Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

DMF-1220 Data Management Fundamentals Questions and Answers

Questions 4

The flow of data in a data integration solution does not have to be designed and documented.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Structural Metadata describe srealtionships within and among resource and enables identification and retrieval.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 6

Big data primarily refers specifically to the volume of the data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

Managing business party Master Data poses these unique challenges:

Options:

A.

Difficulties in unique dimensions

B.

Difficulties in unique identification

C.

Reference data anomaly detection

D.

The number of data sources and the differences between them

Buy Now
Questions 8

Data can be assessed based on whether it is required by:

Options:

A.

Regulatory reporting

B.

Capturing policy

C.

Ongoing operations

D.

Provide the starting point for customizations, integration or even replacement of an application

E.

Business policy

F.

Make the integration between data management and data analytics possible

Buy Now
Questions 9

Confirming and documenting understanding of different perspectives facilitate:

Options:

A.

Formalization

B.

Normalization

C.

Scope definition

D.

Knowledge retention/documentation

Buy Now
Questions 10

Advantages if a centralized metadata repository include:

Options:

A.

Quick metadata retrieval

B.

None of the above

C.

Combining data from multiple other tables in advance to avoid costly run-time joins

D.

All of the above

E.

High availability

F.

Low latency, since it is independent of the source systems

Buy Now
Questions 11

A dimensional physical data model is usually a star schema, meaning there is one structure for each dimension.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 12

Test environments serve many uses:

Options:

A.

Quality Assurance Testing (QA)

B.

Integration Testing

C.

User Acceptance Testing (UAT)

D.

Performance Testing

E.

All of the above

F.

None of the above

Buy Now
Questions 13

Data access control can be organized at an individual level or group level, depending on the need.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Hierarchical database model is the newest database model

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Metadata management solutions include architectural layers including:

Options:

A.

Metadata control and management

B.

Metadata Marketing

C.

Metadata usage

D.

Metadata integration

E.

Metadata Sales

F.

Metadata delivery

Buy Now
Questions 16

The first two steps in the data science process are:

Options:

A.

Define Big Data data strategy & Business Need(s)

B.

Choose Data Sources

C.

Develop Data Science Hypotheses and Mehods

D.

Acquire & Ingest Data source(s)

Buy Now
Questions 17

Technical metadata describes details of the processing and accessing of data.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 18

Layers of data governance are often part of the solution. This means determining where accountability should reside for stewardship activities and who the owners of the data are.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 19

The ISO 11179 Metadata registry, an international standard for representing Metadata in an organization, contains several sections related to data standards, including naming attributes and writing definitions.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 20

Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Corporate Information Factory (CIF) components include:

Options:

A.

Data marts

B.

Objectives

C.

Operational Reports

D.

Reduction of risk

E.

Staging Area

F.

Contributions to business objectives

Buy Now
Questions 22

Device security standards include:

Options:

A.

Access policies regarding connections using mobile devices

B.

Awareness of security vulnerabilities

C.

Installation of malware software

D.

Storage of data on fixed devices

Buy Now
Questions 23

The goals of data security include:

Options:

A.

Managing performance of data assets

B.

Enable appropriate access to enterprise data assets

C.

Managing the availability of data throughout the data lifecycle

D.

Understand and comply with all relevant regulations and policies for privacy and confidentiality

E.

Managing the performance of data transactions

F.

Ensure that the privacy and confidentiality needs of all stakeholders are enforced and audited

Buy Now
Questions 24

XML is the abbreviation for standard mark-up language.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 25

Please select the 3 visuals that depict DAMA’s Data Management Framework.

Options:

A.

The DAMA Octagon

B.

The Knowledge Area Context Diagram

C.

The Data Quality Function Context Diagram

D.

The DAMA Wheel

E.

The Environmental Factors hexagon

Buy Now
Questions 26

The load step of ETL is physically storing or presenting the results of the transformation in the target system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

DBAs exclusively perform all the activities of data storage and operations.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

An advantage of a centralized repository include: Quick metadata retrieval, since the repository and the query reside together.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

Options:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Buy Now
Questions 30

A content strategy should end with an inventory of current state and a gap assessment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

Lack of automated monitoring represents serious risks, including compliance risk.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

A Metadata repository contains information about the data in an organization, including:

Options:

A.

Hierarchical

B.

Data structure

C.

Warped

D.

Business rules for managing data

E.

Content

F.

None of the above

Buy Now
Questions 33

Please select the correct definition of Data Management from the options below.

Options:

A.

Data Management is the strict control of all plans, policies, programs and practices that enable the business strategy to be successfully executed.

B.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data and information assets throughout their lifecycles.

C.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data assets throughout their lifecycles.

D.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of information assets throughout their lifecycles.

Buy Now
Questions 34

Data Warehouse describes the operational extract, cleansing, transformation, control and load processes that maintain the data in a data warehouse.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 35

The Zachman Framweork’s communication interrogative columns provides guidance on defining enterprise architecture. Please select answer(s) that is(are) coupled correctly:

Options:

A.

What -> The inventory Column

B.

What -> The entity column

C.

When -> The timing column

D.

Why -> The motivation column

E.

Who -> The responsibility column

F.

How -> The process column

Buy Now
Questions 36

Malware refers to any infectious software created to damage, change or improperly access a computer or network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

As part of its transformation, the organization must identify and respond to different kinds of roadblocks. Please select the answer that is not a roadblock:

Options:

A.

