Temporal aspects usually include:
A goal of a Reference and Master Data Management program include enabling master and reference data to be shared across enterprise functions and applications.
Critical Data is most often used in
Examples of technical metadata include:
Select the areas to consider when constructing an organization’s operating model:
Which Data Architecture artefact contains the names of key business entities, their
relationships, critical guiding business rules and critical attributes?
Which of the following activities is most likely to maintain bias in data analysis?
There are numerous methods of implementing databases on the cloud. The most common are:
What type of key is used in physical and sometimes logical relational data modelling schemes to represent a relationship?
Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.
Product Master data can only focus on an organization’s internal product and services.
Type of Reference Data Changes include:
In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.
The neutral zone is one of the phases in the Bridges’ transition phases.
Compound authorization groups provide a means to:
Small reference data value sets in the logical data model can be implemented in a physical model in three common ways:
Please select the correct name for the LDM abbreviation
Consistent input data reduces the chance of errors in associating records. Preparation processes include:
The list of V’s include:
When recovering from multiple system failures, what is the biggest difficulty faced
by a DBA?
The accuracy dimension has to do with the precision of data values.
The library of Alexandria was one of the largest collection of books in the ancient
world. Which DMBoK knowledge area is most aligned with managing the collection?
What business function is best aligned to deliver oversight to data architecture ?
Deliverables in the Metadata Management context diagram include:
Master data is an aggregation of:
Over a decade an organization has rationalized implementation of party concepts from 48 systems to 3. This is a result of good:
Data access control can be organized at an individual level or group level, depending on the need.
A database uses foreign keys from code tables for column values. This is a way of implementing:
In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.
Who should write the main content for a security policy for an organisation?
Communication should start later in the process as too many inputs will distort the vision.
Some ways to measure value of data include:
Factors that have shown to play a key role in the success in the success of effective data management organizations does not include:
Data replication has two dimensions of scaling: diagonal and lateral
Technical metadata describes details of the processing and accessing of data.
A business driver for Master Data Management program is managing data quality.
Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.
MPP is an abbreviation for Major Parallel Processing.
The Data Warehouse has a set of storage areas, including:
Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.
Different types of product Master Data solutions include:
Functionality-focused requirements associated with a comprehensive metadata solution, include:
What area do you not consider when developing a 'Data Governance operating model?
Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.
Field overloading: Unnecessary data duplication is often a result of poor data management.
Well prepared records have characteristics such as:
There are three techniques for data-based change data capture, namely:
Open by default' document control will assist data sharing by:
Category information is one of the types of data that can be modelled.
When data is classified as either security data or regulatory data, the result will be:
Tools required to manage and communicate changes in data governance programs include
A goal of data governance is to enable an organisation to manage its data as a liability.
Project that use personal data should have a disciplined approach to the use of that data. They should account for:
The key architecture domains include:
A data architecture team is best described as:
A key feature of Bill Inmon’s approach to data warehousing is:
Poorly managed metadata leads to:
What model is the highest level model within the enterprise data model?
Which of the following are must-do for any successful Data Governance programme?
Typically, DW/BI have three concurrent development tracks:
Data Fabric is:
SSD is the abbreviation for Solid State Dimension.
Inputs in the data modelling and design context diagram include:
Data science merges data mining, statistical analysis, and machine learning with the integration and data modelling capabilities, to build predictive models that explore data content patterns.
The primary goal of data management capability assessment is to evaluate the current state of critical data management activities in order to plan for improvement.
Three classic implementation approaches that support Online Analytical Processing include:
Identify indicative components of a Data Strategy.
The percentage of enterprise computers having the most recent security patch
installed is a metric of which knowledge area?
The DW encompasses all components in the data staging and data presentation areas, including:
A metadata repository is essential to assure the integrity and consistent use of an enterprise data model across business processes.
Valuation information, as an example of data enrichment, is for asset valuation, inventory and sale.
Data profiling examples include:
Information gaps represent enterprise liabilities with potentially profound impacts on operational effectiveness and profitability.
Managing business party Master Data poses these unique challenges:
Because Data Governance activities require coordination across functional areas, the DG program must establish an ___________ that defines accountabilities and intersections.
A staff member has been detected inappropriately accessing client records from
usage logs. The security mechanism being used is an:
The main difference between a System of Record and a System of Reference is:
Architects seek to design in a way that brings value to an organisation. To reach these goals, data architects define and maintain specifications that:
Layers of data governance are often part of the solution. This means determining where accountability should reside for stewardship activities and who the owners of the data are.
A successful Data Governance program requires that all enterprise data be certified.
An authoritative system where data is created/captured, and/or maintained through
a defined set of rules and expectations is called:
The minority of operational metadata is generated as data is processed.
