Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

DAMA DMF-1220 Data Management Fundamentals Exam Practice Test

Page: 1 / 49
Total 486 questions

Data Management Fundamentals Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A goal of data architecture is to identify data storage and processing requirements.

Options:

A.

TRUE

B.

FALSE

Question 2

Deliverables in the document and content management context diagram include:

Options:

A.

Metadata and reference data

B.

Policy and procedure

C.

Data governance

D.

Content and records management strategy

E.

Audit trail and log

F.

Data storage and operations

Question 3

Improving data quality requires a strategy that accounts for the work that needs to be done and the way people will execute it.

Options:

A.

TRUE

B.

FALSE

Question 4

SOA stand for Service Orchestrated Architecture

Options:

A.

TRUE

B.

FALSE

Question 5

Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.

Options:

A.

FALSE

B.

TRUE

Question 6

A data dictionary is necessary to support the use of a DW.

Options:

A.

TRUE

B.

FALSE

Question 7

Data governance and IT governance are the same thing.

Options:

A.

TRUE

B.

FALSE

Question 8

SOA stands for:

Options:

A.

Service orchestrated architecture

B.

Service orientated access

C.

Service orientated architecture

D.

Service overall architecture

Question 9

Databases are categorized in three general ways:

Options:

A.

Warped

B.

Non-relational

C.

Relational

D.

Accessible

E.

None of the above

F.

Hierarchical

Question 10

Value is the difference between the cost of a thing and the benefit derived from that thing.

Options:

A.

TRUE

B.

FALSE

Question 11

Domains can be identified in different ways including: data type; data format; list; range; and rule-based.

Options:

A.

TRUE

B.

FALSE

Question 12

The term data quality refers to only the characteristics associated with high quality data.

Options:

A.

TRUE

B.

FALSE

Question 13

Examples of transformation in the ETL process onclude:

Options:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Question 14

Change only requires change agents in special circumstances, especially when there is little to no adoption.

Options:

A.

TRUE

B.

FALSE

Question 15

In Resource Description Framework (RDF) terminology, a triple store is composed of a subject that denotes a resource, the predicate that expresses a relationship between the subject and the object, and the object itself.

Options:

A.

FALSE

B.

TRUE

Question 16

While the focus of data quality improvement efforts is often on the prevention of errors, data quality can also be improved through some forms of data processing.

Options:

A.

TRUE

B.

FALSE

Question 17

RACI is an acronym that is made up of the following terms.

Options:

A.

Control

B.

Responsible

C.

Accountable

D.

Informed

E.

Reliable

F.

Consulted

Question 18

Enterprise Architecture domains include:

Options:

A.

Business Architecture

B.

Data Architecture

C.

Data Management Architecture

D.

Systems Architecture

E.

Application Architecture

F.

Technology Architecture

Question 19

Data integrity is the state of being partitioned – protected from being whole.

Options:

A.

TRUE

B.

FALSE

Question 20

One common KPI of e-discovery is cost reduction.

Options:

A.

FALSE

B.

TRUE

Question 21

Within the Data Handling Ethics Context Diagram a key deliverable is the Ethical Data Handling Strategy.

Options:

A.

TRUE

B.

FALSE

Question 22

The load step of the ETL is physically storing or presenting the results of the transformation into the source system.

Options:

A.

TRUE

B.

FALSE

Question 23

Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:

Options:

A.

The triggers for effective change

B.

Data architecture

C.

How people experience changes

D.

Data security

E.

The barriers to change

F.

Why change fails

Question 24

Release management is critical to batch development processes that grows new capabilities.

Options:

A.

TRUE

B.

FALSE

Question 25

Data Integration and Interoperability is dependent on these other areas of data management:

Options:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Question 26

In the context of big data the Three V’s refer to: Volume, Velocity and Validity

Options:

A.

FALSE

B.

TRUE

Question 27

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

Options:

A.

Stakeholders

B.

Government regulations

C.

Proprietary business concerns

D.

Legitimate access needs

E.

Contractual obligations

F.

None of the above

Question 28

Resource Description Framework (RDF), a common framework used to describe information about any Web resource, is a standard model for data interchange in the Web.

Options:

A.

FALSE

B.

TRUE

Question 29

Data handling ethics are concerned with how to procure, store, manage, use and disposeof data in ways that are aligned with ethical principles.

Options:

A.

TRUE

B.

FALSE

Question 30

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

Options:

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Question 31

With reliable Metadata an organization does not know what data it has, what the data represents and how it moves through the systems, who has access to it, or what it means for the data to be of high quality.

Options:

A.

TRUE

B.

FALSE

Question 32

Typically, DW/BI projects have three concurrent development tracks, including:

Options:

A.

Technology

B.

Trickle Feeds

C.

Data

D.

BI Tools

E.

Messaging

F.

Streaming

Question 33

Many people assume that most data quality issues are caused by data entry errors. A more sophisticated understanding recognizes that gaps in or execution of business and technical processes cause many more problems that mis-keying.

Options:

A.

TRUE

B.

FALSE

Question 34

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:

Options:

A.

Charter

B.

Operating framework and accountabilities

C.

Implementation roadmap

D.

Plan for operational success

E.

All of the above

F.

None of the above

Question 35

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:

Options:

A.

Specific risk management

B.

General risk management

C.

Data ethics

D.

Data security

E.

Publicity

F.

Privacy

Question 36

Some document management systems have a module that may support different types of workflows such as:

Options:

A.

Quality Assurance Testing (QA)

B.

Manual workflows that indicate where the user send the document

C.

User Acceptance Testing (UAT)

D.

Dynamic rules that allow for different workflows based on content

E.

All of the above

F.

None of the above

Question 37

Principles for data asset accounting include:

Options:

A.

Accounting Principle

B.

Due Diligence Principle

C.

Asset Principle

D.

Audit Principle

E.

Going Concern Principle

F.

All of the above

Question 38

Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.

Options:

A.

FALSE

B.

TRUE

Question 39

The information governance maturity model describes the characteristics of the information governance and recordkeeping environment at five levels of maturity for each of the eight GARP principles. Please select the correct level descriptions:

Options:

A.

Level 2 In Development

B.

Level 4 Proactive

C.

Level 2 Sub-standard

D.

Level 4 Proactive

E.

Level 3 Transformational

F.

Level 3 Essential

Question 40

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

Options:

A.

FALSE

B.

TRUE

Question 41

A completely distributed architecture maintains a single access point. The metadata retrieval engine responds to user requests by retrieving data from source systems in real time.

Options:

A.

FALSE

B.

TRUE

Question 42

Data security internal audits ensure data security and regulatory compliance policies are followed should be conducted regularly and consistently.

Options:

A.

TRUE

B.

FALSE

Question 43

The first two steps of the Reference data Change request process, as prescribed DMBOk2, include:

Options:

A.

Decide and Communicate

B.

Receive Change Request

C.

Update and Inform

D.

Identify Stakeholder

E.

Identify Impact

Question 44

One of the deliverables in the Data Integration and Interoperability context diagram is:

Options:

A.

Data Integration and Interoperability Strategy

B.

Data hogging

C.

Data access agreements

D.

Data security plan

Question 45

ECM is an abbreviation for:

Options:

A.

Enterprise compliance management

B.

Enterprise compliance manager

C.

Enterprise component management

D.

Enterprise content management

Question 46

Data replication can be active or passive.

Options:

A.

TRUE

B.

FALSE

Question 47

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

Options:

A.

What activities analytics will focus on

B.

How they select their populations for study

C.

All of the above

D.

How data will be captured

E.

How results will be made accessible

Question 48

Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.

Options:

A.

FALSE

B.

TRUE

Question 49

Data can be assessed based on whether it is required by:

Options:

A.

Regulatory reporting

B.

Capturing policy

C.

Ongoing operations

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Business policy

F.

Make the integration between data management and data analytics possible

Question 50

The process of building architectural activities into projects also differ between methodologies. They include:

Options:

A.

Waterfall methods

B.

Incremental methods

C.

Kanban method

D.

Agile iterative method

E.

Duck and dive method

F.

Pump and dump method

Question 51

A content strategy should end with an inventory of current state and a gap assessment.

