0% found this document useful (0 votes)
113 views13 pages

DMF-1220 Data Management Fundamentals Practice Questions

This document provides a comprehensive set of practice questions for the DMF-1220 exam, designed to reflect the actual exam's structure and topics. It includes topic-focused questions, accurate answer keys for self-review, and is intended for personal study use only. For additional resources, users are directed to visit CertQuestionsBank.com.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views13 pages

DMF-1220 Data Management Fundamentals Practice Questions

This document provides a comprehensive set of practice questions for the DMF-1220 exam, designed to reflect the actual exam's structure and topics. It includes topic-focused questions, accurate answer keys for self-review, and is intended for personal study use only. For additional resources, users are directed to visit CertQuestionsBank.com.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

This PDF contains a set of carefully selected practice questions for the

DMF-1220 exam. These questions are designed to reflect the


structure, difficulty, and topics covered in the actual exam, helping you
reinforce your understanding and identify areas for improvement.

What's Inside:

1. Topic-focused questions based on the latest exam objectives


2. Accurate answer keys to support self-review
3. Designed to simulate the real test environment
4. Ideal for final review or daily practice

Important Note:

This material is for personal study purposes only. Please do not


redistribute or use for commercial purposes without permission.

For full access to the complete question bank and topic-wise explanations, visit:
CertQuestionsBank.com

Our YouTube: https://www.youtube.com/@CertQuestionsBank

FB page: https://www.facebook.com/certquestionsbank
Share some DMF-1220 exam online questions below.
1.The implementation of a Data Warehouse should follow guiding principles, including:
A. Data Efficiency
B. One size does not fit all
C. Contracts
D. Focus on the business goals
E. Start with the end in mind
F. Collaborate
Answer: B,D,E,F

2.Please select the 3 visuals that depict DAMA’s Data Management Framework.
A. The DAMA Octagon
B. The Knowledge Area Context Diagram
C. The Data Quality Function Context Diagram
D. The DAMA Wheel
E. The Environmental Factors hexagon
Answer: B,D,E

3.The Data Warehouse (DW) is a combination of three primary components: An integrated decision
support database, related software programs and business intelligence reports.
A. FALSE
B. TRUE
Answer: A

4.Inputs in the reference and master data context diagram include:


A. None of the above
B. Business Drivers
C. Business model
D. Data Glossary
E. Cultural Drivers
F. All of the above
Answer: B,D

5.The dependencies of enterprise technology architecture are that it acts on specified data according
to business requirements.
A. TRUE
B. FALSE
Answer: B

6.Data asset valuation is the process of understanding and calculating the economic value of data to
an organisation. Value comes when the economic benefit of using data outweighs the costs of
acquiring and storing it, as
A. TRUE
B. FALSE
Answer: A
7.Examples of business metadata include:
A. Data models
B. Data quality rules
C. Data usage notes
D. Data Standards
Answer: A,B,C,D

8.Field overloading: Unnecessary data duplication is often a result of poor data management.
A. TRUE
B. FALSE
Answer: B

9.XML provides a language for representing both structures and unstructured data and information.
A. TRUE
B. FALSE
Answer: A

10.Issues caused by data entry processes include:


A. Training issues
B. List entry replacement
C. Software issues
D. Soft state issues
E. Change to business processes
F. Inconsistent business process execution
Answer: A,B,E,F

11.Metadata is essential to the management of unstructured data as it id to the management of


structured data.
A. TRUE
B. FALSE
Answer: A

12.DAMA International’s Certified Data Management Professional (CDMP) certification required that
data management professionals subscribe to a formal code of ethics, including an obligation to
handle data ethically for the sake of society beyond the organization that employs them.
A. TRUE
B. FALSE
Answer: A

13.Change Data Capture is a method of reducing bandwidth by filtering to include only data that has
been changed within a defined timeframe.
A. TRUE
B. FALSE
Answer: A
14.Different levels of policy are required to govern behavior to enterprise security. For example:
A. Data security policy
B. Business Security Policy
C. IT security policy
D. Enterprise security policy
E. All of the above
F. None of the above
Answer: A,C,D