The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:
ANSI 859 recommends taking into account the following criteria when determining which control level applies to a data asset:
The data warehouse and marts differ from that in applications as the data is organized by subject rather than function.
To become data-centric, organizations need to think differently. They need to recognize:
Media monitoring and text analysis are automated methods for retrieving insights from large unstructured or semi-structured data, such as transaction data, social media, blogs, and web news sites.
A goal of reference and master data management is for data to ensure shared data is:
Data parsing is the process of analysing data using pre-determined rules to define its content or value.
The better an organization understands the lifecycle and lineage of its data, the better able it will be to manage its data. Please select correct implication of the focus of data management on the data lifecycle.
Examples of technical metadata include:
Information architecture is the process of creating structure for a body of information or content. It includes the following components:
In an information management context, the short-term wins and goals often arise from the resolution of an identified problem.
You have completed analysis of a Data Governance issue in your organisation and have presented your findings to the executive management team. However, your findings are not greeted warmly and you find yourself being blamed for the continued existence of the issue. What is the most likely root cause for this?
Various Regulations require evidence of clear data lineage and accuracy. How can we as data managers best serve our enterprises in achieving this goal?
Decentralized informality can be made more formal through a documented series of connections and accountabilities via a RACI matrix.
ISO 8000 will describe the structure and the organization of data quality management, including:
What are the three qualities of an effective Data Governance function?
On example of a transformation process in ETL is:
A Global ID is the MDM solution-assigned and maintained unique identifier attached to reconciled records.
CMDB provide the capability to manage and maintain Metdata specifically related to the IT assets, the relationships among them, and contractual details of the assets.
The implementation of a Data Warehouse should follow guiding principles, including:
Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.
Business Intelligence, among other things, refer to the technology that supports this kind of analysis.
The Data Warehouse encompasses all components in the data staging and data presentation areas, including:
A "Data Governance strategy" usually includes the following deliverables:
Which of the following provides the strongest tangible reason for driving initiation of a Data Governance process in an enterprise?
Accomplish repository scanning in two distinct approaches, including:
The need to manage data movement efficiently is a primary driver for Data Integration and Interoperability.
Modeling Bid data is a non-technical challenge but critical if an organization that want to describe and govern its data.
Corporate Information Factory (CIF) components include:
Analytics models are associated with different depths of analysis, including:
Deliverables in the document and content management context diagram include:
The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.
Content management includes the systems for organizing information resources so that they can specially be stored.
Data quality management is a key capability of a data management practice and organization.
Data flows map and document relationships between data and:
Data replication can be active or passive.
You are a reporting Data Analyst. A new Management Report has been requested. What is the most effective way to ensure you receive the appropriate data at the correct level of accuracy to meet the business need?
Different storage volumes include:
The scope and focus of any data governance program depend on organizational needs, but most programs include:
Inputs in the reference and master data context diagram include:
With reliable Metadata an organization does not know what data it has, what the data represents and how it moves through the systems, who has access to it, or what it means for the data to be of high quality.
Data stewardship is the least common label to describe accountability and responsibility for data and processes to ensure effective control and use of data assets.
Control activities to manage metadata stores include:
Risk classifications describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes.
DBAs and database architects combine their knowledge of available tools with the business requirements in order to suggest the best possible application of technology to meet organizational goals.
Most document programs have policies related to:
Please select the incorrect item that does not represent a dimension in the Data Values category in Data Quality for the Information age.
Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.
A data dictionary is necessary to support the use of a DW.
What is the best definition of Crowdsourced data collection?
Organizations conduct capability maturity assessments for a number of reasons, including:
Achieving security risk reduction in an organisation begins with developing what?
Data Standards used by the enterprise must:
Which of the following is NOT a stage of the Data Quality Management Cycle?
Developing complex event processing solutions require:
Within each area of consideration mentioned in question 13, they should address morale adversity as per Ethical Risk Model for Sampling Projects.
A point to point interface architecture will, in general, have more or less interfa
formats than a service oriented architecture?
Big data management requires:
There are several methods for masking data:
Data governance requires control mechanisms and procedures for, but not limited to, identifying, capturing, logging and updating actions.
Logical abstraction entities become separate objects in the physical database design using one of two methods.
What position should be responsible for leading the Data Governance Council (DGC)?
No recorded negative ethical outcomes does not mean that the organization is processing data ethically. Legislation cannot keep up with the evolution of the data environment so how do we stay compliant?
Database monitoring tools measure key database metrics, such as:
Veracity refers to how difficult the data is to use or to integrate.
Your organization has many employees with official roles as data stewards and data custodians, but they don't seem to know exactly what they're supposed to be doing. Which of the following is most likely to be a root cause of this problem?