Options:

A.

TRUE

B.

FALSE

Question 52

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

Options:

A.

All of the above

B.

Streaming

C.

Messaging

D.

Technology

E.

Data

F.

Trickle Feeds

Question 53

There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.

Options:

A.

Immediate recovery

B.

Intermittent recovery

C.

Critical recovery

D.

Translucent recovery

E.

BMT recovery

F.

Non-critical recovery

Question 54

Type of Reference Data Changes include:

Options:

A.

Row level changes to internal Reference Data sets

B.

Row level changes to external Reference Data sets

C.

Creation of new Reference Data sets

D.

Business model changes on column level

E.

Structural changes to external Reference Data sets

F.

None of the above

Question 55

Data and enterprise architecture deal with complexity from two viewpoints:

Options:

A.

None of the above

B.

Implementation-orientated

C.

Quality-orientated

D.

Architecture-orientated

E.

Innovation-orientated

F.

Industry-orientated

Question 56

Elements that point to differences between warehouses and operational systems include:

Options:

A.

Historical

B.

Data security standards

C.

Subject-orientated

D.

Non-volatile

E.

Data quality

F.

Integrated

Question 57

The Belmont principles that may be adapted for Information Management disciplines, include:

Options:

A.

Respect for Persons

B.

Respect for Machines

C.

Beneficence

D.

Criminality

E.

Justice

Question 58

Disciplines within the enterprise architecture practice does not include:

Options:

A.

Technology architecture

B.

Application architecture

C.

Information architecture

Service Architecture

D.

Business architecture

Question 59

Deliverables in the data management maturity assessment context diagram include:

Options:

A.

Maturity baseline

B.

Roadmap

C.

Executive briefings

D.

Recommendations

E.

Risk assessment

F.

Ratings and ranks

Question 60

Data governance requires control mechanisms and procedures for, but not limited to, identifying, capturing, logging and updating actions.

Options:

A.

FALSE

B.

TRUE

Question 61

Big data primarily refers specifically to the volume of the data.

Options:

A.

TRUE

B.

FALSE

Question 62

What are the primary drivers of data security activities?

Options:

A.

Risk reduction

B.

Risk alleviation

C.

Business growth

D.

Business compliance

Question 63

BI tool types include:

Options:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

Question 64

The language used in file-based solutions is called MapReduce. This language has three main steps:

Options:

A.

Map

B.

Shuffle

C.

Free

D.

Terminate

E.

Integrate

F.

Reduce

Question 65

Tools required to manage and communicate changes in data governance programs include

Options:

A.

Ongoing business case for data governance

B.

Obtaining buy-in from all stakeholders

C.

Data governance roadmap

D.

Monitoring the resistance

E.

Business/Data Governance strategy map

F.

Data governance metrics

Question 66

Effective data management involves a set of complex, interrelated processes that disable an organization to use its data to achieve strategic goals.

Options:

A.

FALSE

B.

TRUE

Question 67

Examples of technical metadata include:

Options:

A.

Access permission

B.

Recovery and backup rules

C.

Colum properties

D.

Data subject properties

Question 68

Content management includes the systems for organizing information resources so that they can specially be stored.

Options:

A.

TRUE

B.

FALSE

Question 69

Inputs in the data modelling and design context diagram include:

Options:

A.

Data standards

B.

Data sets

C.

Data Management Architecture

D.

Systems Architecture

E.

Data architecture

F.

Enterprise taxonomy

Question 70

Reference and Master Data Management follow these guiding principles:

Options:

A.

Obtaining buy-in from all stakeholders

B.

Stewardship

C.

Monitoring the resistance

D.

Ownership

E.

Addressing all queries

F.

Controlled change

Question 71

Triplestores can be classified into these categories:

Options:

A.

Native triplestores

B.

All of the above

C.

None of the above

D.

RDMS-backed triplestores

E.

NoSQL triplestores

F.

MapReduce triplestores

Question 72

Lack of automated monitoring represents serious risks, including compliance risk.

Options:

A.

TRUE

B.

FALSE

Page: 1 / 49
Total 486 questions