DAMA Notes
DAMA Notes
o A Charter, a Data Architecture, a Program Data Model, and a Plan for Operational Success
Question 141
o Metadata Management
o Business Architecture
o Data Security
o Data Governance
Question 201
Question 251
o Ensures that each attribute has a balanced proportion of neutrons and protons
o Ensures that each attribute has a definition that makes sense Ensures that the Party Role
structure is correctly represented
Question 341 (data storge and operation)
Question 541
o Industry Standards
o Reporting requirements
Question 751
o Track the data from source system to a target database, understanding its transformations
Question 761
Question 801
o Purge the data in the data warehouse and reload from the source systems
o Purge the data in the data warehouse and copy back to the data mart
o Purge the data in the data marts and reload from the data warehouse
o Purge the data generally and reload from the best system
o Purge the data in the source system and reload the data warehouse
Question 821
o For example, a lump of coal burns about 100 degrees and gives off carbon dioxide
o For example, a document has a number of pages, number of chapters and word count
o For example, a record has version numbers, archive dates and purge dates
o For example, a book has author, title and subject associated with it
Question 851
Question 991
A website that does not ask for agreement on intended data use is breaching which principle in the
GDPR of the EU
Safegurards
Storage Limitations
Accuracy
Accountability
Purpose Limitation
Question 971
Question 31:
Question 61
Knowledge area activities are classified into four categories. They are:
Question 81
Question 91
o Internal audits
o Regulatory compliance
o Outsourcing
Question 101
Common understanding of the core business concepts and terminology is the objective of which
deliverable?
o Data Dictionary
o Business Glossary
o Security Framework
o Metadata Repositories
Question 191
Question 201
Question 211
Question 221
o Technical architecture
o Business architecture
o Data architecture
o Data warehousing
o Data quality
Question 231
The repeated implementation of different CRM technologies with different data structures is
mostly a failure of:
o Data security
o Data quality
o Data warehousing
o Data architecture
o Data modeling
Question 241
Data Models are critical to effective management of data, because they: Group of answer
choices
o Define the rules and approval mechanisms to make changes to the data structures
Question 321
o Avoid the loss of data by storing key values more than once
o Optimize overall database performance across both data access and data update requests
o Ensure surrogate keys are retaining their unique values in all satellite tables
Question 341
Question351
Regulatory data retention requirements drive the need to keep data for set periods for:
o Customer analytics
o Legal obligations
Question 381
Question 401
Periodic archiving of transaction data from a production CRM system is critical for:
Question 411
o Vulnerability
o Chasm
o Risk
o Feature
o Threat
Question 431
Quesion441
Quesion451
A staff member has been detected inappropriately accessing client records from usage logs. The
security mechanism being used is an:
o Authorization
o Authentication
o Audit
o Entitlement
o Access
Question 501
A document that stipulates the responsibilities and acceptable use of data to be exchanged is a:
o Data model
o Project charter
o Interface contract
Question 521
o Data Security
Question 541
If two data stores are able to be inconsistent during normal operations, then the integration approach
is:
o Synchronous
o Uncontrolled
o Streaming
o Faulty
o Asynchronous
Question 581
o English
o Metadata
o Data model
o Dictionary
o Taxonomy
Question 591
Which of the following is a reason why organisations do not dispose of non-value- adding
information?
Question 601
Which statement best describes the relationship between documents and records?
Question 611
Question 611 pts Sentiment analysis of call Centre voice files is performed by text analysis and
stored in a relational database. Which of the following is true?
o The voice files are unstructured data and the sentiment analysis is structured data
o The voice files are structured data and the sentiment analysis is unstructured data
Question 631
The metadata structure for a content management system can be represented with a:
o Authorization matrix
o CRUD matrix
o Mind map
o Data model
o Process model
Question 641
A workforce is locked out of a building due to a threat to personnel. BCP is stored in the DMS. Luckily:
Question 651
When assessing tools to implement master data management solutions, functionality must
include:
The process of identifying how different records may relate to a single entity is called: Group of
answer choices
Matching
Mangling
Meshing
Mirroring
Munging
Question 701
When trying to integrate a large number of systems, the integration complexities can be
reduced by:
Question 711
By comparing the system of record and systems of reference to each other, it is possible to:
Question 721
All the systems in the enterprise, apart from a website, are showing updated pricing
information. This may be due to:
o The website software not integrating with the reference data repository
o The reference data strategy has not been approved by the executive
Question 741
o An integrated data store, ETL logic, and extensive data cleansing routines
o Data stores and extracts that can be transformed into star schemas
o Any data stores or extracts used to support the delivery for BI purposes
Question 761
One of the key differences between operational systems and data warehouses is:
o Operational systems focus on data quality; data warehouses focus on data security
o Operational systems focus on current data; data warehouses contain historical data
o Operational systems focus on historical data; data warehouses contain current data
o Operational systems are available 24x7; data warehouses are available during business hours
Question 771
In order to speed up data warehouse development, the data vault approach focuses on the
management of:
Question 781
Question 801
The uncontrolled duplication of dimensions in a Kimball data warehouse is best controlled by:
Question 811
Question 841
Where is the best place to find the following metadata: database table names, column names
and indexes?
Security access authorization
Database catalogue
Question 861
Question 931
When a data quality team has more issues than they can manage, they should look to:
o Establish a program of quick wins targeting easy fixes over a short time period
Question 961
Which DMBoK knowledge area is most likely responsible for a high percentage of returned
mail?
o Data Quality
Queswion 971
Question 981
Question 991
An organization that parses its call Centre audio files to assess the emotional state of its callers
is using:
o Predictive analysis
o Reactive analysis
o Sentiment analysis
Quiz 3
A document that describes how data will be made more accessible over 3-5 years is called:
o An analytics strategy
Quiz3
o A joint effort in defining the data quality rules and profiling the data
Question 121
The goal of data governance is to enable an organisation to manage data as an asset. To achieve
this, the DG programs must be:
o Represented by finance during the process for acquiring and disposing of the data asset
o Able to assign a dollar value to a data asset in order to determine the appropriate cost-to-
investment ratio for budgeting purposes
o Able to register the data asset with the financial controller to ensure it is managed like all
other asset
Question 141
Question 171
——————
o Because most organizations have more data than individual people can comprehend,
understand and make decisions about
o Because most Chief Data Officers do not have the technical background to be held
accountable for complex data diagrams
o Because most architects want to deploy a complete suite of drawings for project deliverabl
Question 261
o Category information
o Historical information
o Resource information
————-
A data model that consists of a single fact table linked to important concepts of the business is
a:
o Process Model
o Relational Model
o Dimensional Model
Question 281
A data model:
A relationship that allows an address to be used by multiple people, and each person can have
multiple addresses, can be resolved:
o By changing the role names of the foreign keys on Person and Address to ensure referential
integrity
o With an associative entity called Person Address Usage and two, 'one to many' relationships
o By changing the primary keys on Person and Address to ensure referential integrity
o With a partnership entity called Person Address Usage and two, 'one to many' relationships
Question 311
A project scope includes the collection, exchange and reporting of data from multiple systems.
Conceptual, logical and physical data models are maintained. How many models of each type can be
expected?
o More physical data models than logical data models, and more logical data models than
conceptual data models
o More conceptual data models than logical data models, and more logical data models than
physical data models
o More logical data models than physical data models, and more logical data models than
conceptual data models
o Only 1 conceptual data model, 1 logical data model and 1 physical data model
——————-
Question 331
o Managing user experience, ensuring data access and managing data lifecycles
Question 411
In data security, which of the following is not one of the four A's:
Agile Access
Authorization
Audit
Authentication
Question 451
The requirement to enter a username, a password and then a code sent to an authentication app
is called:
o Biometric authentication
o 3-factor authentication
o Mobile authentication
o Proactive authentication
o 2-factor authentication
Question 511
Integrating two data stores using batch or real-time synchronous approaches results in a
difference in:
o Source of truth
o Lethargy
o Timestamping
o Data quality
o Latency
Question 561
o Reference data
o Data quality
o Master data
o Business intelligence
o Content management
Question 591
In 2009, ARMA International published GARP for managing records and information. GARP stands for:
Question 611
Question 651
o A System of Systems
o A System of Record
o A System of Reference
o A System of Retirement
o Business transactions, e.g. financial transactions, enquiries and service call interactions
Initiatives focused on building a 'single view of customer' mainly rely on which DMBOK
knowledge area?
o Data Security
o Data Architecture
o Metadata Management
Question 731
Question 821
o Technical metadata
o Strategic metadata
o Business metadata
o Industry metadata
o Operational metadata
Question 831 pts
The ISO Metadata Registry Standard that provides a framework for defining a metadata registry
is:
o ISO MD 1
o ISO 4-20-99
o ISO 9001
o ISO 4590
Question 871
o Cloud-based databases
Question 891
Data quality measurements can be taken at three levels of granularity. They are:
Which of the following is NOT required to effectively track data quality incidents?
o A well defined system of escalation based on the impact, duration, or urgency of an issue
A pensioner who was sent a $100,000,000 electricity bill was a victim of poor data quality checks
in which dimension?
o Timeliness
o Heuristics
o Precision
o Accuracy
o Reasonableness
Question 971
No discipline at all
Question 981
Big data is often defined by three characteristics. They are:
Question 1001
Question 11
Question 21
Question 41
o knowledge areas
Question 51
o representations of truth.
Question 61
Question 71
In the common enterprise architecture model coded BIAT, the 'I' stands for:
o Instance
o Interoperability
o Identification
o Integration
o Information
Question 81
o processes
o computers
o Users
o technology
o applications
Question 91
o the primary and highest authority responsible for the oversight and support of data
governance activities.
Question 101
What area do you not consider when developing a 'data governance operating model'?
o Impact of regulation.
Question 111
o to manage data assets on behalf of others and in the best interests of the organisation.
o to interfere in IT projects.
Question 121
Question 131
o Regular newsletters.
o All answers.
Question 141
Question 151
The advantage of a decentralized data governance model over a centralized model is:
Question 161
Following the rollout of a data issue process, there have been no issues recorded in the first
month. The reason for this might be:
o Staff staying back late to enter the issues into the system.
o two dimensional matrices showing the relationships between data users and data consumers.
o two dimensional matrices showing the relationships between data entities and data quality.
o two dimensional matrices showing the relationships between data facts and data dimensions.
o two dimensional matrices showing the relationships between data entities and business
processes.
o two dimensional matrices showing the relationships between data users and business
processes.
Question 181 When a project specification is reviewed by the enterprise data architect, which
of the following is not a consideration:
o whether entities and definitions need to be generalised or improved to handle future trends.
o whether entities on individual screens and reports align with the database.
o what entities in the requirements should be included back into the overall enterprise data
architecture.
Question 191
o the fundamental responsibility for delivering the best systems at the lowest cost.
o the fundamental rules for ensuring the information captured in the architected solution is
enforcing data quality and completeness.
o the fundamental view of how the system should be built and how it will be maintained.
o The fundamental organization of a system, and the principles governing its design and
evolution."
o the fundamental collection of all artefacts that describes a system and how they work
together.
Question 201
Which of the following activities is NOT a way that enterprise data architecture influences the
scope boundaries of projects:
Question 211
The implementation of data architecture exposes the transformation of data as it moves across
the landscape. A common name for this concept is:
o data discovery.
o Data interfacing.
o data modeling.
o data lineage.
Question 221
o during the early stages of a project to define and shape a strategic solution.
Question 241
The data architect needs to propagate data across the landscape in real time. This requires the
leveraging of the following DMBoK knowledge areas:
Question 251
o the capture and maintenance of source structures for each attribute on the data model.
Question 261
In data modeling practice, entities are linked by:
o cardinality
o indexes
o trigger
o processes
o relationships
Question 271
Question 281
The implementation of a 'Super Type - Sub Type' structure can use the following 2 options:
Question 291
Each person has zero or more addresses, and each address must be allocated to 1 person. This is
an example of:
Question 311
During the initial scoping of a project, a data model can be used to:
o identify detailed impact on all the tables in a database that must be changed.
Question 321:
Significant operational issues have been caused by the implementation of a data model that
represents a Customer Agreement as a ternary relationship between Enterprise, a customer, and
their Contact Person. Which of the following describes the likely operational issue?
o Every time the Customer Agreement was renewed, a new Contact Person record was
required.
o Every time the customer changes addresses the address for the contact person must change
as well.
o In the event of a merger between enterprises, the contact person addresses need to be
updated.
o Response time for retrieving the Customer Agreement degrades rapidly due to the lack of
indexing.
o Every time the contact person changes, the customer agreement needs to be re- established
Question 331
question 341:
Question 351:
o an alternative to backups.
Question 361
o remote users.
Question 371
Question 381
When reviewing data access plans, sequential searching is slowing the database. One way to fix
this is:
Question 391
An application uses a single service account for all database access. One of the risks of this
approach is:
Question 401
A database uses foreign keys from code tables for column values. This is a way of implementing:
o event data.
o master data.
o temporal data.
o reference data.
Question 411
Question 421
The percentage of enterprise computers having the most recent security patch installed is a metric of
which knowledge area?
o Data Quality
o Metadata Management
o Data Security
Question 431
The stakeholder requirements for privacy and confidentiality are goals found in:
o metadata management.
o data security.
o data architecture.
Question 441
Question 451
A security mechanism that searches for customer bank account details in outgoing emails is
achieving the goal of:
o ensuring stakeholder requirements for response time and availability levels are met.
o ensuring stakeholder requirements for service design and experience are met.
o ensuring stakeholder requirements for concise definitions and usage are met.
Question 461
Question 471
Compound authorization groups provide a means to:
Question 481
A DMZ is bordered by 2 firewalls. These are between the DMZ and the:
o Korean peninsula.
Question 491:
Data that is used infrequently or not at all may be moved to an alternative data store. This is
called:
o auditing
o authentication
o archiving
o replication
o analysis
Question 501:
Mapping requirements and rules for moving data from source to target enables:
o Extract
o Load backups
o Transformation
o analysis
Question 511:
Integrating two data stores using batch or real-time synchronous approaches results in a
difference in:
o latency
o data quality
o source of truth
o lethargy
o timestamping
Question 521:
o identify potential sources and assure data recovery processes are compliant.
o identify key users and perform high level assessment of data quality.
Question 531:
o a data lake.
o ETL servers.
The ability of a photo app to share its images with various social media applications is an
example of:
o metadata
o replication
o rendering
o integration
o interoperability
Question 551 pts
The creation of overly complex enterprise integration over time is often a symptom of:
Question 561
The implementation of a 'master data repository’, which is integrated across the enterprise, is an
example of which integration approach?
o Replication
o Point to point
Question 571
o Kanban boards.
Question 581
A goal of document and content management is to ensure effective and efficient retrieval and
use of:
Question 591
Which of the following is not a step in the 'document and content management lifecycle'?
Question 601
"Planning, implementation and control activities for lifecycle management of data and
information, found in any form or medium, pertain to which knowledge area?"
o Metadata Management
Question 611
Users continue to use a shared drive instead of a new document management system. This may
be due to:
o Concurrent updates to the document are handled better by the shared drive.
o hierarchical taxonomy.
o ecological taxonomy.
o compound taxonomy.
o flat taxonomy.
o hybrid taxonomy.
Question 631
A search engine database is populated by a web crawler or spider software that usually
processes as:
Question 641
"Integrating data security with document and content management knowledge areas, guides the
implementation of:"
Question 651
Question 661
A goal of reference and master data management is for data to ensure shared data is:
Data that is required across business processes, areas and systems is called:
o Event Data.
o Important Data.
o A Data Mart.
o Static Data.
Question 691
In order to gain endorsement to extend the use of reference and master data across the
enterprise, a key supporting DMBOK knowledge area is:
o Data Architecture.
o Data Governance.
o Data Security.
Question 701
o duplicate data.
Question 721
An emergency contact phone number would be found in which master data management
program?
o Product
o Asset
o Service
o Location
o Employee
Question 731
o to reduce data overload, improve information governance, and enable an enterprise to use
its data to make better decisions.
o to align data systems, improve source system management, and to enable an enterprise
exploit machine learning technique.
Question 741
Critical to the success of the data warehouse is the ability to explain the data. The DMBoK
knowledge area that practices these techniques is:
o Metadata Management
o Data Architecture
Question 751
Question 761
A data warehouse deployment with multiple ETL, storage and querying tools often suffers due
to the lack of:
Question 791
Question 801
In a data warehouse, where the classification lists for organization type are inconsistent in
different source systems, there is an indication that there is a lack of focus on:
o Data Modeling
o Master data
o Metadata Management
o Reference data
o Data Storage
Question 811
A goal of metadata management is to manage data related business terminology in order to:
o ensure people understand data content and can use data consistently.
Question 831
Question 841
o to help organizations understand its data, its systems and its workflows
Question 851
o Data dictionary
o Metadata
o Data Architecture
o Data Quality
o Data profiling
Question 861
o manage metadata
Question 871
A report displaying birth date contains possible but incorrect values. What is a possible explanation?
o Birth date is populated from a single source system, which contains missing values.
o Birth date is populated from two source systems: one of which stores marriage date in the
birth date field.
o Birth date is populated from two source systems; both of which record the birth date in the
birth date field.
o Birth date is populated from a single source system, which does not contain birth date.
o Birth date is populated from a single source system, where the date field is an offset value of
1601.
Question 881
The search function associated with a document management store is failing to return known
artefacts. This is due to a failure of:
Question 951
Question 901
Which of the following is NOT a preventative action for creating high quality data:
Question 911
Which of the following is NOT a stage in the Shewhart / Deming Cycle that drives the data
quality improvement lifecycle:
o Investigate
o Plan
o Do
o Check
o Act
Question 921
Question 931
'Top down' and 'bottom up' data analysis and profiling are best done in concert because:
o It allows the profiler to show the business the true state of the data.
o It gives something for the architects to do while the profilers get on with the work.
o Data quality tools are more productive when they are effectively configured.
Which of the following is the best example of the data quality dimension of 'consistency':
o The phone numbers in the customer file do not adhere to the standard format.
o All the records in the CRM have been accounted for in the data warehouse.
o The source data for the end of month report arrived 1 week late.
Question 951
A data quality report assesses the coding of deposit transactions. The following variations in the
coding is apparent: DEP, Dep, dep, dEp. Which DMBoK knowledge area has been ignored?
o Metadata Management
o Data Governance
o Data Quality
Question 961
Which of the following is the best example of a 'documented data quality rule':
o Every transaction recorded must be processed by 12:05 am by authorised personnel who will
validate balances and data delivery to branches.
o The transaction data from all satellite systems needs to reflect actual customer balances each
morning.
o The transaction data from all satellite systems needs to be ready by 12:05 am in order to
feed the overnight batching window, to ensure branches have access to actual customer
balances.
o Each transaction data file holding customer transactions must be kept confidential to the
authorised users within the operations team.
o All transaction data in the core banking systems need to be processed at 12:05 am each day
regardless of the business calendrer day and timezone.
Question 971 pts
"The ethics of data handling Centre on several core concepts. They are:"
Question 991 pts An application that attempts to predict future outcomes through probability
estimates is called:
o just-in-time reporting
o predictive analytics
o dimensional analytics
o Descriptive Analytics
o reactive analytics
Question 1001
"A machine learning algorithm that incorrectly classifies new data values may have a problem
with population imbalances in:"
o predictive analytics.
Question 1
o Hardware management.
Question 2
DQ-The data quality management cycle has four stages. three are Plan, Monitor & Act. What is
fourth stage?
o Improve.
o Prepare.
o Reiterate.
o Deploy.
o Manage.
Question 3
DQ-Which of these is a key process in defining Producing data quality business rules?
o Separating data that does not meet business needs from the data that Does
Question 4
DG-Communicating the value of Data Governance can be approached in a number of ways. which of
the following approaches is NOT a recognised way of doing this?
DG-When considering a Data Governance program, communication is a key element. There are many
ways of managing this communication, with one of the most effective being a data Management
intranet. Which of the following would you typically NOT put onto such an communication vehicle?
Question 6
o To describe how and where our data is stored in our systems applications or packages.
Question 7
MDM-Upodating the Metadata repository is the recommended activity during project close out
in SDLC.
o True
o False
Question 8
DG-Apart from the security requirements internal to the organization, what other strategic goal
should a data security Management system address?
o Regulatory requirements for privacy and confidentiality AND privacy and confidentiality
needs of all stakeholders.
o How much the canned process in the tool matches our business.
Working with business and technical leadership to find the best answers to a
standard set of regulatory compliance questions (How, Why, When, etc)
65
A business role appointed to take responsibility for the quality and use of their
organization's data assets
Data is processed only in ways compatible with the intended and communicated
use it was collected for, and respects the consent of the data subject
7. Which statement best describes the relationship between documents and records?
66
10. All the following are TRUE statements on relationship types except:
A one-to-many relationship says that a child entity may have one or more parent entities
11. Identify who has primary responsibility for data capture and usage
design within programs.
13. What is the difference between cardinality rules and data integrity rules?
Cardinality rules define the quantity of each entity, instance that can participate
in a relationship between two entities, and referential integrity rules ensure valid
values
Entity occurrence
67
16. The Data Quality Management cycle has four stages. There are Plan,
Monitor and Act. What is the fourth stage?
Deploy
17. Which of these is NOT an expected role of a Data Quality Oversight Board?
18. Which of these is a key process in defining data quality business rules?
Separating data that does not meet business needs from data that does
The defined procedures ensure that the right people can use and update data in the
right way, and that all inappropriate access and update is restricted
The Data Governance Council should review and approve the high-level Data
Security Policy
22. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?
68
Regulatory requirements for privacy and confidentiality AND Privacy and
Confidentiality needs of all stakeholders
Segregation of duties
Track the data from source system to a target database, understanding its
transformations
27. Slice, Dice, Roll-up and Pivot are terms used in what kind of data processing?
OLAP
Data Mining
69
29. Critical to the success of the data warehouse is the ability to explain the
data. The DMBoK knowledge area that practices these techniques is:
Metadata Management
Data about the business entities that provide context for business transactions
Repository
Virtualized
70
36. The role of the Conceptual data model in the Metadata repository is:
To summarize the key data subject areas for a business area at a high level of
abstraction to enable the major data concepts to be understood
Assessing impact where change to existing data product entries are proposed e.g. the impact
of change on related data on other systems
Managing change to data products (e.g. Data Dictionary or Business Data Glossary) entries
e.g. new data term to be defined, new data requirement, new database tables added, new
system included into the technical landscape."
Data Glossary
71
Plan
42. Data Governance touch points throughout the project lifecycle are
facilitated by this organization
43. What Organization Structure should set the overall direction for Data Governance?
Taxonomy
The verb phrases describing the business rules in each direction between two entities
72
Conceptual model
50. Which of the following is NOT a stage in the Shewhart / Deming Cycle
that drives the data quality improvement lifecycle?
Investigate
54. Which of these are increasingly driving legislation for information security
73
and data privacy?
GDPR
56. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?
57. One of the key differences between operational systems and data warehouses is:
Operational systems focus on current data; data warehouses contain historical data
74
60. Which approach is considered most effective when supporting
multidimensional business report requests?
OLAP
61. Master data differs from Reference data in the following way:
Unlike Reference data, Master data is not usually limited to predefined domain values
63. What is a common motivation for Reference and Master Data Management?
The need to improve data quality and data integrity across multiple data sources
66. The library of information about our data (our metadata) is built so that:
All of these
75
we can have a shared formalised view of requirements (e.g. what data quality we need)
67. The role of the Physical data model in the Metadata repository is:
To describe how and where our data is stored in our systems applications or packages
68. According to the DAMA DMBoK, the Data Governance Council (DGC)
is the highest authority organization for data governance in an organization.
Who should typically chair this Council?
69. Which of the following is not a step in the 'document and content
management lifecycle'?
The primary key of the parent entity becomes a foreign key in the child entity
72. In Dimensional data models, which of these is NOT true regarding Measures?
74. Which of the following is NOT usually a feature of data quality improvement tools?
Data modeling
76. Which of the following define the data security touch points in an organization?
77. Apart from security requirements internal to the organization, what other
strategic goals should a Data Security Management system address?
Master Data
79. According to the DMBoK, the system that contains the best version of
the Master Data is the:
System of record
EDI
JSON
Proprietary XML
Highest
84. Data quality measurements can be taken at three levels of granularity. They are:
85. Which of the following is the best example of the data quality
dimension of 'consistency'?
78
All the records in the CRM have been accounted for in the data warehouse
88. A Data Integration approach that updates a Data Warehouse with small
changes from Operational systems is called:
CDC
89. Which of the following is NOT a primary Master Data Management area of focus?
90. A common driver for initiating a Reference Data Management program is:
It will improve data quality and facilitate analysis across the organization
79
91. Which of these statements are true about Metadata?
93. What is the difference between an Industry and a Consensus MetaData Standard?
94. When defining your business continuity plan, which of the following should
one consider doing?
Consider written policies and procedures, impact mitigating measures, required recovery
time and acceptable amount of disruption, the criticality of the documents
96. Which of these statements has the most meaningful relationship label?
80
The foreign key must have a role name to avoid attribute duplication
Allows applications to define business entities as needed and manages the mappings between
common data in a central location
100. What would you not expect to find in the MetaData repository?
101. These are examples of which type of Meta-Data: Data Stores and Data
Involved, Government/ Regulatory Bodies; Roles and Responsibilities; Process
Dependencies and Decomposition?
81
Process Meta-Data
Monitor and ensure that organizations meet any regulatory compliance requirements
Local key
105. Top down' and 'bottom up' data analysis and profiling is best done in
concert because:
107. One of the difficulties when integrating multiple source systems is:
82
Determining valid links or equivalences between data elements
Updating the operating system that the Master Data management toolset is running on
113. A strong argument for pursuing Reference Data and/or Master Data
management initiative is:
83
By centralizing the management of Reference and Master data, the organization can
conform critical data needed for analysis
117. A CRUD matrix helps organizations map responsibilities for data changes in
the business process work flow. CRUD stands for
Any data stores or extracts used to support the delivery for BI purposes
84
120. Which of the following is a Meta-Data scheme focused specifically on documents?
Preservation Meta-Data
Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality
needs of all stakeholders
123. A strong argument for pursuing a Reference Data and/or Master Data
management initiative is:
By centralizing the management of Reference and Master data, the organization can
conform critical data needed for analysis
Updating the operating system that the Master Data management toolset is running on
125. What Organization Structure should set the overall direction for Data
Governance?
127. Which of these is a key process in defining data quality business rules?
Separating data that does not meet business needs from data that does
131. Identify who has primary responsibility for data capture and usage design
within programs
86
132. What is the role of the Data Governance Council in defining an Information
Security policy?
The Data Governance Council should review and approve the high-level Data Security
Polic
Monitor and ensure that organisations meet any regulatory compliance requirements
135. A Data Quality Service Level Agreement (SLA) would normally include which
of these?
87
136. The Metadata repository enables us to establish multiple perspectives of data.
These are:
88
1. Which of the following is the Data Storage system that supplies advanced analytics?
a. Operational Data Store
b. Document Database
c. Data Warehouse
d. Transactional Data Store
e. OLAP Cube
Topic: Metadata
Explanation: Metadata helps an organization represent their information consistently, streamline workflow capabilities,
and protect sensitive information. Metadata promotes speed to value in data-related projects (p. 420).
6. Which of the following represents the type of data analysis aimed at understanding organizational activities
andopportunities?
a. Operational Data Store
b. Data Warehouse
c. Operational Data Mart
d. Business Intelligence
e. Dimensional Data Warehouse
Topic: Metadata
Explanation: Metadata Management is a risk management necessity. It helps the organization identify private or
sensitive information so that it can be effectively protected throughout the data lifecycle. Furthermore, it can help an
organization meet compliance requirements (p. 418).
9. In addition to ongoing updates, what is the other main Data Integration process that takes place in a
DataWarehouse?
a. Data quality issue remediation
b. Business Intelligence activity
c. Metadata update
d. Reporting strategy
e. Historical load
10. Which of the following is NOT a type of data that can be modeled?
a. Category information
b. Integration information
c. Resource information
d. Business event information
e. Detail transaction information
Topic: Metadata
Explanation: Metadata is often categorized into three types: business, technical, and operational. These categories
enable data practitioners to understand the range of information that falls under the overall umbrella of Metadata, as
well as the functions through which Metadata is produced (p. 422).