Please select the option that correctly orders the models in decreasing level of detail:
In data integration, the goal of data discovery is toc
The independent updating of data into a system of reference is likely to cause:
The term data quality refers to only the characteristics associated with high quality data.
Data modelling tools are software that automate many of the tasks the data modeller performs.
Data governance requires control mechanisms and procedures for, but not limited to, facilitating subjective discussions where managers’ viewpoints are heard.
During the initial scoping of a project, a data model can be used to:
Metadata is described using different set of categories, including:
Which of the following answers best describes an Active Data Dictionary?
The IBM Data Governance Council model is organized around four key categories. Select the answer that is not a category.
The term data quality refers to both the characteristics associated with high quality data and to the processes used to measure or improve the quality of data.
A minimal super key is:
Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:
The impact of the changes from new volatile data must be isolated from the bulk of the historical, non-volatile DW data. There are three main approaches, including:
How can the Data Governance process in an organisation best support the requirements of various Regulatory reporting needs?
In matching, false positives are three references that do not represent the same entity are linked with a single identifier.
There are three recovery types that provide guidelines for how quickly recovery takes place and what it focuses on.
A complexity in documenting data lineage is:
The Shewhart chart contains the following elements:
A data governance strategy defines the scope and approach to governance efforts. Deliverables include:
XML is the abbreviation for standard mark-up language.
The Data Model Scorecard provides 10 data model quality metrics
Reference and Master Data Management follow these guiding principles:
Inputs in the data storage and operations context diagram include:
Please select the correct General Accepted Information Principles:
Please select the answer that does not represent a machine learning algorithm:
Organizations are legally required to protect privacy by identifying and protecting sensitive data. Who usually identifies the confidentiality schemes and identify which assets are confidential or restricted?
Real-time data integration is usually triggered by batch processing, such as historic data.
A synonym for transformation in ETL is mapping. Mapping is the process of developing the lookup matrix from source to target structures, but not the result of the process.
Practitioners identify development of staff capability to be a primary concern of Data Governance. Why would this be a main concern?
Which model has one Data Governance organization coordinate with multiple Business Units to maintain consistent definitions and standards?
The purpose of data governance is to ensure that data is managed properly, according to policies and best practices. Data governance is focused on how decisions are made about data and how people and processes are expected to behave in relation to data.
A goal of metadata management is to manage data related business terminology in
order toc
Enterprise data architecture usually include the following work streams:
When assessing security risks it is required to evaluate each system for the following:
Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.
A deliverable in the data security context diagram is the data security architecture.
Latency can be:
Organizations should evaluate several maturity assessment models for data management, and for Data Governance, before adopting one or before developing a custom maturity assessment model because:
Some common data quality business rule types are:
If data is not integrated with care it presents risk for unethical data handling. These ethical risks intersect with fundamental problems in data management including: Limited knowledge of data’s origin and lineage; Data of poor quality; Unreliable Metadata; and Documentation of error remediation.
Gathering and interpreting results from a DMM or Data Governance assessment are important because:
Dimensions of data quality include:
The best way to validate that a database backup is working, is to:
What result(s) is/are Data Handling Ethics trying to avoid?
A general principle for managing metadata includes Responsibility.
The accuracy dimension of data quality refers to the degree that data correctly respresents ‘real-life’ entities.
How does the DMBOK refer to an organization that values data as an asset and manages data through all phases of its lifecycle?
DAMA International’s Certified Data Management Professional (CDMP) certification required that data management professionals subscribe to a formal code of ethics, including an obligation to handle data ethically for the sake of society beyond the organization that employs them.
The acronym ETL most commonly stands for:
Most people who work with data know that it is possible to use data to misrepresent facts. Which of the following is NOT a way in which data is used to misrepresent facts?
Which of the following is a core principle of any Data Governance program?
Data security internal audits ensure data security and regulatory compliance policies are followed should be conducted regularly and consistently.
According to the DMBoK2, by creating Data Management Services, IT involves the Data Governance Council:
The business glossary should capture business terms attributes such as:
Domains can be identified in different ways including: data type; data format; list; range; and rule-based.
A data warehouse deployment with multiple ETL, storage and querying tools often
suffers due to the lack of:
What are the three characteristics of effective Data Governance communication?
Data management organizational constructs include the following type of model.
The four main types of NoSQL databases are:
Which of these best describes the purpose of a Communications Plan in Data Governance?
Common OLAP operations include:
The Data Warehouse (DW) is a combination of three primary components: An integrated decision support database, related software programs and business intelligence reports.
Implementing a BI portfolio is about identifying the right tools for the right user communities within or across business units.
SBA is an abbreviation for service-based architecture.
Class operations can be:
SOA stand for Service Orchestrated Architecture
Content needs to be modular, structured, reusable and device and platform independent.
Enterprise data architecture project-related activities include:
BI tool types include: