DMF-1220 Practice Test Questions

479 Questions


A control activity in the metadata management environment includes loading statistical analysis.


A. FALSE


B. TRUE





B.
  TRUE

Malware refers to any infectious software created to damage, change or improperly access a computer or network.


A. TRUE


B. FALSE





A.
  TRUE

A node is a group of computers hosting either processing or data as part of a distributed database.


A. TRUE


B. FALSE





B.
  FALSE

Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.


A. TRUE


B. FALSE





A.
  TRUE

Service accounts are convenient because they can tailor enhanced access for the processes that use them.


A. TRUE


B. FALSE





A.
  TRUE

The accuracy dimension has to do with the precision of data values.


A. TRUE


B. FALSE





A.
  TRUE

The goal of data architecture is to:


A. Serve as a platform to enable data governance and management


B. Bridge between business strategy and technology execution


C. Provide the organisation with clear system of the architecture


D. Make the integration between data management and data analytics possible





B.
  Bridge between business strategy and technology execution

A deliverable in the data architecture context diagram includes an implementation roadmap.


A. TRUE


B. FALSE





A.
  TRUE

There are several methods for masking data:


A. Substitution


B. Temporal variance


C. Temporal stagnation


D. Value stagnation


E. Value variance


F. All of the above





A.
  Substitution

B.
  Temporal variance

E.
  Value variance

Device security standard include:


A. Installation of anti-malware and encryption software


B. Relational security policies


C. Access policies regarding connections using mobile devices


D. Regulation compliance standards


E. None of the above


F. Awareness of security vulnerabilities





A.
  Installation of anti-malware and encryption software

C.
  Access policies regarding connections using mobile devices

F.
  Awareness of security vulnerabilities

A Metadata repository contains information about the data in an organization, including:


A. Hierarchical


B. Data structure


C. Warped


D. Business rules for managing data


E. Content


F. None of the above





B.
  Data structure

D.
  Business rules for managing data

E.
  Content

The difference between warehouses and operational systems do not include the following element:


A. Time variant


B. Database


C. Subject-orientated


D. Historical





C.
  Subject-orientated


Page 3 out of 40 Pages
Previous