Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

DMF-1220 Sample Questions Answers

Questions 4

Corrective actions are implemented after a problem has occurred and been detected.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 5

The accuracy dimension has to do with the precision of data values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

Data governance and IT governance are the same thing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

Please select the correct general cost and benefit categories that can be applied consistently within an organization.

Options:

A.

Cost of erasing data from servers

B.

Cost of improving data

C.

What the data could be sold for

D.

Benefit of higher quality data

E.

Cost of replacing data if it were lost

F.

What competitors would pay for data

Buy Now
Questions 8

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

Options:

A.

Stakeholders

B.

Government regulations

C.

Proprietary business concerns

D.

Legitimate access needs

E.

Contractual obligations

F.

None of the above

Buy Now
Questions 9

Metadata management solutions include architectural layers including:

Options:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Buy Now
Questions 10

Change Data Capture is a method of reducing bandwidth by filtering to include only data that has been changed within a defined timeframe.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

DMMA ratings represent a snapshot of the organization’s capability level.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:

Options:

A.

Streaming

B.

Messaging

C.

DAAS

D.

Trickle Feeds

Buy Now
Questions 13

A goal of data architecture is to identify data storage and processing requirements.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Data science depends on:

Options:

A.

Information alignment and analysis

B.

Presentation of findings and data insights

C.

Rich data sources

D.

Information delivery

Buy Now
Questions 15

A node is a group of computers hosting either processing or data as part of a distributed database.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

Data lineage is useful to the development of the data governance strategy.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

Tools required to manage and communicate changes in data governance programs include

Options:

A.

Ongoing business case for data governance

B.

Obtaining buy-in from all stakeholders

C.

Data governance roadmap

D.

Monitoring the resistance

E.

Business/Data Governance strategy map

F.

Data governance metrics

Buy Now
Questions 18

Reference and Master data definition: Managing shared data to meet organizational goals, reduce risks associated with data redundancy, ensure higher quality, and reduce the costs of data integration.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

Volume refers to the amount of data. Big Data often has thousands of entities or elements in billions of records.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

The Data Model Scorecard provides 10 data model quality metrics

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

CMA is an abbreviation for Capability Maturity Assessment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Logical abstraction entities become separate objects in the physical database design using one of two methods.

Options:

A.

The DAMA Wheel

B.

Supertype partition

C.

Subtype partition

D.

Subtype absorption

E.

Supertype absorption

Buy Now
Questions 23

The acronym CMDB stands for:

Options:

A.

Customization management tools or databases

B.

Classic management technologies or databases

C.

Cached management technologies or databases

D.

Configuration management tools or databases

E.

Cached management tools or databases

F.

Classic monitoring technologies or databases

Buy Now
Questions 24

Data quality management is a key capability of a data management practice and organization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

Technical metadata describes details of the processing and accessing of data.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 26

Triplestores can be classified into these categories:

Options:

A.

Native triplestores

B.

All of the above

C.

None of the above

D.

RDMS-backed triplestores

E.

NoSQL triplestores

F.

MapReduce triplestores

Buy Now
Questions 27

The IT security policy provides categories for individual application, database roles, user groups and information sensitivity.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

Please select the 2 frameworks that show high-level relationships that influence how an organization manages data.

Options:

A.

Strategic Alignment Model

B.

DAMA DMBOK Hexagon

C.

DAMA Wheel

D.

Amsterdam Information Model

Buy Now
Questions 29

A goal of Data warehouse and business intelligence is to support and enable ineffective business analysis and decision making by knowledge workers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

Examples of technical metadata include:

Options:

A.

Column Properties

B.

Access permissions

C.

Internal

D.

Conceptual

E.

ETL job details

Buy Now
Questions 31

Please select the correct principles of the General Data Protection Regulation (GDPR) of the EU.

Options:

A.

Purpose Limitation

B.

Data Minimisation

C.

Accuracy

D.

Storage Limitation

E.

Accountability

F.

All of the above

Buy Now
Questions 32

Please select the answer that does not represent a machine learning algorithm:

Options:

A.

Reinforcement learning

B.

Supervised learning

C.

Artificial learning

D.

Unsupervised learning

Buy Now
Questions 33

The goals of data security include:

Options:

A.

Managing performance of data assets

B.

Enable appropriate access to enterprise data assets

C.

Managing the availability of data throughout the data lifecycle

D.

Understand and comply with all relevant regulations and policies for privacy and confidentiality

E.

Managing the performance of data transactions

F.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Buy Now
Questions 34

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 35

It is unwise to implement data quality checks to ensure that the copies of the attributes are correctly stored.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 36

Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

Issues caused by data entry processes include:

Options:

A.

Data entry interface issues

B.

List entry placement

C.

Field overloading

D.

None of the above

E.

Training issues

F.

Changes to business processes

Buy Now
Questions 38

The most common drivers for initiating a Mater Data Management Program are:

Options:

A.

Metadata insecurity

B.

Managing data quality

C.

Reducing risk

D.

Managing the costs of data integration

E.