12. What is the definition of an entity?
a. A thing about which an organization collects information
b. A thing that exists separate from other things
c. A thing about which an organization processes information
d. All of the above
e. None of the above
14. Depending on the database technology or data modeling tool and whether the entities involved have
mutualdependencies, when a relationship is defined between two entities, which of the following may be created
implicitly? a. An attribute
b. An identifier
c. A foreign key
d. A data model
e. A simple key
15. What kind of metadata focuses primarily on content and condition of the data?
a. Technical metadata
b. Operational metadata
c. Logical metadata
d. Business metadata
e. Technical metadata
Topic: Metadata
Explanation: Business Metadata includes the non-technical names and definitions of concepts, subject areas, entities,
and attributes; attribute data types and other attribute properties; range descriptions; calculations;algorithms and
business rules; valid domain values and their definitions (p. 422, 423).
16. A combined set of attributes that uniquely identify an entity instance is a…
a. Super key
b. Candidate key
c. Primary key
d. Business key
e. Alternate key
19. When data values must be associated in chronological order and with specific time values, how does the DMBOK
refer to the type of patterns that are used?
a. Chronological patterns
b. Sequence patterns
c. Organizational patterns
d. Time-based patterns
e. Time-oriented patterns
20. Bandwidth can be reduced by filtering to include only data that has been changed within a defined
timeframe.What is the method for this process?
a. Judicious data selection
b. Biased sampling methodology
c. Waterfall method
d. Database-as-a-service (DaaS)
e. Change data capture
22. Applications often compete for access to the same dataset. How can this issue be remedied?a. Conducting data
archiving
b. Setting up data replication
c. Creating a stronger network connection
d. Improving Data Security such as through the Installation of new antivirus software e. Installing a modern
firewall
23. The modeling technique suited for information that changes over time in both structure and content is…a. Data
modeling
b. Dimensional modeling
c. Scenario modeling
d. Metadata modeling
e. Anchor modeling
25. How does the DMBOK refer to an organization that values data as an asset and manages data through all phases
of its lifecycle?
a. Data-centric organization
b. Data management organization
c. Data integration organization
d. Data support organization
e. Data legislative organization
27. Which of the following terms refers to multiple processes that are organized and executed in a system?a.
Integration
b. Development
c. Orchestration
d. Implementation
e. Performance
Topic: Metadata
Explanation: The goals of metadata are to provide organizational understanding of business terms and usage, collect
and integrate metadata from diverse sources, provide a standard way to access metadata, ensure metadata quality
and security (p. 419).
31. What is the most significant business driver for developing organizational capabilities around Big Data and
DataScience?
a. The desire to find and act on business opportunities that may be discovered through large datasets b.
The definition of high quality data
c. The reduction of risk related to Data Security issues
d. The business imperative to ensure efficiency in development projects
e. The determination to act as an agent for change, transformation, and agility
33. Ensuring the performance and reliability of the database through performance tuning, monitoring, error
reporting,and other activities is a responsibility of…
a. Agile Data Management Team
b. Production DBAs
c. Security Administrators
d. Data Quality Team or IT Group
e. Dedicated Information Security Group
35. Which of the following is a guiding principle of Data Storage and Operations?
a. Consolidate data physically and virtually into data hubs
b. Balance local data needs with enterprise data needs, including support and maintenance
c. Lower cost and complexity of managing solutions by developing shared models and interfaces
d. Identify and act on automation opportunities
e. Take an enterprise perspective in design to ensure future extensibility
Topic: Metadata
Explanation: To manage Metadata, organizations should define requirements focused on business needs, such as
creating new data, understanding existing data, enabling movement between systems, accessing data, sharing data,
and sourcing data to meet these requirements (p. 422).
43. Which process focuses on enabling an integrated and historical business context on operational data?a. Data
Asset Valuation process
b. Data Modeling
c. Issue Management
d. Data Warehousing
e. Normalization
Topic: Metadata
Explanation: Metadata is sometimes called “data about data.” Metadata includes information about technical and
business processes, data rules and constraints, and logical and physical data structures (p. 417).
47. "...Leaving data points out, comparing two facts without clarifying their relationship, or ignoring accepted
visualconventions, changing scale to make a trend line look better or worse..."
The above quoted statement from the DMBOK describes which risk related to unethical data handling?
a. Timing
b. Bias
c. Unclear definitions or invalid comparisons
d. Transforming and integrating data
e. Misleading visualizations
Topic: Metadata
Explanation: Without reliable Metadata, an organization does not know what data it has, what the data represents,
where it originates, how it moves through systems, who has access to it, or what it means for the data to be of high
quality (p. 418).
3. Early Big Data was characterized by _______ V's but the number of V's has been expanded to _____a. 3, 5
b. 2, 6
c. 2, 5
d. 3, 7
e. 3, 6
8. Which of the following is used to exchange information within the Semantic Web?
a. Taxonomy
b. Thesaurus
c. Data Model
d. Syntax
e. Ontology
10. Data Management principles include all but one of the following?
a. It takes planning to manage data
b. Data Management requires an enterprise perspective
c. Data Management must drive information technology decisions
d. Different types of data have different lifecycle characteristics
e. Data Management must be done by experts
11. Data created while operational processes are in progress is referred to as...
a. Resource information
b. Business event information
c. Category information
d. Detail transaction information
e. Detail resource information
16. Two systems that are tightly coupled are characterized by what kind of interface?
a. Asynchronous
b. Integration
c. Coupling
d. Synchronous
e. Overlapping
18. Which among the following can be described as goals of a Master and Reference Data Management program?a.
Identification and restoration of improperly merged data Enterprise-wide distribution of trusted data.
b. Determine which sources will provide a comprehensive look at Master Data entities
Match and merge entity instances accurately by developing rules
c. Analyze root causes of issues
Identify the latency between the source system and the consumption system
Analyze the effectiveness of data ingestion and consumption integration techniques
d. Matching and linking new records from a starting point.
Provide information that may not be readily available during record creation
e. To make sure that the enterprise has complete, current and authoritative master and reference data for
their organizational processes.
To provide master and reference data across all functions and applications
of the enterprise. To reduce the cost and complexity of data usage through
common data models.
19. Which data model pattern can be used to construct self-referencing hierarchies?a. Integration Patterns
b. Accumulation Pattern
c. Construction Pattern
d. Assembly Pattern
e. Elementary Pattern
21. Why must all systems handling messages or data packets be able to manage the order of execution of
thoseprocesses?
a. To preserve consistency and continuity
b. To ensure a good view
c. To make it durable
d. To ensure clarity of words
e. To make it complete
25. Data is important to organizations in all but one of the following ways:
a. Organizations need data to conduct interactions with customers and constituents
b. Organizations need data to make decisions
c. Organizations need data for daily operations
d. Organizations sell data to third-parties
e. Organizations get value from data analytics
31. What kind of software helps transform pick lists and controlled vocabularies into pick lists searchable from
thehome page?
a. Trem Management
b. Software Management
c. Transformation Management
d. Content Management
e. Home Page Software
32. "Control of contracts dealing with data, such as cloud storage, external data purchase, sales of data as a
product,and outsourcing data operations" describes which driver of Data Governance?
a. Vendor management
b. General risk management
c. Data Quality improvement
d. Metadata Management
e. Data Privacy
33. Master & Reference Data Management are forms of which of the following?
a. Data Integration
b. Data Security
c. Data Warehousing
d. Dataset Procurement
e. Dataset Valuation
34. The Strong-Wang framework describes ______ dimensions across ______ general categories of data quality.a.
4, 15
b. 15, 4
c. 5, 14
d. 14, 5
e. 15, 5
35. What is the name for an authoritative system where data is created, captured, and/or maintained through a
definedset of rules and expectations?
a. A system of documents
b. A system of record
c. A system of data
d. A system of files
e. A system of reference
40. What is the name for the index that points to Master Data in the various systems of record?a. Record
b. Table of Contents
c. Appendix
d. Registry
e. Database
41. What are the two types of Data Integration processes involved in Data Warehousing?
a. Historical Loads, Ongoing Loads
b. Statistical Update, Historical Loads
c. Historical Update, Statistical Update
d. Historical Update, Ongoing Loads
e. Historical Loads, Ongoing Update
42. In the context of Information Technology, which of the following defines data?
a. Information stored on computers
b. Information stored on SD cards
c. Information stored in a Data Warehouse or Operational Data Store
d. Information in a data center or in the cloud
e. Information stored in digital form
43. Which of the following is one of the ethical principles for data as adapted from the Belmont Principles?a. Honesty
b. Transparency
c. Integrity
d. Respect for persons
e. Fairness
44. In past decades, information such as names and addresses might not have been considered data. Why has
thatchanged?
a. These forms of information can now be analysed to make business decisions
b. These forms of information can now can be stored digitally
c. These forms of information are now available online
d. These forms of information can be used for Data Science
e. These forms of information can be stored by the organization because of improvements in data encryption
45. Which of the following is not a factor that determines the ability of an organization to adopt Data
Architecturepractices?
a. Level of acceptance of formal data governance
b. Ability to holistically consider the enterprise and not focus on project delivery and IT
c. Cultural receptivity to an architectural approach
d. Organizational recognition of data as a business asset
e. Ability to put proper structures in place for the implementation of Data Architecture practices
48. Which of the following is NOT a principle guiding online data practices in the United States?a. Ownership of
data
b. Identity
c. The right to be forgotten
d. Right to sue against the proliferation of false personal information online
e. Freedom of speech online
2. Which of the following is not included in the opinion of the European Data Protection Supervisor (EDPS) on
dataethics?
a. Right to request removal of personal data
b. Accountable controllers who determine personal information processing
c. Privacy-conscious engineering and design of data processing products and services
d. Future-oriented regulation of data processing and respect for the rights to privacy and to data protection e.
