DMF-1220 Practice Test Questions

479 Questions


The CAP theorem asserts that the distributed system cannot comply with all the parts of the ACID. A distributed system must instead trade-off between the following properties:


A. Consistency


B. Utilization


C. Availability


D. System development


E. Partition tolerance


F. All of the above





A.
  Consistency

C.
  Availability

E.
  Partition tolerance

As an often-overlooked aspects of basic data movement architecture, Process controls include:


A. Consistency logging


B. Exception logs


C. Database activity logs


D. Alerts


E. Exception logs


F. All of the above





B.
  Exception logs

C.
  Database activity logs

D.
  Alerts

E.
  Exception logs

Business activity information is one of the types of data that can be modelled.


A. TRUE


B. FALSE





B.
  FALSE

A communication plan includes an engagement model for stakeholders, the type of information to be shared, and the schedule for sharing information.


A. TRUE


B. FALSE





A.
  TRUE

Inputs in the reference and master data context diagram include:


A. None of the above


B. Business Drivers


C. Business model


D. Data Glossary


E. Cultural Drivers


F. All of the above





B.
  Business Drivers

D.
  Data Glossary

Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.


A. FALSE


B. TRUE





B.
  TRUE

CMA is an abbreviation for Capability Maturity Assessment.


A. TRUE


B. FALSE





A.
  TRUE

The scope and focus of any data governance program depend on organizational needs, but most programs include:


A. Strategy


B. Policy


C. Data Management Projects


D. Compliance


E. Oversight


F. All of the above





F.
  All of the above

Examples of business processes when constructing data flow diagrams include:


A. Order Management


B. Marketing & Sales


C. Sales order


D. Invoicing


E. Product Development


F. Customer





A.
  Order Management

B.
  Marketing & Sales

D.
  Invoicing

E.
  Product Development

To mitigate risks, implement a network-based audit appliance, which can address most of the weaknesses associated with the native audit tools. This kind of appliance has the following benefits:


A. Granular transaction tracking


B. High performance


C. Transaction time


D. Separation of duties





A.
  Granular transaction tracking

B.
  High performance

D.
  Separation of duties

Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.


A. TRUE


B. FALSE





A.
  TRUE

In the Abate Information Triangle the past moves through the following echelons befor it comes insight:


A. Data


B. Information


C. Information


D. Knowledge


E. Big data


F. Time





A.
  Data

B.
  Information

D.
  Knowledge


Page 16 out of 40 Pages
Previous