15.A deliverable in the data modelling and design context diagram is the logical data model.
A. TRUE
B. FALSE
Answer: A

16.Metadata management solutions include architectural layers including:


A. Metadata control and management
B. Metadata Marketing
C. Metadata usage
D. Metadata integration
E. Metadata Sales
F. Metadata delivery
Answer: A,C,D,F

17.A metadata repository is essential to assure the integrity and consistent use of an enterprise data
model across business processes.
A. TRUE
B. FALSE
Answer: A

18.Lack of automated monitoring represents serious risks, including:


A. Administrative and audit duties risk
B. Risk of compliance
C. Direction and recovery risk
D. Risk of reliance on inadequate native
Answer: A,C,D

19.Enterprise data architecture description must include both [1] as well as [2]
A. [1] Data Flow Design [2] Data Context Diagram
B. [1] Enterprise Data Model [2] Architecture Diagram
C. [1] Enterprise Data Model [2] Data Flow Design
D. [1] Enterprise Data Model [2] Data Context Diagram
Answer: C

20.Please select the option that correctly orders the models in decreasing level of detail:
A. None of the above
B. Conceptual model, Subject Area model, Logical model, Logical & Physical models for a project.
C. Logical model, Conceptual model, Subject Area model, Logical & Physical models for a project.
D. Conceptual model, Logical model, Subject Area model, Logical & Physical models for a project.
E. Subject Area model, Conceptual model, Logical model, Logical & Physical models for a project.
Answer: B

21.The flow of data in a data integration solution does not have to be designed and documented.
A. TRUE
B. FALSE
Answer: B

22.Normalisation is the process of applying rules in order to organise business complexity into stable
data structures.
A. TRUE
B. FALSE
Answer: A

23.ANSI standard 859 has three levels of control of data, based on the criticality of the data and the
perceived harm that would occur if data were corrupt or otherwise unavailable, including:
A. Basic
B. Formal
C. Informal
D. Custody
E. Revision
F. None of the above
Answer: B,D,E

24.Subtype absorption: The subtype entity attributes are included as nullable columns into a table
representing the supertype entity
A. FALSE
B. TRUE
Answer: B

25.Defining quality content requires understanding the context of its production and use, including:
A. Producers
B. Timing
C. None of the above
D. Delivery
E. Consumers
F. Format
Answer: A,B,D,E,F

26.Architects seek to design in a way that brings value to an organisation. To reach these goals, data
architects define and maintain specifications that:
A. Align data architecture with enterprise strategy and business architecture
B. Provide a standard business vocabulary for data and components
C. Outline high-level integrated designs to meet these requirements.
D. Integrate with overall enterprise architecture roadmap
E. Define the current state of data in the organization.
F. Express strategic data requirements
Answer: A,B,C,D,E,F

27.Inputs in the Data Integration and Interoperability context diagram include:


A. Data needs & standards
B. Data semantics
C. Business goals & strategies
D. Source data
Answer: A,B,C,D

28.Inputs in the data modelling and design context diagram include:


A. Data standards
B. Data sets
C. Data Management Architecture
D. Systems Architecture
E. Data architecture
F. Enterprise taxonomy
Answer: A,B,E,F

29.Please select the three types of data models:


A. Innovative Data Model
B. Logical Data Model
C. Dimensional Data model
D. Conceptual Data Model
E. Idea Data Model
F. Physical Data Model
Answer: B,C,F

30.A deliverable in the data security context diagram is the data security architecture.
A. TRUE
B. FALSE
Answer: A

31.Release management is critical to batch development processes that grows new capabilities.
A. TRUE
B. FALSE
Answer: B

32.If the target system has more transformation capability than either the source or the intermediary
application system, the order of processes may be switched to ELT C Extract Load Tranform.
A. TRUE
B. FALSE
Answer: A

33.Business Intelligence, among other things, refer to the technology that supports this kind of
analysis.
A. FALSE
B. TRUE
Answer: B

34.A limitation of the centralized metadata repository approach is it may be less expensive.
A. TRUE
B. FALSE
Answer: B

35.The minority of operational metadata is generated as data is processed.


A. TRUE
B. FALSE
Answer: B

36.What ISO standard defines characteristics that can be tested by any organisation in the data
supply chain to objectively determine conformance of the data to this ISO standard.
A. ISO 9000
B. ISO 7000
C. ISO 8000
D. ISO 9001
Answer: C

37.Enterprise data architecture project-related activities include:


A. Define maturity assessment
B. Define scope
C. Design
D. Implement
E. None of the above
F. All of the above
Answer: B,C,D

38.Data Management Professionals only work with the technical aspects related to data.
A. TRUE
B. FALSE
Answer: B

39.Data models are critical to effective management of data. They:


A. Provide a common vocabulary around data
B. Capture and document explicit knowledge about an organization’s data and systems
C. Serve as a primary communication tool during projects D. Provide the starting point for
customizations, integration or even replacement of an application
E. Provide the organisation with clear system of the architecture
F. Make the integration between data management and data analytics possible
Answer: A,B,C,D

40.Reference and master data require governance processes, including:


A. The data sources to be integrated
B. Emotions matrix
C. Compliance framework
D. The priority and response levels of data stewardship efforts
E. The conditions of use rules to be followed
F. None of the above
Answer: A,D,E

41.The language used in file-based solutions is called MapReduce. This language has three main
steps:
A. Map
B. Shuffle
C. Free
D. Terminate
E. Integrate
F. Reduce
Answer: A,B,F

42.Effective data management involves a set of complex, interrelated processes that enable an
organisation to use its data to achieve strategic goals.
A. TRUE
B. FALSE
Answer: A

43.Data governance requires control mechanisms and procedures for, but not limited to, facilitating
subjective discussions where managers’ viewpoints are heard.
A. TRUE
B. FALSE
Answer: B

44.Machine learning explores the construction and study of learning algorithms.


A. TRUE
B. FALSE
Answer: A

45.Misleading visualisations could be an example where a base level of truthfulness and


transparency are not adhered to.
A. TRUE
B. FALSE
Answer: A
46.Data Governance Office (DGO) focuses on enterprise-level data definitions and data management
standards across all DAMA-DMBOK knowledge areas. Consists of coordinating data management
roles.
A. TRUE
B. FALSE
Answer: A

47.DBAs and database architects combine their knowledge of available tools with the business
requirements in order to suggest the best possible application of technology to meet organizational
goals.
A. FALSE
B. TRUE
Answer: B

48.Data profiling is a form of data analysis used to inspect data and assess quality.
A. TRUE
B. FALSE
Answer: A

49.Vulnerability is defined as:


A. a patch in a system that allows it to be successfully unpatched and compromised.
B. being highly data risk rated
C. a strength in a system that allows external stakeholders to view data records.
D. a weakness or defect in a system that allows it to be successfully attacked and compromised.
Answer: D

50.Data security internal audits ensure data security and regulatory compliance policies are followed
should be conducted regularly and consistently.
A. TRUE
B. FALSE
Answer: A

51.Business activity information is one of the types of data that can be modelled.
A. TRUE
B. FALSE
Answer: B

52.Bold means doing something that might cause short term pain, not just something that looks good
in a marketing email.
A. TRUE
B. FALSE
Answer: A

53.Please select the two concepts that drive security restrictions:


A. Regulation
B. Regression
C. Confidence level
D. Confidentiality level
Answer: A,D

54.Barriers to effective management of data quality include:


A. Inappropriate or ineffective instruments to measure value
B. Lack of awareness on the part of leadership and staff
C. Lack of leadership and management
D. Lack of business governance
E. None of the above
F. Difficulty in justification of improvements
Answer: A,B,C,D,F