Active resistance

B.

Psychological

C.

Systematic

D.

Structural

Buy Now
Questions 38

A hacker is a person who finds unknown operations and pathways within complex computer system. Hackers are only bad.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

Reference data management entails the preventative maintenance of undefined domain values, definitions and the relationship within and across domain values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 40

Part of alignment includes developing organizational touchpoints for data governance work. Some examples of touchpoints include: Procurement and Contracts; Budget and Funding; Regulatory Compliance; and the SDLC framework.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

A sandbox is an alternate environment that allows write-only connections to production data and can be managed by the administrator.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

Options:

A.

Stakeholders

B.

Government regulations

C.

Proprietary business concerns

D.

Legitimate access needs

E.

Contractual obligations

F.

None of the above

Buy Now
Questions 43

The Data Model Scorecard provides 10 data model quality metrics

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

Category information is one of the types of data that can be modelled.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

The Data Warehouse (DW) is a combination of three primary components: An integrated decision support database, related software programs and business intelligence reports.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 46

The Shewhart chart contains the following elements:

Options:

A.

Plan

B.

Utilization

C.

Do

D.

Check

E.

Act

F.

All of the above

Buy Now
Questions 47

Data quality issues cannot emerge at any point in the data lifecycle.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 48

The ethics of data handling are complex, but is centred on several core concepts. Please select the correct answers.

Options:

A.

Impact on machines

B.

Impact on people

C.

Potential for data management

D.

Potential for misuse

E.

Economic value of ethics

F.

Economics value of data

Buy Now
Questions 49

Enterprise data architecture description must include both [1] as well as [2]

Options:

A.

[1] Data Flow Design [2] Data Context Diagram

B.

[1] Enterprise Data Model [2] Architecture Diagram

C.

[1] Enterprise Data Model [2] Data Flow Design

D.

[1] Enterprise Data Model [2] Data Context Diagram

Buy Now
Questions 50

Examples of transformation in the ETL process onclude:

Options:

A.

De-duping

B.

Structure changes

C.

Hierarchical changes

D.

Re-ordering

E.

Semantic conversions

F.

None of the above

Buy Now
Questions 51

Differentiating between data and information. Please select the correct answers based on the sentence below: Here is a marketing report for the last month [1]. It is based on data from our data warehouse [2]. Next month these results [3] will be used to generate our month-over-month performance measure [4].

Options:

A.

[1] Information, [2] Information, [3] Data, [4] Information

B.

[1] Data, [2] Information, [3] Data, [4] Data

C.

[1] Data, [2] Data, [3] Data, [4] Information

D.

[1] Information, [2] Data, [3] Data, [4] Information

Buy Now
Questions 52

Well prepared records have characteristics such as:

Options:

A.

Context

B.

Content

C.

Compliance

D.

Timeliness

Buy Now
Questions 53

BI tool types include:

Options:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

Buy Now
Questions 54

Quality Assurance Testing (QA) is used to test functionality against requirements.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 55

Machine learning explores the construction and study of learning algorithms.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 56

The database administrator (DBA) is the most established and the most widely adopted data professional role.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

The Belmont principles that may be adapted for Information Management disciplines, include:

Options:

A.

Respect for Persons

B.

Respect for Machines

C.

Beneficence

D.

Criminality

E.

Justice

Buy Now
Questions 58

Data warehousing describes the operational extract, cleaning, transformation, control and load processes that maintain the data in a data warehouse.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

An implemented warehouse and its customer-facing BI tools is a technology product.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

Customer relationship management systems manage Master Data about customers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 61

The biggest business driver for developing organizational capabilities around Big Data and Data Science is the desire to find and act on business opportunities that may be discovered through data sets generated through a diversified range of processes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 62

When selecting a DMM framework one should consider of it is repeatable.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

Snowflaking is the term given to normalizing the flat, single-table, dimensional structure in a star schema into the respective component hierarchical or network structures.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 64

Data security internal audits ensure data security and regulatory compliance policies are followed should be conducted regularly and consistently.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 65

Change only requires change agents in special circumstances, especially when there is little to no adoption.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 66

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

The term data quality refers to both the characteristics associated with high quality data and to the processes used to measure or improve the quality of data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

Data flows map and document relationships between data and:

Options:

A.

Locations where local differences occur

B.

Situations where local differences occur

C.

Network segments

D.

Applications within a business process

E.

None of the above

F.

All of the above

Buy Now
Questions 69

Data modelling tools and model repositories are necessary for managing the enterprise data model in all levels.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

Three classic implementation approaches that support Online Analytical Processing include:

Options:

A.

QOLAP

B.

ROLAP

C.

OLAP2

D.

HOLAP

E.

MOLAP

F.

None of the above

Buy Now
Questions 71

Data parsing is the process of analysing data using pre-determined rules to define its content or value.

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 72

Data Integration and Interoperability is dependent on these other areas of data management:

Options:

A.

Metadata

B.

Data architecture

C.

Data governance

D.

Data security

E.

Data modelling and design

F.

Data storage and operations

Buy Now
Exam Code: DMF-1220
Exam Name: Data Management Fundamentals
Last Update: Nov 19, 2024
Questions: 486

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now DMF-1220 testing engine

PDF (Q&A)

$31.5  $104.99
buy now DMF-1220 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 24 Nov 2024