Empowered individuals
3. Which framework component of Data Governance includes education, training, and awareness?a. Roles
b. Processes
c. Communication
d. Data
e. Tools
4. In the Data Management Practices Hierarchy, advanced data practices include the following except: a.
Analytics
b. Mining
c. Big Data
d. Warehousing
e. Data Quality
5. What position should be responsible for leading the Data Governance Council (DGC)?
a. DGC Chair should rotate among executive positions
b. Chief Data Architect or Chief Data Modeler
c. Chief Data Steward or Chief Data Officer
d. Chief Information Officer or Chief Technology Officer
e. Any executive can chair the DGC
6. What process describes controlling versions of the organization's datasets?a. Data Quality
b. Master Data
c. Reference Data
d. Data Modeling
e. Metadata
Topic: Metadata
Explanation: Metadata entails the management of information related to the data lifecycle including maintaining a
historical record (i.e. data lineage) (p. 422).
7. What is a hash?
a. An algorithm that converts encoded values into data (or vise versa)
b. A public key that is freely available and used to encode data along with a receiver's private key c. A
clearinghouse for encrypted data
d. A method for masking sensitive data
e. A meetup for Data Strategists
8. Which type of Metadata focuses on the content and condition of the data and includes details related to
DataGovernance?
a. Technical Metadata
b. Operational Metadata
c. Structural Metadata
d. Business Metadata
e. Rights Metadata
Topic: Metadata
Explanation: Business Metadata includes the non-technical names and definitions of concepts, subject areas,
entities, and attributes; attribute data types and other attribute properties; range descriptions; calculations;
algorithms and business rules; and valid domain values and their definitions (p. 422).
11. Which is the most accurate definition of the term data life cycle?
a. It represents the path along which data moves from its point of origin to its point of usage, storage,
and disposal
b. It represents managing the risks associated with data
c. It represents the data used to manage and use data
d. It represents a range of perspectives on how to approach Data Management
e. It represents the theory of data being cross-functional
14. A dataset comprised of county-level statistics provided by the national government would be an example ofa.
Reference Data
b. Master Data
c. Historical Data
d. Metadata
e. Transactional Data
Topic: Master and Reference Data Management
Explanation: Reference Data typically comes from outside the organization. It is used to provide additional context on
the organization’s data. It can help relate the organization’s data to information beyond the boundaries of the
organization (p. 354).
15. When Metadata activities are focused on documents, the information is referred to as…a. Legal Metadata
b. Reference Metadata
c. Administrative Metadata
d. Preservation Metadata
e. Descriptive Metadata
Topic: Metadata
Explanation: Preservation Metadata represents information about document storage, archival conditions, and rules for
conservation (p. 425).
16. A dataset comprised of the X, Y coordinates of company stores would be an example ofa. Metadata
b. Master Data
c. Reference Data
d. Temporary Data
e. Historical Data
18. What is the definition of a business rule in the context of Data Governance?
a. Outlines the steps to take when a business disruption occurs
b. Clarifies an organization's objectives
c. Defines constraints on what can and cannot be done in the organization
d. Contains an organization's contingency plans
e. Clarifies an organization's goal
19. A dataset comprised of customer credit reports purchased from a third-party vendor would be an example of
a. Transactional Data
b. Protected Data
c. Reference Data
d. Master Data
e. Metadata
Topic: Master and Reference Data Management
Explanation: Typically, Reference Data originates outside of the organization. Sometimes Reference Data is used to
refer to a dataset that crosses internal organizational boundaries and may not be owned by a single department. In
this case, credit reports from a third-party vendor would represent external Reference Data (p. 356).
34. Which of the following statements is NOT true of DAMA's Environmental Factors Hexagon?
a. It provides a key for reading the DMBOK context diagrams
b. It shows the relationship between people, processes, and technology
c. It elaborates on the relationship between knowledge areas
d. It puts goals and principles at the center
e. All of the statements are true
37. Which of the following is NOT a responsibility of the Data Quality Oversight Board?
a. Producing certifications and compliance records
b. Conducting feedback interviews with customers
c. Establishing communications and feedback mechanisms
d. Developing and maintaining Data Quality
e. Setting Data Quality improvement priorities
Topic: Metadata
Explanation: Metadata includes information about technical and business processes, data rules and constraints, and
logical and physical data structures (p.417).
45. What process directly involves assessing the impact of proposed changes to existing data product entries?a.
Data Governance
b. Metadata
c. Master Data
d. Reference Data
e. Data Architecture
Topic: Metadata
Explanation: Metadata directly involves assessing the impact of proposed changes to existing data product entries.
For example, Metadata provides information about the technical details of data and the processes that move it within
and between systems (p. 427).
46. The Physical Data Model does NOT include which of the following?
a. Storage objects
b. Indexing objects
c. Indicator of Data Steward owner
d. Encapsulated code objects
e. Code to connect database objects
Indexing objects are used in document management for classification and the development of taxonomies that enable
storage and retrieval of documents.
In addition, the Physical Data Model includes encapsulated code objects required to enforce data quality rules,
connect database objects, and achieve database performance. An example of an encapsulated code object would be
a Java or .NET class executed within a database management system (DBMS).
The Physical Data Model does not typically include organizational details such as Data Steward owner (p. 201, 206).
47. What are the three qualities of an effective Data Governance process?
a. Measured, objective, embedded
b. Sustainable, embedded, measured
c. Optimism, objective, sustainable
d. Embedded, systematic, sustainable
e. Sustainable, realistic, embedded
50. What is the name of the legislation that protects educational records in the United States?
a. SOX
b. BASEL II
c. EPA
d. GDPR
e. FERPA
Question 1
Which of these is NOT a standard motivation for Data Governance?
A. Pre-emptive governance
B. Reactive governance
C. Devolved governance
D. Proactive governance
E. Decentralised Governance
Question 2
Every enterprise is subject to many governmental and industry regulations, many
of which regulate how data and information is used and managed. Part of the Data
Governance Function is to:
A. Perform ad-hoc audits of possible regulations to report to the DG Council on an information only basis
B. This is a risk and audit responsibility; Data Governance plays no role in this
C. Monitor and ensure that organisations meet any regulatory compliance requirements
D. Enforce enterprise-wide mandatory compliance to regulations
E. This is about data; Data Governance is accountable for the whole process, with Risk and Audit reporting to DG
Question 3
In the Information Management Lifecycle, the Data Governance Activity 'Define the
Data Governance Framework' is considered in which Lifecycle stage?
A. Enable
B. Plan
C. Specify
D. Maintain and Use
E. Create and Acquire
Question 4
How do data management professionals maintain commitment of key stakeholders
to the data management initiative?
A. Weekly email reports showing metrics on data management progress/ lack thereof
B. It is not necessary, as the stakeholders signed up at the beginning of the program
C. Rely on the stakeholder group to be self-sustaining
D. Continuous communication education and promotion of the importance and value of of data and information assets
E. Find and deliver benefits to the stakeholders early in the initiative
Question 5
Which of these are NOT true of Data Governance?
A. There are different organization models for DG
B. DG is a continuous process of data improvement
C. IT is a key stakeholder in DG
D. DG is the exercise of authority and control over the management of data assets
E. A DG initiative should always be led by the IT department
Question 6
Documents and records should be classified based on the _______ level of
confidentiality for information found in the record.
A. Overall
B. General
C. Average
D. Highest
Question 7
Which of these describes activities in the document/record management lifecycle?
A. Acquisition, editing, storage, printing, backup, disposal
B. Identification, management of policies, classification, retention, storage, retrieval and circulation, preservation and
disposal
C. Storage, disposal, managing access
D. Acquisition, classification, storage, purging
E. Encryption, backup, disposal, extraction
Question 8
A document management system is an application used to track and store
electronic documents and electronic images of paper documents which provides
the following capabilities:
A. Wiki, collaboration, online editing
B. Securing forwarding of documents to colleagues, never having to dispose of documents
C. Storage, versioning, security, meta-data management, indexing and retrieval
D. Scanning and transcoding of documents
E. Local disk storage and indexing of documents
Question 9
A goal of 'Document and Content Management' is to ensure effective and efficient
retrieval and use of:
A. Data and information in relational formats
B. Data and information in unstructured formats
C. Data and information in structured formats
D. Information, but not data in unstructured formats
E. Data, but not information in unstructured formats
Question 10
Non value-added information is often not removed because:
A. It should not be removed. All data is value-added
B. Data is an asset. It is likely to be recognized as valuable in the future
C. The policies are unclear of what is defined as non-value-added, storage is cheap so there is no cost driver, and it
takes more effort to dispose than to keep
D. We might need the information at a later stage
E. Legislation is unclear on what should be kept
Question 11
All of the following are TRUE statements on relationship types except:
A. A recursive relationship relates instances of an entity to other instances of the same entity
B. A one-to-one relationship says that a parent entity may have one and only one child entity
C. A one-to-many relationship says that a parent entity may have one or more child entities
D. A many-to-many relationship says that an instance of each entity may be associated with many instances of the
other entity, and vice versa
E. A one-to-many relationship says that a child entity may have one or more parent entities
Question 12
What are relationship labels?