55.A sandbox is an alternate environment that allows write-only connections to production data and
can be managed by the administrator.
A. TRUE
B. FALSE
Answer: B

56.If data is not integrated with care it presents risk for unethical data handling. These ethical risks
intersect with fundamental problems in data management including: Limited knowledge of data’s
origin and lineage; Data of poor quality; Unreliable Metadata; and Documentation of error
remediation.
A. TRUE
B. FALSE
Answer: B

57.Business glossaries have the following objectives:


A. Improve the alignment between technology assets and the business organization
B. All of the above
C. Cultural factors that might improve the concepts and terminology
D. Maximise search capability and enable access to documented institutional knowledge
E. Enable common understanding of the core business concepts and terminology
F. Reduce the risk that data will be misused due to inconsistent understanding of the business
concepts.
Answer: A,D,E,F

58.Principles for data asset accounting include:


A. Accounting Principle
B. Due Diligence Principle
C. Asset Principle
D. Audit Principle
E. Going Concern Principle
F. All of the above
Answer: F
59.Sample value metrics for a data governance program include:
A. Reduction of risk
B. Improved efficiency in operations
C. Effectiveness of education
D. Achievements of goals and objectives
E. Contributions to business objectives
F. Effectiveness of communication
Answer: A,B,E

60.CIF stands for:


A. Company Information Factory
B. Corporate Information Floor
C. Corporate Information Factories
D. Corporate Information Factory
Answer: D

61.There are several reasons to denormalize data. The first is to improve performance by:
A. Creating smaller copies of fata to reduce costly run-time calculations and/or table scans of large
tables.
B. None of the above
C. Pre-calculating and sorting costly data calculations to avoid runt-time system resource competition.
D. Making tables more readable when no foreign key exists
E. Combining data from multiple other tables in advance to avoid costly run-time joins
F. All of the above
Answer: A,C,E

62.The need to manage data movement efficiently is a primary driver for Data Integration and
Interoperability.
A. TRUE
B. FALSE
Answer: A

63.Small reference data value sets in the logical data model can be implemented in a physical model
in three common ways:
A. Create a matching separate code table
B. Create a master shared code table
C. None of the above
D. Program integration by joining tables
E. Embed rules or valid codes into the appropriate object’s definition.
F. Roadmap Development
Answer: A,B,E

64.Part of alignment includes developing organizational touchpoints for data governance work. Some
examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory
Compliance; and the SDLC framework.
A. TRUE
B. FALSE
Answer: A

65.Examples of technical metadata include:


A. Access permission
B. Recovery and backup rules
C. Colum properties
D. Data subject properties
Answer: A,B,C,D

66.All organizations have the same Master Data Management Drivers and obstacles.
A. TRUE
B. FALSE
Answer: B

67.JSON is an open, lightweight standard format for data interchange.


A. FALSE
B. TRUE
Answer: B

68.Please select the types of DBA specializations:


A. Data
B. Application
C. Innovation
D. Development
E. Procedural
F. All of the above
Answer: B,D,E

69.The data in Data warehouses and marts differ. Data is organized by subject rather than function
A. TRUE
B. FALSE
Answer: A

70.A goal of Data warehouse and business intelligence is to support and enable ineffective business
analysis and decision making by knowledge workers.
A. TRUE
B. FALSE
Answer: B

71.CMA is an abbreviation for Capability Maturity Assessment.


A. TRUE
B. FALSE
Answer: A
72.A roadmap for enterprise data architecture describes the architecture’s 3 to 5-year development
path. The roadmap should be guided by a data management maturity assessment.
A. TRUE
B. FALSE
Answer: A

73.Operational Metadata describes details of the processing and accessing of data.


Which one is not an example:
A. Error logs
B. Schedule anomalies
C. Purge criteria
D. Failure logs
Answer: D

Get DMF-1220 exam dumps full version.

Powered by TCPDF (www.tcpdf.org)

You might also like