or characteristic of data.
one aspect of data quality used extensively in data governance.
Question 901 pts
Which of the following is NOT a preventative action for creating high quality data:
Group of answer choices
Train data producers.
Automated correction algorithms capable of detecting and correcting errors.
Institute formal data change control.
Implement data governance and stewardship.
Establish data entry controls.

Question 911 pts


Which of the following is NOT a stage in the Shewhart / Deming Cycle that drives the
data quality improvement lifecycle:
Group of answer choices
Investigate
Plan
Do
Check
Act

Question 921 pts


A data quality program should limit its scope to:
Group of answer choices
the data that is of interest to the Chief Executive Officer.
all the data stored in the enterprise.
the data that changes most often.
the data most critical to the enterprise and its customers.
the highest profile program with the best benefits.

Question 931 pts


'Top down' and 'bottom up' data analysis and profiling is best done in concert because:
Group of answer choices
It allows the profiler to show the business the true state of the data.
It gets everyone involved.
It balances business relevance and the actual state of the data.
It gives something for the architects to do while the profilers get on with the work.
Data quality tools are more productive when they are effectively configured.
Question 941 pts
Which of the following is the best example of the data quality dimension of 'consistency':
Group of answer choices
The phone numbers in the customer file do not adhere to the standard format.
The revenue data in the dataset is always $100 out.
All the records in the CRM have been accounted for in the data warehouse.
The source data for the end of month report arrived 1 week late.
The customer file has 50% duplicated entries.

Question 951 pts


A data quality report assesses the coding of deposit transactions. The following
variations in the coding is apparent: DEP, Dep, dep, dEp. Which DMBoK knowledge
area has been ignored?
Group of answer choices
Metadata Management
Data Governance
Reference and Master Data
Data Storage and Operations
Data Quality

Question 961 pts


Which of the following is the best example of a 'documented data quality rule':
Group of answer choices
Every transaction recorded must be processed by 12:05 am by authorised personnel
who will validate balances and data delivery to branches.
The transaction data from all satellite systems needs to reflect actual customer
balances each morning.
The transaction data from all satellite systems needs to be ready by 12:05 am in
order to feed the overnight batching window, to ensure branches have access to actual
customer balances.
Each transaction data file holding customer transactions must be kept confidential to
the authorised users within the operations team.
All transaction data in the core banking systems need to be processed at 12:05 am
each day regardless of the business calendar day and timezone.
Question 971 pts
"The ethics of data handling centre on several core concepts. They are:"
Group of answer choices
"access to data, potential for misuse and storage cost."
"impact on people, potential for misuse and economic value."
"impact on people, potential for re-use and storage cost."
"privacy, security and authorisation."
"accurate business glossary, data quality and reference data."

Question 981 pts


GDPR and PIPEDA are examples of:
Group of answer choices
global data modelling standards.
content management systems.
data protection regulations.
data program rules.
primary information parsing algorithms.

Question 991 pts


An application that attempts to predict future outcomes through probability estimates is
called:
Group of answer choices
just-in-time reporting
predictive analytics
dimensional analytics
descriptive analytics
reactive analytics

Question 1001 pts


"A machine learning algorithm that incorrectly classifies new data values may have a
problem with population imbalances in:"
Group of answer choices
reference data management.
predictive analytics.
big data architecture.
model training data.
metadata management.

The End
Question 1
has the same stage as the system delivery lifecycle.
Hardware managment.
Is used primarily for data archiving.
Is only important in regulated industries
Exists beyond the system delivery lifecycle
Is not relevant in an agile environment.

Question 2
DQ-The data quality managment cycle has four stage. three are Plan,Monitor&Act.
What is fourth stage?
Improve.
Prepare.
Reiterate.
Deploy.
Manage.

Question 3
DQ-Which of these is a key process in defining Producing data quality bussiness rules?
Matching data from different data sources.
Producing data quality reports & dashboards
De-duplicating data records
Producing data management policies

Question 4
DG-Communicating the value of Data Governance can be approached in a number of
ways. which of the following approaches is NOT a recognised way of doing this?
Providing only negative communications on ongoing data issues to key executive
stakeholders
Maintainin intranet website
publishing a regular newsletter via hardcopy or email
promote participation in a DM forum or community
creating a series of "elevator pitches" for the appropriate audience
Question 5
DG-When considering a Data Governance program, communication is a key element.
There are many ways of managing this communication, with one of the most effective
being a data Managment intranet. Which of the following would you typically NOT put
onto such an communication vehicle?

Description of the DG organisation, it's key members and contact details.


executive messege regarding significant data managment issues.
The Data Stewards team profilies.
Raw data results of an investigiation into a possible data privacy breach.
Link to a "rais an issue" Log.

Question 6
MDM-the role of physical data model in the metadata repostiry is?

Which version of COST software (E.g. SAP) is implemented.


To descripe how and where our data is stored in our systems applications or packages.
What the bussiness diffinsions of data cocepts is
How many master data records are stored in our MDM system
When the duplicated records where merged.

Question 7
MDM-Upodating the Metadata repository is the recommended activity during project
close out in SDLC.
TRUE
FALSE

Question 8
DG-Apart from the security requirment internal to the organization , what other strategic
goal should a data sequrity Managment system address?
Complaince with ISO29100 and PCI-DSS.
Complaince with ISO27001 and HIPPA.
Regulatory requirments for privacy and confidentiality AND privacy and confidentiality
needs of all steakholders.
Ensuring the organization dosent engaged in SPAM marketing.
Question 9
DG-When performing an evalution of analytic applications,which of the following
questions is least relavent to identify the level of effort needed?
• How much of tool infrastructure meets our organizational infrastructure.
• The standard source system for which ETL is supplied.
• NO. of source systems we need to integrate into the tool
• How much the canned proccess in the tool match our bussiness.
• Annual costs such as license,maintenance,etc.

You might also like