A. The nullability setting on a foreign key
B. A foreign key that has been role-named
C. The verb phrases describing the business rules in each direction between two entities
D. A non-identifying relationship
E. A relationship without cardinality
Question 13
In Dimensional data models, which of these is NOT true regarding Measures?
A. Measures can always be added across all dimensions
B. Care must be taken if a measure is a snapshot figure
C. Measures should be numeric and additive
D. Just because a value is numerical does not mean it is a measure
E. Measures are found in Fact tables
Question 14
Dimension tables:
A. Have many columns but few rows
B. Are the same as Facts
C. Have few columns but many rows
D. Contain measures
E. Do not contain hierarchies
Question 15
Identify who has primary responsibility for data capture and usage design within
programs.
A. Suppliers, Consumers
B. Data Architects, Data Analysts,Database Administrators
C. DM Executive, BI Analysts, Data Security Administrator
D. Software Architects, Developers
E. Business Data Stewards, Subject Matter Experts (SMEs)
Question 16
Which of the following is NOT usually a feature of data quality improvement tools?
A. Parsing
B. Standardization
C. Data profiling
D. Data modelling
E. Transformation
Question 17
Which of these is a key process in defining data quality business rules?
A. Separating data that does not meet business needs from data that does
B. Producing data quality reports & dashboards
C. De-duplicating data records
D. Matching data from different data sources
E. Producing data management policies
Question 18
Top down' and 'bottom up' data analysis and profiling is best done in concert
because:
A. It gives something for the architects to do while the profilers get on with the work
B. It gets everyone involved
C. Data quality tools are more productive when they are effectively configured
D. It allows the profiler to show the business the true state of the data
E. It balances business relevance and the actual state of the data
Question 19
Data quality measurements can be taken at three levels of granularity. They are:
A. Fine data, coarse data, and rough data
B. Data element value, data instance or record, and data set
C. Departmental data, regional data, and enterprise data
D. Person data, location data, and product data
E. Historical data, current data and future dated data
Question 20
The Data Quality Management cycle has four stages. Three are Plan, Monitor and
Act. What is the fourth stage?
A. Manage
B. Reiterate
C. Deploy
D. Prepare
E. Improve
Question 21
What is the role of the Data Governance Council in defining an Information
Security policy?
A. The Data Governance Council should implement the Data Security Policy
B. The Data Governance Council should review and approve the high-level Data Security Policy
C. The Data Governance Council should draft early versions of the Data Security Policy
D. The Data Governance Council should have no role in Data Security
E. The Data Governance Council should define the Data Security Policy
Question 22
Stakeholders whose concerns must be addressed in data security management
include:
A. Media analysts, Internal Risk Management, Suppliers, or Regulators
B. The Internal Audit and Risk committees of the organisation
C. External Standards organisations, Regulators, or the Media
D. All of these
E. Clients, Patients, Citizens, Suppliers, or Business Partners
Question 23
How does Data Security contribute to competitive advantage?
A. Data Security makes it harder for your competitors to find out about who you do business with
B. Data Security helps to protect proprietary information and intellectual property, as well as customer and partner
information
C. Governments do not allow organisations to trade if they do not manage Data Security
D. Data Security makes your competitors invest more effort into trying to find out your trade secrets
E. Data security stops organisations going out of business due to an information leak
Question 24
Which of these are increasingly driving legislation for information security and
data privacy?
A. A desire for economic protectionism
B. An objective of making life more challenging for information management professionals
C. A recognition of Ethical issues in information management
D. A resistance to open data and transparency
E. GDPR
Question 25
Definition of Data Security Policies should be:
A. Conducted by external consultants
B. Reviewed by external Regulators
C. Based on defined standards and templates
D. Determined by external Regulators
E. A collaborative effort between Business and IT
Question 26
In its broadest context, the data warehouse includes:
A. Data stores and extracts that can be transformed into star schemas
B. Either an Inmon or Kimball approach
C. Any data stores or extracts used to support the delivery for BI purposes
D. All the data in the enterprise
E. An integrated data store, ETL logic, and extensive data cleansing routines
Question 27
One of the key differences between operational systems and data warehouses is:
A. Operational systems focus on current data; data warehouses contain historical data
B. Operational systems focus on business processes; data warehouses focus on business strategies
C. Operational systems are available 24x7; data warehouses are available during business hours
D. Operational systems focus on historical data; data warehouses contain current data
E. Operational systems focus on data quality; data warehouses focus on data security
Question 28
A comparatively new architectural approach is where volatile data is provisioned
in a data warehouse structure to provide transactional systems with a combination
of historical and near real time data to meet customer needs. This is a definition
of:
A. Active Data Warehousing
B. On Line Analytical Processing Cube
C. On Line Transactional Processing System
D. Behavioural Decision Support Systems
E. Operational Data Store
Question 29
Critical to the incremental development of the data warehouse is:
A. A strong capacity management process
B. An agile development team
C. The assurance to include velocity, variety and veracity measurement
D. A strong release management process
E. A strong incident management process
Question 30
A data lineage tool enables a user to:
A. Enables rapid development of dashboard reporting
B. Visualize how the data gets to the data lake
C. Track the data from source system to a target database; understanding its transformations
D. Line up the data to support sophisticated glossary management
E. Track the historical changes to a data value
Question 31
Which one of the following statements is true?
A. Master Data Management involves identifying and maintaining approved coded values
B. Business data stewards maintain lists of valid data values for master data instances
C. Reference Data Management involves identifying the 'best' or 'golden' record for each domain
D. Master Data Management requires techniques for splitting or merging an instance of a business entity
E. Managing reference data requires the same activities and techniques as does managing master data
Question 32
What is a common motivation for Reference and Master Data Management?
A. The need to build a Data Dictionary of all core data entities & attributes
B. Regulatory acts such as BCBS239, GDPR and SOX
C. The need to improve data quality and data integrity across multiple data sources
D. The need to consolidate all data into one physical database
E. Business Intelligence and Data Warehousing
Question 33
A common driver for initiating a Reference Data Management program is:
A. It can be a one-time-only project
B. It fosters the creative use of data
C. It will improve data quality and facilitate analysis across the organization
D. It will consolidate the process of securing third party code sets
E. Managing codes and descriptions requires little effort and low cost
Question 34
Master data differs from Reference data in the following way:
A. Master data is stipulated and controlled by Data Governance where Reference data is not
B. Unlike Reference data, Master data is not usually limited to predefined domain values
C. Master data should be held to a higher data quality standard than Reference data
D. Master data does not require a data steward
E. Master data does not require business definitions
Question 35
Plant Equipment is an example of:
A. Reference Data
B. None of these
C. Transaction Data
D. Inverted Data
E. Master Data
Question 36
What would you not expect to find in the MetaData repository?
A. Data Dictionary
B. Data Models
C. Data Lineage diagrams and models
D. Data Requirements
E. Data storage devices
Question 37
The role of the Physical data model in the Metadata repository is:
A. How many master data records are stored in our MDM system
B. Which version of COTS software (E.g. SAP) is implemented
C. To describe how and where our data is stored in our systems applications or packages
D. When the duplicated records were merged
E. What the business definition of data concepts is
Question 38
Metadata repository processes will not include:
A. Managing change to data products (e.g. Data Dictionary or Business Data Glossary) entries e.g. new data term to
be defined, new data requirement, new database tables added, new system included into the technical landscape
B. Selecting Data Management Library software, search, and storage technologies
C. Assessing impact where change to existing data product entries are proposed e.g. the impact of change on related
data on other systems
D. Controlling versions of data product will be required to manage the required single published master copy in
conjunction with the variants potentially established as work in progress
E. All of these
Question 39
Which of the following is a Meta-Data scheme focused specifically on documents?
A. Descriptive Meta-Data
B. Administrative Meta-Data
C. Business Meta-Data
D. Preservation Meta-Data
E. Structural Meta-Data
Question 40
To which of the following initiatives was the establishment of an industry Meta-
Data Standard essential?
A. Internet Protocols
B. JSON
C. EDI
D. BASEL II/ SOX
E. Proprietary XML
Question 41
According to the DAMA DMBoK, the Data Governance Council (DGC) is the highest
authority organization for data governance in an organization. Who should
typically chair this Council?
A. The Chief Data Architect
B. The chair should rotate across the Data Owners
C. Any Executive / C-level participant in the DGC
D. Chief Data Steward (Business) / Chief Data Officer
E. The Chief Information Officer (CIO)
Question 42
What are the primary responsibilities of a data steward?
A. Analyzing data quality
B. Identifying data problems and issues
C. The data analyst who is the subject matter expert (SME) on a set of reference data
D. A business role appointed to take responsibility for the quality and use of their organization's data assets
E. The manager responsible for writing policies and standards that define the data management program for an
organization
Question 43
Which of these does NOT characterize an effective data steward?
A. Is a recognized subject matter expert in the data subject area / business domain that he or she is responsible for
B. Is a highly experienced technical expert in a variety of data management disciplines & tools
C. He / she works collaboratively across the organization with data stakeholders and others identifying data problems
and issues
D. He / She is an effective communicator
E. He / She works in association with the Data Owner to protect and enhance the data assets under his or her control
Question 44
Who is most responsible for communicating and promoting awareness on the
value of Data Governance in the organization?
A. Data Owners and Stewards
B. The Data Governance Council
C. Everyone in the Data Management Community
D. Data Champions
E. The Data Governance Office
Question 45
An umbrella term for any classification or controlled vocabulary is:
A. English
B. Dictionary
C. Metadata
D. Data model
E. Taxonomy
Question 46
Which of these statements has the most meaningful relationship label?
