DMF-1220 Practice Test Questions

479 Questions


The goals of data security include:


A. Managing performance of data assets


B. Enable appropriate access to enterprise data assets


C. Managing the availability of data throughout the data lifecycle


D. Understand and comply with all relevant regulations and policies for privacy and confidentiality


E. Managing the performance of data transactions


F. Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited





B.
  Enable appropriate access to enterprise data assets

D.
  Understand and comply with all relevant regulations and policies for privacy and confidentiality

F.
  Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Real-time data integration is usually triggered by batch processing, such as historic data.


A. TRUE


B. FALSE





B.
  FALSE

Data handling ethics are concerned with how to procure, store, manage, use and disposeof data in ways that are aligned with ethical principles.


A. TRUE


B. FALSE





A.
  TRUE

In an information management context, the short-term wins and goals often arise from the resolution of an identified problem.


A. TRUE


B. FALSE





A.
  TRUE

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.


A. TRUE


B. FALSE





A.
  TRUE

A critical step in data management organization design is identifying the best-fit operating model for the organization.


A. TRUE


B. FALSE





A.
  TRUE

There are several reasons to denormalize data. The first is to improve performance by:


A. Creating smaller copies of fata to reduce costly run-time calculations and/or table scans of large tables


B. None of the above


C. Pre-calculating and sorting costly data calculations to avoid runt-time system resource competition.


D. Making tables more readable when no foreign key exists


E. Combining data from multiple other tables in advance to avoid costly run-time joins


F. All of the above





A.
  Creating smaller copies of fata to reduce costly run-time calculations and/or table scans of large tables

C.
  Pre-calculating and sorting costly data calculations to avoid runt-time system resource competition.

E.
  Combining data from multiple other tables in advance to avoid costly run-time joins

Sample value metrics for a data governance program include:


A. Reduction of risk


B. Improved efficiency in operations


C. Effectiveness of education


D. Achievements of goals and objectives


E. Contributions to business objectives


F. Effectiveness of communication





A.
  Reduction of risk

B.
  Improved efficiency in operations

E.
  Contributions to business objectives

The best DW/BI architects will design a mechanism to connect back to transactional level and operational level reports in an atomic DW.


A. FALSE


B. TRUE





B.
  TRUE

A data governance strategy defines the scope and approach to governance efforts. Deliverables include:


A. Charter


B. Operating framework and accountabilities


C. Implementation roadmap


D. Plan for operational success


E. All of the above


F. None of the above





E.
  All of the above

Please select the four domains of enterprise architecture:


A. Enterprise software architecture


B. Enterprise technology architecture


C. Enterprise business architecture


D. Enterprise data architecture


E. Enterprise hardware architecture


F. Enterprise application architecture





B.
  Enterprise technology architecture

C.
  Enterprise business architecture

D.
  Enterprise data architecture

F.
  Enterprise application architecture

Managing business party Master Data poses these unique challenges:


A. Difficulties in unique dimensions


B. Difficulties in unique identification


C. Reference data anomaly detection


D. The number of data sources and the differences between them





B.
  Difficulties in unique identification

C.
  Reference data anomaly detection

D.
  The number of data sources and the differences between them


Page 1 out of 40 Pages