Meeting organizational data requirements

F.

Reducing latency

Buy Now
Questions 39

The language used in file-based solutions is called MapReduce. This language has three main steps:

Options:

A.

Map

B.

Shuffle

C.

Free

D.

Terminate

E.

Integrate

F.

Reduce

Buy Now
Questions 40

Enterprise data architecture description must include both [1] as well as [2]

Options:

A.

[1] Data Flow Design [2] Data Context Diagram

B.

[1] Enterprise Data Model [2] Architecture Diagram

C.

[1] Enterprise Data Model [2] Data Flow Design

D.

[1] Enterprise Data Model [2] Data Context Diagram

Buy Now
Questions 41

Data governance requires control mechanisms and procedures for, but not limited to, facilitating subjective discussions where managers’ viewpoints are heard.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

There are three techniques for data-based change data capture, namely:

Options:

A.

The source system populates specific data elements.

B.

Application automated interfaces

C.

The source system processes copy data that has changed into a separate object as part of the transaction, which is then used for the extract process.

D.

The source systems send binary code through ASCI that makes the process rapid.

E.

The source system processes add to a simple list of objects and identifiers when changing data, which is then used to control selection of data extraction.

F.

None of the above

Buy Now
Questions 43

An application DBA leads the review and administration of procedural database objects.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

Field overloading: Unnecessary data duplication is often a result of poor data management.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 46

The deliverables in the data architecture context diagram include:

Options:

A.

Data flows

B.

Enterprise data

C.

Implementation roadmap

D.

Data Value Chains

E.

None of the above

F.

All of the above

Buy Now
Questions 47

Data modeller: responsible for fata model version control an change control

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

Please select the correct name for the LDM abbreviation

Options:

A.

Logical Data Model

B.

Logical Dimensional Model

C.

Lifecycle Data Model

D.

Lifecycle Dimensional Model

Buy Now
Questions 49

Select three correct attributes a data governance programme must be:

Options:

A.

Embedded

B.

Flexible

C.

Measures

D.

Rigid

E.

Independent responsibility

F.

Sustainable

Buy Now
Questions 50

BI tool types include:

Options:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

Buy Now
Questions 51

With reliable Metadata an organization does not know what data it has, what the data represents and how it moves through the systems, who has access to it, or what it means for the data to be of high quality.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 52

The acronym BASE is made up of:

Options:

A.

Basically available

B.

Basically not available

C.

Software state

D.

Soft state

E.

Eventual consistency

F.

Everything considered

Buy Now
Questions 53

Accomplish repository scanning in two distinct approaches, including:

Options:

A.

Semi- proprietary integration

B.

Proprietary interface

C.

Semi-proprietary interface

D.

Proprietary integration

Buy Now
Questions 54

Business activity information is one of the types of data that can be modelled.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 55

Content needs to be modular, structured, reusable and device and platform independent.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 56

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

Communication should start later in the process as too many inputs will distort the vision.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 58

Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

Data flows map and document relationships between data and:

Options:

A.

Locations where local differences occur

B.

Situations where local differences occur

C.

Network segments

D.

Applications within a business process

E.

None of the above

F.

All of the above

Buy Now
Questions 61

An input in the Metadata management context diagram does not include:

Options:

A.

Business requirements

B.

Business metadata

C.

Technical metadata

D.

Metadata standards

E.

Process Metadata

Buy Now
Questions 62

Subtype absorption: The subtype entity attributes are included as nullable columns into a table representing the supertype entity

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 63

Examples of data enhancement includes:

Options:

A.

All of the above

B.

Audit data

C.

Contextual information

D.

Incorporate Enterprise Technology

E.

Reference vocabularies

F.

Select Notation

Buy Now
Questions 64

Data professionals involved in Business Intelligence, analytics and Data Science are often responsible for data that describes: who people are; what people do; where people live; and how people are treated. The data can be misused and counteract the principles underlying data ethics.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 65

Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 66

Reference and Master Data Management follow these guiding principles:

Options:

A.

Quality

B.

Stewardship

C.

Authority

D.

Ownership

E.

Exclusivity

F.

Inclusivity

Buy Now
Questions 67

DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 68

Snowflaking is the term given to normalizing the flat, single-table, dimensional structure in a star schema into the respective component hierarchical or network structures.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 69

The data in Data warehouses and marts differ. Data is organized by subject rather than function

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

A goal of data governance is to enable an organisation to manage its data as a liability.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 71

A sandbox environment can either be a sub-set of the production system, walled off from production processing or a completely separate environment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 72

To mitigate risks, implement a network-based audit appliance, which can address most of the weaknesses associated with the native audit tools. This kind of appliance has the following benefits:

Options:

A.

Granular transaction tracking

B.

High performance

C.

Transaction time

D.

Separation of duties

Buy Now
Exam Code: DMF-1220
Exam Name: Data Management Fundamentals
Last Update: May 4, 2024
Questions: 486
$64  $159.99
$48  $119.99
$40  $99.99
buy now DMF-1220