A. An order is connected with order lines
B. An order is related to order lines
C. An order line contains orders
D. An order is composed of order lines
E. An order is associated with order lines
Question 47
In the conceptual data model an instantiation of a particular business entity is
described as:
A. Rule
B. Record
C. Entity occurrence
D. Row
E. Dataset
Question 48
Which of these is NOT a type of key found in a data model?
A. Local key
B. Foreign key
C. Primary key
D. Alternate key
E. Surrogate key
Question 49
A data quality program should limit its scope to:
A. The data that changes most often
B. The data most critical to the enterprise and its customers
C. The highest profile program with the best benefits
D. All the data stored in the enterprise
E. The data that is of interest to the Chief Executive Officer
Question 50
Apart from security requirements internal to the organisation, what other strategic
goals should a Data Security Management system address?
A. Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality needs of all stakeholders
B. None of these
C. Compliance with ISO29100 and PCI-DSS
D. Ensuring the organisation doesn't engage in SPAM marketing
E. Compliance with ISO27001 and HIPPA
Question 51
A RACI matrix is a useful tool to support the ______ in an outsourced
arrangement.
A. Segregation of duties
B. Alignment of Business goals
C. Service level Agreement
D. Transfer of access controls
E. Attributing Costs
Question 52
Which of these are characteristics of an effective data security policy?
A. The policies are specific, measurable, achievable, realistic, and technology aligned
B. The defined procedures are tightly defined, with rigid and effective enforcement sanctions, and alignment with
technology capabilities
C. The procedures defined are benchmarked, supported by technology, framework based, and peer reviewed
D. None of these
E. The defined procedures ensure that the right people can use and update data in the right way, and that all
inappropriate access and update is restricted
Question 53
When performing an evaluation of analytic applications, which of the following
questions is least relevant to identify the level of effort needed?
A. The Standard source systems for which ETL is supplied
B. How much do the canned processes in the tool match our business
C. Number of source systems we need to integrate into the tool
D. Annual costs such as license, maintenance, etc.
E. How much of the tool infrastructure meets our organisational infrastructure
Question 54
Slice, Dice, Roll-up and Pivot are terms used in what kind of data processing?
A. OLTP
B. EIEIO
C. EDI
D. OLAP
E. ODS
Question 55
You need to discover possible relationships or to show data patterns in an
exploratory fashion when you do not necessarily have a specific question to ask.
What kind of data tool would you use to identify patterns of data using various
algorithms?
A. ETL Jobs
B. Data Mining
C. Meta-Data Data Lineage View
D. Data Quality Profiler
E. Data Visualisation Application
Question 56
Reference Data:
A. Usually has more attributes than Master Data
B. Is more difficult to Govern than Master Data
C. Usually has fewer attributes than Master Data
D. Is free
E. Is also known as External data
Question 57
Which of the following is NOT a primary Master Data Management area of focus?
A. Generating a golden record/best version of the truth
B. Producing read only versions of key data items
C. Producing clear data definitions for Master Data
D. Providing access to golden data records
E. Identifying duplicate records
Question 58
We do not expect to consult the MetaData repository when:
A. Investigating a data issue
B. None of the these
C. Assessing the impact of change
D. Updating the operating system that the Master Data management toolset is running on
E. Undertaking a data quality assessment
Question 59
The role of the Conceptual data model in the Metadata repository is:
A. None of these
B. To determine the primary, alternate and foreign keys of entities
C. To summarize the key data subject areas for a business area at a high level of abstraction to enable the major data
concepts to be understood
D. All of these
E. To agree the cardinality and optionality of relationships between all entities
Question 60
We would expect to consult the Metadata Library when:
A. Implementing a Data Quality tool
B. Selecting a Data Storage device
C. Assessing the impact of change
D. Formulating a Goverance policy
E. Accessing the internet
Question 61
What Organization Structure should set the overall direction for Data Governance?
A. Data Governance Office
B. PMO
C. Data Governance Council
D. Data Quality Board
E. IT Leadership Team
Question 62
The needs of data protection require us to ensure that:
A. Data is encrypted at all times
B. Data is processed only in ways compatible with the intended and communicated use it was collected for, and
respects the consent of the data subject
C. Data can always be freely used in the company as it is a company asset
D. Data is frequently backed up so that it can be recovered in all cases
E. Data is secured with a password
Question 63
Which statement best describes the relationship between documents and records?
A. Documents and records are the same thing
B. Documents are written and records are audio
C. Documents are a sub-set of records
D. Documents and records are not related
E. Records are a sub-set of documents
Question 64
Components of logical data models include:
A. Attributes
B. Keys
C. All of the above
D. Relationships
E. Entities
Question 65
Which of the following statements about business rules is FALSE?
A. All business rules must be identified prior to the start of the data modelling process
B. Action rules are instructions on what to do when data elements contain certain values
C. Data rules constrain how data relates to other data
D. Data rules cannot be shown on a data model
E. Action rules are difficult to define in a data model
Question 66
Complete the following statement. A business rule:
A. Measures a business process
B. Identifies an entity instance
C. Defines an entity
D. Only exists at the level of the physical data model
E. Defines constraints on what can and cannot be done
Question 67
A Data Quality dimension is:
A. A measurable feature or characteristic of data
B. One aspect of data quality used extensively in data governance
C. The value of a particular piece of data
D. A valid value in a list
E. A core concept in dimensional modelling
Question 68
Which of these is NOT a typical activity in Data Quality Management?
A. Identifying data problems and issues
B. Analysing data quality
C. Defining business requirements and business rules
D. Creating inspection and monitoring processes
E. Enterprise Data Modelling
Question 69
When outsourcing information management functions, organisations can:
A. Align strategy and control privacy
B. Reduce cost of compliance and improve turnaround
C. Transfer control but not accountability
D. Transfer accountability but not control
E. Improve controls while reducing costs
Question 70
A CRUD matrix helps organisations map responsibilities for data changes in the
business process work flow. CRUD stands for
A. Create, Read, Update, Delete
B. Cost, Revenue, Uplift, Depreciate
C. Create, Review, Use, Destroy
D. Confidential, Restricted, Unclassified, Destroy
E. Create, React, Utilise, Delegate
Question 71
Critical to the success of the data warehouse is the ability to explain the data. The
DMBoK knowledge area that practices these techniques is:
A. Document & Content Management
B. Reference and Master Data
C. Data Architecture
D. Data Storage and Operations
E. Metadata Management
Question 72
A Data Integration approach that updates a Data Warehouse with small changes
from Operational systems is called:
A. SOA
B. ELT
C. EII
D. CDC
E. ETL
Question 73
According to the DMBoK, the system that contains the best version of the Master
Data is the:
A. Consuming system
B. System of record
C. Golden record
D. Source system
E. Spoke
Question 74
Reference data:
A. Is always supplied by outside vendors
B. Is used to categorize and classify other data
C. Has obvious definitions
D. When incorrect has a greater impact than errors in Master and Transaction data
E. Has limited value
Question 78
The MetaData repository enables us to establish multiple perspectives of data.
These are:
A. Structured and unstructured
B. Business and Technical Perspective
C. Internal and External
D. 3rd normal form and un normalised
E. Dimensional and non dimensional perspective
Question 79
A business perspective product in the MetaData repository is:
A. ETL flow
B. Physical Data Model
C. Data Dictionary
D. Systems Inventory
E. Data Glossary
Question 80
The library of information about our data (our metadata) is built so that:
A. All of these
B. We can have a shared formalized view of requirements (e.g. what data quality we need)
C. We can better understand it
D. We can better manage it
E. We can be consistent in our use of terminology
Question 81
What is the difference between an Industry and a Consensus Meta-Data Standard?
A. Industry Standards refer to internationally approved global standards such as ISO whereas consensus standards
refer to those agreed to within an organisation
B. The terms are used interchangeably to describe the same concept
C. Consensus standards are formed by an international panel of experts whereas industry standards are dictated by
a panel of vendors
D. Consensus standards are formed by government legislation whereas industry standards evolve from best practice
E. Industry standards are determined by regulators within a given global region and consensus standards are agreed
on the Data Governance Council within an organization
Question 82
When new governmental and industry regulations are formulated and enacted,
Data Governance plays a key role in the process of identifying the data and
information components for compliance. What do you see as their most important
role in any regulatory compliance project?
A. Provide access to any possible data set to the compliance team and allow them to mine the data for non-
compliance
B. Take no part in any project at all, declaring it an audit and risk project
C. Create a DG 'in-house' project with a team of data stewards to create a standard response
D. Work in isolation and mine the data and information for compliance and non-compliance issues
E. Working with business and technical leadership to find the best answers to a standard set of regulatory
compliance questions (How, Why, When, etc)
Question 83
When defining your business continuity plan, which of the following should one
consider doing?
A. Make sure that the data is retained sufficiently long, check that critical data is encrypted, check access rights
B. Write a report and discuss with management the required budget
C. Have the contracts in place to acquire new hardware in case of technical problems, define policies
D. Consider written policies and procedures, impact mitigating measures, required recovery time and acceptable
amount of disruption, the criticality of the documents
E. Determine the risk, probability and impact, check document backup frequency
Question 84
In a non-identifying relationship:
A. The primary key of the parent entity becomes a foreign key in the child entity
B. The primary key of the parent entity becomes part of the primary key of the child entity
C. The primary key of the child entity is removed
D. The primary key of the child entity is concatenated
E. The foreign key of the parent entity migrates to the child entity
Question 85
A Data Quality Service Level Agreement (SLA) would normally include which of
these?
