A control activity in the metadata management environment includes loading statistical analysis.
A. FALSE
B. TRUE
Malware refers to any infectious software created to damage, change or improperly access a computer or network.
A. TRUE
B. FALSE
A node is a group of computers hosting either processing or data as part of a distributed database.
A. TRUE
B. FALSE
Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.
A. TRUE
B. FALSE
Service accounts are convenient because they can tailor enhanced access for the processes that use them.
A. TRUE
B. FALSE
The accuracy dimension has to do with the precision of data values.
A. TRUE
B. FALSE
The goal of data architecture is to:
A. Serve as a platform to enable data governance and management
B. Bridge between business strategy and technology execution
C. Provide the organisation with clear system of the architecture
D. Make the integration between data management and data analytics possible
A deliverable in the data architecture context diagram includes an implementation roadmap.
A. TRUE
B. FALSE
There are several methods for masking data:
A. Substitution
B. Temporal variance
C. Temporal stagnation
D. Value stagnation
E. Value variance
F. All of the above
Device security standard include:
A. Installation of anti-malware and encryption software
B. Relational security policies
C. Access policies regarding connections using mobile devices
D. Regulation compliance standards
E. None of the above
F. Awareness of security vulnerabilities
A Metadata repository contains information about the data in an organization, including:
A. Hierarchical
B. Data structure
C. Warped
D. Business rules for managing data
E. Content
F. None of the above
The difference between warehouses and operational systems do not include the following element:
A. Time variant
B. Database
C. Subject-orientated
D. Historical
Page 3 out of 40 Pages |
Previous |