QUIZ Merged Merged
QUIZ Merged Merged
Who is most responsible for communicating and promoting awareness on the value
of Data Governance in the organization?
Devolved governance
3. When new governmental and industry regulations are formulated and enacted,
Data Governance plays a key role in the process of identifying the data and
information components for compliance. What do you see as their most important
role in any regulatory compliance project?
Working with business and technical leadership to find the best answers to a standard
set of regulatory compliance questions (How, Why, When, etc)
A business role appointed to take responsibility for the quality and use of their
organization's data assets
Data is processed only in ways compatible with the intended and communicated use it
was collected for, and respects the consent of the data subject
7. Which statement best describes the relationship between documents and records?
8. Which of the following are primary deliverables of proper document and record
management?
Managed records in many media formats, e-discovery records, policies and procedures,
contracts and financial documents
9. In 2009, ARMA International published GARP for managing records and information.
GARP stands for:
11. All of the following are TRUE statements on relationship types except:
A one-to-many relationship says that a child entity may have one or more parent entities
12. Identify who has primary responsibility for data capture and usage design within
programs.
14. What is the difference between cardinality rules and data integrity rules?
Cardinality rules define the quantity of each entity instance that can participate in a
relationship between two entities, and referential integrity rules ensure valid values
Entity occurrence
17. The Data Quality Management cycle has four stages. Three are Plan, Monitor and
Act. What is the fourth stage?
Deploy
18. Which of these is NOT an expected role of a Data Quality Oversight Board?
19. Which of these is a key process in defining data quality business rules?
Separating data that does not meet business needs from data that does
The defined procedures ensure that the right people can use and update data in the
right way, and that all inappropriate access and update is restricted
22. What is the role of the Data Governance Council in defining an Information
Security policy?
The Data Governance Council should review and approve the high level Data Security
Policy
23. Apart from security requirements internal to the organization, what other strategic
goals should a Data Security Management system address?
Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
24. A RACI matrix is a useful tool to support the ______ in an outsourced arrangement.
Segregation of duties
Data Security helps to protect proprietary information and intellectual property, as well
as customer and partner information
Track the data from source system to a target database; understanding its
transformations
28. Slice, Dice, Roll-up and Pivot are terms used in what kind of data processing?
OLAP
Data Mining
30. Critical to the success of the data warehouse is the ability to explain the data. The
DMBoK knowledge area that practices these techniques is:
Metadata Management
Data about the business entities that provide context for business transactions
37. The role of the Conceptual data model in the Metadata repository is:
To summarize the key data subject areas for a business area at a high level of
abstraction to enable the major data concepts to be understood
Data Glossary
40. The number of artifacts that must be searched in the Metadata repository for all
Business change projects are:
Plan
43. Data Governance touch points throughout the project lifecycle are facilitated by
this organization
44. What Organization Structure should set the overall direction for Data Governance?
The policies are unclear of what is defined as non-value-added, storage is cheap so there
is no cost driver, and it takes more effort to dispose than to keep
Taxonomy
The verb phrases describing the business rules in each direction between two entities
Conceptual model
Investigate
53. A Data Quality Service Level Agreement (SLA) would normally include which of
these?
55. Which of these are increasingly driving legislation for information security and data
privacy?
57. Apart from security requirements internal to the organization, what other strategic
goals should a Data Security Management system address?
Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
58. One of the key differences between operational systems and data warehouses is:
Operational systems focus on current data; data warehouses contain historical data
OLAP
62. Master data differs from Reference data in the following way:
Unlike Reference data, Master data is not usually limited to predefined domain values
64. What is a common motivation for Reference and Master Data Management?
The need to improve data quality and data integrity across multiple data sources
67. The library of information about our data (our metadata) is built so that:
All of these
68. The role of the Physical data model in the Metadata repository is:
To describe how and where our data is stored in our systems applications or packages
69. According to the DAMA DMBoK, the Data Governance Council (DGC) is the highest
authority organization for data governance in an organization. Who should typically
chair this Council?
70. Which of the following is not a step in the 'document and content management
lifecycle'?
The primary key of the parent entity becomes a foreign key in the child entity
73. In Dimensional data models, which of these is NOT true regarding Measures?
The use of automated cleanse and correction tools with results manually checked before
committing outputs
75. Which of the following is NOT usually a feature of data quality improvement tools?
Data modelling
77. Which of the following define the data security touch points in an organization?
78. Apart from security requirements internal to the organization, what other strategic
goals should a Data Security Management system address?
Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
Master Data
80. According to the DMBoK, the system that contains the best version of the Master
Data is the:
System of record
EDI
83. What type of Meta-Data provides developers and administrators with knowledge
and information about systems?
84. Documents and records should be classified based on the _______ level of
confidentiality for information found in the record
Highest
85. Data quality measurements can be taken at three levels of granularity. They are:
86. Which of the following is the best example of the data quality dimension of
'consistency'?
All the records in the CRM have been accounted for in the data warehouse
88. A CRUD matrix helps organizations map responsibilities for data changes in the
business process work flow. CRUD stands for
89. A Data Integration approach that updates a Data Warehouse with small changes
from Operational systems is called:
CDC
90. Which of the following is NOT a primary Master Data Management area of focus?
91. A common driver for initiating a Reference Data Management program is:
It will improve data quality and facilitate analysis across the organization
92. Which of these statements are true about Metadata?
94. What is the difference between an Industry and a Consensus MetaData Standard?
95. When defining your business continuity plan, which of the following should one
consider doing?
97. Which of these statements has the most meaningful relationship label?
The foreign key must have a role name to avoid attribute duplication
101. What would you not expect to find in the MetaData repository?
Process Meta-Data
104. Every enterprise is subject to many governmental and industry regulations, many
of which regulate how data and information is used and managed. Part of the Data
Governance Function is to:
Monitor and ensure that organizations meet any regulatory compliance requirements
Local key
106. Top down' and 'bottom up' data analysis and profiling is best done in concert
because:
107. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?
Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
108. One of the difficulties when integrating multiple source systems is:
Updating the operating system that the Master Data management toolset is running on
114. A strong argument for pursuing a Reference Data and/or Master Data
management initiative is:
By centralizing the management of Reference and Master data, the organization can
conform critical data needed for analysis
117. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?
Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
118. A CRUD matrix helps organizations map responsibilities for data changes in the
business process work flow. CRUD stands for
Any data stores or extracts used to support the delivery for BI purposes
Preservation Meta-Data
123. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?
Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
QUIZ4
pts Question 131
:A 'Data Governance Strategy' usually includes the following deliverables
Group of answer choices
Metadata Management
Business Architecture
Data Security
Data Governance
————
The developers
Interoperability requirements
The business
Industry standards
Reporting requirements
-—————
pts Question 751
:A data lineage tool enables a user to
Group of answer choices
Purge the data in the data warehouse and reload from the source
systems
Purge the data in the data warehouse and copy back to the data mart
Purge the data in the data marts and reload from the data warehouse
Purge the data generally and reload from the best system
Purge the data in the source system and reload the data warehouse
————
For example, a lump of coal burns about 100 degrees and gives off
carbon dioxide
For example, a record has version numbers, archive dates and purge
dates
For example, a book has author, title and subject associated with it
————
Safeguards
Storage Limitations
Accuracy
Accountability
Purpose Limitation
-———
Q3Question 61 pts
Knowledge area activities are classified into four categories. They are:
Group of answer choices
Q3 Question 81 pts
Information governance and data governance should be:
Group of answer choices
Managed as integrated functions, with data governance reporting to information
governance
Question 91 pts
A common driver for data governance is:
Group of answer choices
Internal audits
Regulatory compliance
Outsourcing
Data Dictionary
Business Glossary
Security Framework
Metadata Repositories
Question 191 pts
The goal of data architecture is to be:
Group of answer choices
Technical architecture
Business architecture
Data architecture
Data warehousing
Data quality
Data security
Data quality
Data warehousing
Data architecture
Data modelling
Define the rules and approval mechanisms to make changes to the data structures
Avoid the loss of data by storing key values more than once
Optimize overall database performance across both data access and data update
requests
Ensure surrogate keys are retaining their unique values in all satellite tables
Q3 Question 341 pts
Database monitoring tools measure key database metrics, such as:
Group of answer choices
Customer analytics
Legal obligations
Historical reporting
Chasm
Vulnerability
Risk
Feature
Threat
Authorisation
Authentication
Audit
Entitlement
Access
Data model
Project charter
Interface contract
Data Security
Synchronous
Uncontrolled
Streaming
Faulty
Asynchronous
English
Metadata
Data model
Dictionary
Taxonomy
The voice files are unstructured data and the sentiment analysis is structured data
The voice files are structured data and the sentiment analysis is unstructured data
Authorization matrix
CRUD matrix
Mind map
Data model
Process model
Auto-normalization features
Question 661 pts
The process of identifying how different records may relate to a single entity is called:
Group of answer choices
Matching
Mangling
Meshing
Mirroring
Munging
The website software not integrating with the reference data repository
The reference data strategy has not been approved by the executive
An integrated data store, ETL logic, and extensive data cleansing routines
Data stores and extracts that can be transformed into star schemas
Any data stores or extracts used to support the delivery for BI purposes
Operational systems focus on data quality; data warehouses focus on data security
Operational systems focus on current data; data warehouses contain historical data
Operational systems focus on historical data; data warehouses contain current data
Operational systems are available 24x7; data warehouses are available during business
hours
Database catalogue
Establish a program of quick wins targeting easy fixes over a short time period
Data Quality
Metadata Management
Predictive analytics
Reactive analytics
Sentiment analysis
QUIZ 3
A document that describes how data will be made more accessible over 3-5 years
is called:
Group of answer choices
A joint effort in defining the data quality rules and profiling the data
An inherent separation of duty between oversight and execution
An organisation structure with a number of key roles
An initiative that addresses the financial accuracy of the balance sheet
——————————
Represented by finance during the process for acquiring and disposing of the data
asset
Able to assign a dollar value to a data asset in order to determine the appropriate
cost-to-investment ratio for budgeting purposes
Able to register the data asset with the financial controller to ensure it is
managed like all other assets
——————
Because most organisations have more data than individual people can
comprehend, understand and make decisions about
Because most Chief Data Officers do not have the technical background to be held
accountable for complex data diagrams
Because most architects want to deploy a complete suite of drawings for project
deliverables
————-
Category information
Historical information
Resource information
————-
A data model that consists of a single fact table linked to important concepts of
the business is a:
Group of answer choices
Process Model
Relational Model
Dimensional Model
————-
By changing the role names of the foreign keys on Person and Address to ensure
referential integrity
With an associative entity called Person Address Usage and two, 'one to many'
relationships
With a partnership entity called Person Address Usage and two, 'one to many'
relationships
——————
More physical data models than logical data models, and more logical data
models than conceptual data models
More conceptual data models than logical data models, and more logical data
models than physical data models
More logical data models than physical data models, and more logical data
models than conceptual data models
Only 1 conceptual data model, 1 logical data model and 1 physical data model
——————-
Managing user experience, ensuring data access and managing data lifecycles
Access
Authorization
Audit
Authentication
—————
Biometric authentication
3-factor authentication
Mobile authentication
Proactive authentication
2-factor authentication
———
Source of truth
Lethargy
Timestamping
Data quality
Latency
——————-
Data quality
Master data
Business intelligence
Content management
—————-
—————-
———-
A System of Record
A System of Reference
A System of Retirement
———-
————-/
Data Security
Data Architecture
Metadata Management
———-
————
Technical metadata
Strategic metadata
Business metadata
Industry metadata
Operational metadata
————-
ISO MD 1
ISO 9001
ISO 4590
————-
Cloud-based databases
————-
————
Timeliness
Heuristics
Precision
Accuracy
Reasonableness
——————
Question 971 pts
Big data management requires:
Group of answer choices
No discipline at all
Question 21 pts
Which of the following is NOT an approach to data valuation?
Group of answer choices
Enterprise data modelling.
What the data could be sold for.
Cost of obtaining and storing data.
Expected revenue from innovative uses of data.
Cost of replacing data if it were lost.
Question 31 pts
Data management is the development, execution and supervision of plans, policies,
programs and practices that deliver control, protect and enhance:
Group of answer choices
enterprise management capabilities.
the value of information assets.
the value of data assets.
the value of data and information assets.
data and information assets.
Question 41 pts
The DAMA Wheel contains:
Group of answer choices
knowledge areas
data strategy initiatives
data management processes
data management deliverables
maturity model dimensions
Question 51 pts
Data and information are:
Group of answer choices
completely separate things.
representations of truth.
used only in the context of business intelligence.
intertwined and dependent on each other.
pillars of the modern organisational Parthenon.
Question 61 pts
The 'DMBOK Environmental Factors hexigon' shows the relationship between:
Group of answer choices
people, process and technology.
people, software and tools.
DMBOK knowledge areas.
inputs, activities and deliverables.
business, application and technology architecture.
Question 71 pts
In the common enterprise architecture model coded BIAT, the 'I' stands for:
Group of answer choices
Instance
Interoperability
Identification
Integration
Information
Question 81 pts
Information is created and used by:
Group of answer choices
processes
computers
users
technology
applications
Question 91 pts
The Data Governance Steering Committee is best described as:
Group of answer choices
the representatives of data use on project steering committees.
the primary and highest authority responsible for the oversight and support of data
governance activities.
the local or divisional council, working under auspices of the CDO.
a burden to the agile delivery in a modern enterprise.
the community of interest, focused on specific subject areas or projects.
The End
Question 1
has the same stage as the system delivery lifecycle.
Hardware managment.
Is used primarily for data archiving.
Is only important in regulated industries
Exists beyond the system delivery lifecycle
Is not relevant in an agile environment.
Question 2
DQ-The data quality managment cycle has four stage. three are Plan,Monitor&Act.
What is fourth stage?
Improve.
Prepare.
Reiterate.
Deploy.
Manage.
Question 3
DQ-Which of these is a key process in defining Producing data quality bussiness rules?
Matching data from different data sources.
Producing data quality reports & dashboards
De-duplicating data records
Producing data management policies
Question 4
DG-Communicating the value of Data Governance can be approached in a number of
ways. which of the following approaches is NOT a recognised way of doing this?
Providing only negative communications on ongoing data issues to key executive
stakeholders
Maintainin intranet website
publishing a regular newsletter via hardcopy or email
promote participation in a DM forum or community
creating a series of "elevator pitches" for the appropriate audience
Question 5
DG-When considering a Data Governance program, communication is a key element.
There are many ways of managing this communication, with one of the most effective
being a data Managment intranet. Which of the following would you typically NOT put
onto such an communication vehicle?
Question 6
MDM-the role of physical data model in the metadata repostiry is?
Question 7
MDM-Upodating the Metadata repository is the recommended activity during project
close out in SDLC.
TRUE
FALSE
Question 8
DG-Apart from the security requirment internal to the organization , what other strategic
goal should a data sequrity Managment system address?
Complaince with ISO29100 and PCI-DSS.
Complaince with ISO27001 and HIPPA.
Regulatory requirments for privacy and confidentiality AND privacy and confidentiality
needs of all steakholders.
Ensuring the organization dosent engaged in SPAM marketing.
Question 9
DG-When performing an evalution of analytic applications,which of the following
questions is least relavent to identify the level of effort needed?
• How much of tool infrastructure meets our organizational infrastructure.
• The standard source system for which ETL is supplied.
• NO. of source systems we need to integrate into the tool
• How much the canned proccess in the tool match our bussiness.
• Annual costs such as license,maintenance,etc.