A. Respective roles & responsibilities for data quality
B. A breakdown of the costs of data quality improvement
C. Detailed technical specifications for data transfer
D. An enterprise data model
E. A Business Case for data improvement
Question 86
Which of the following is NOT a stage in the Shewhart / Deming Cycle that drives
the data quality improvement lifecycle?
A. Check
B. Do
C. Plan
D. Act
E. Investigate
Question 87
Which of the following is the best example of the data quality dimension of
'consistency'?
A. The revenue data in the dataset is always $100 out
B. The source data for the end of month report arrived 1 week late
C. The phone numbers in the customer file do not adhere to the standard format
D. All the records in the CRM have been accounted for in the data warehouse
E. The customer file has 50% duplicated entries
Question 88
Which of the following is not a good example of BI?
A. Strategic Analytics for Business Decisions
B. Supporting Risk Management Decision Reporting
C. Statutory reporting to a Regulatory Body
D. Decision Support Systems
Question 89
A strong argument for pursuing a Reference Data and/or Master Data management
initiative is:
A. By centralizing the management of Reference and Master data, the organization can conform critical data needed
for analysis
B. It will not require a lot of time
C. Job security for the data people
D. They are essential functions in the data management framework
E. It will not require a lot of effort
Question 90
Which of these is a valid definition of Reference Data?
A. Data that is fixed and never changes
B. Data that has a common and widely understood data definition
C. Data that is widely accessed and referenced across an organisation
D. Data that provides metadata about other data entities
E. Data used to classify or categorize other data
Question 91
Master Data Management:
A. Allows applications to define business entities as needed and manages the mappings between common data in a
central location
B. Is synonymous with Reference Data Management
C. Is time-consuming with questionable impact on data quality
D. Ensures coded values are always used
E. Controls the definition of business entities
Question 92
Which of these is a valid definition of Master Data?
A. Data that rarely, if ever, changes
B. Data that if missing or incorrect will cause transactions and processes to fail
C. Data that is only held in one data source
D. Data that other data sits hierarchically beneath
E. Data about the business entities that provide context for business transactions
Question 93
These are examples of which type of Meta-Data: Data Stores and Data Involved,
Government/ Regulatory Bodies; Roles and Responsibilities; Process
Dependencies and Decomposition?
A. Operational Meta-Data
B. Data Stewardship Meta-Data
C. Business Meta-Data
D. Process Meta-Data
E. Technical Meta-Data
Question 94
Which of these statements are true about Metadata?
A. The repository is always a hybrid architecture
B. The repository is always a centralized architecture
C. Data models are components of a Metadata repository
D. A Metadata repository and a Glossary are synonyms
E. The repository is always a decentralized architecture
Question 95
Which of the following is not a step in the 'document and content management
lifecycle'?
A. Audit documents and records
B. Create a content strategy
C. Manage retention and disposal
D. Capture records and content
E. Manage versions and control
Question 96
In a recursive relationship:
A. The relationship could be mandatory at either end
B. The foreign key must have a role name to avoid attribute duplication
C. All of the above
D. The relationship could be an identifying relationship
E. None of these, recursive relationships are not allowed in Data Models
Question 97
What is Manual Directed Data Quality Correction?
A. The use of automated cleanse and correction tools with results manually checked before committing outputs
B. Teams of data correctors supervised by data subject matter experts
C. Using a data quality improvement manual to guide data cleanse and correction activities
D. The use of spreadsheets to manually inspect and correct data
E. The automation of all data cleanse and correction routines
Question 98
Which of these statements is true?
A. Data Quality Management is usually a one-off project
B. Data Quality Management only addresses structured data
C. Data Quality Management is a continuous process
D. Data Quality Management is a synonym for Data Governance
E. Data Quality Management is the application of technology to data problems
Question 99
Which of these statements best defines Data Security Management?
A. The implementation and execution of checkpoints, checklists, controls, and technical mechanisms to govern the
access to information in an enterprise
B. None of these
C. The definition of controls, technical standards, frameworks, and audit trail capabilities to identify who has or has had
access to information
D. The planning, implementation, and testing of security technologies, authentication mechanisms, and other controls to
prevent access to information
E. The planning, development, and execution of security policies and procedures to provide proper authentication,
authorization, access, and auditing of data and information assets
Question 100
One of the difficulties when integrating multiple source systems is:
A. Completing the data architecture on time for the first release
B. Having a data quality rule applicable to all source systems
C. Modifying the source systems to align to the enterprise data model
D. Maintaining documentation describin
E. g the data warehouse operation
F. Determining valid links or equivalences between data elements
Question 101
Which of the following statements regarding a value domain is FALSE?
A. A value domain is a set of allowed values for a given code set
B. Conforming value domains across the organization facilitates data quality
C. A value domain provides a set of permissible values by which a data element can be implemented
D. More than one set of reference data value domains may refer to the same conceptual domain
E. Value domains are defined by external standard organizations
Question 102
The number of artifacts that must be searched in the Metadata repository for all
Business change projects are:
A. The Business Data Glossary and Systems Inventory must be consulted
B. Conceptual data models and the Business Data Glossary must be examined
C. Conceptual, Logical and Physical models must be examined
D. There is no mandatory number of artefacts to be searched but it is highly recommended that the library is examined
E. The Business Data Glossary and Data Dictionary must be examined
Question 103
Data Governance touch points throughout the project lifecycle are facilitated by
this organization.
A. The Master Data Office
B.
C. The Data Stewards Office
D. The Data Governance Steering Committee
E. The Project Management Office
F. The Data Governance Office
Question 104
In 2009, ARMA International published GARP for managing records and
information. GARP stands for:
A. Generally Available Recordkeeping Practices
B. Global Accredited Recordkeeping Principles
C. Gregarious Archive of Recordkeeping Processes
D. Generally Acceptable Recordkeeping Principles
E. G20 Approved Recordkeeping Principles
Question 105
What type of Meta-Data provides developers and administrators with knowledge
and information about systems?
A. Technical Operational Meta-Data
B. Unstructured Meta-Data
C. Business Meta-Data
D. Process Meta-Data
E. Data Stewardship Meta-Data
Question 106
A type of Master data architecture is:
A. Registry
B. Hybrid
C. Repository
D. All of the above
E. Virtualised
Question 107
Which of the following define the data security touch points in an organisation?
B. Legislation
C. Risk Assessment
D. Internal Audit
Question 108
Which approach is considered most effective when supporting multi-dimensional
business report requests?
A. EDI
B. ODS
C. OLAP
D. OLTP
E. BI
Question 109
Which of the following are primary deliverables of proper document and record
management?
Question 110
The highest level of these data model types is the:
A. Database model
B. Physical model
C. Logical model
D. Conceptual model
E. Dimensional model
Question 111
What is the difference between cardinality rules and data integrity rules?
A. Referential integrity rules define the quantity of each entity instance that can participate in a relationship between
two entities, and cardinality rules ensure valid values
B. There is no difference. Cardinality rules and Referential integrity rules are synonyms
C. Cardinality rules define the quantity of each entity instance that can participate in a relationship between two
entities, and referential integrity rules ensure valid values
D. Referential integrity rules only appear on a relational data model, and cardinality rules only appear on a
dimensional data model
E. Referential integrity rules quantify the relationships between two or more entities, and cardinality rules quantify the
common attributes across entities
Question 112
Which of these is NOT an expected role of a Data Quality Oversight Board?
A. Developing & maintaining data quality
B. Data profiling & analysis
C. Setting data quality improvement priorities
D. Establishing communications & feedback mechanisms
E. Producing certification & compliance policies
According to the DMBoK2, which items are not a consideration in a data valuation?
Answer: How much we can be ransomed for by a malware attack..
According to the DMBOK, which of the following are included as Data Management
goals?
Answer: We should ensure that data can be used effectively to add value to the
enterprise..
According to the DAMA DMBoK, the Data Governance Council (DGC) is the highest-
authority organization for Data Governance in an organization. Who should typically chair
this Council?
Answer: Chief Data Steward (Business)/Chief Data Officer.
What area do you not consider when developing a Data Governance Operating Model?
Answer: The availability of industry data models.
What organization structure should set the overall direction for Data Governance?
Answer: Data Governance Council.
What type of Meta-Data provides developers and administrators with knowledge and
information about systems?
Answer: Technical Operational Meta-Data..
What factors should you consider when choosing data warehouse tools?
Answer: All of the above..
To answer questions like "What does this report mean?" or "What does this metric
mean?", the data warehouse/BI team should focus on
Answer: End-to-end metadata..
What is the role of the Data Governance Council in defining an Information Security
policy?
Answer: The Data Governance Council should review and approve the high-level
Data Security Policy..
What is the difference between cardinality rules and data integrity rules?
Answer: Cardinality rules define the quantity of each entity instance that can
participate in a relationship between two entities, and referential integrity rules
ensure valid values.
The Data Quality Management cycle has four stages. Three are Plan, Monitor, and Act.
What is the fourth stage?
Answer: Deploy.
What technique will identify the system of record for the data?
Answer: Analysis of lineage.
What is the benefit of using role groups to implement Data Security policies?
Answer: It reduces the amount of effort to assign access rights to users if they
inherit rights from their group.
According to the DMBOK, the system that contains the "best version" of the master data
is the
Answer: System of record.
What position is responsible for the quality and use of their organization's data assets?
Answer: Data Steward.
What position should be responsible for leading the Data Governance Council (DGC)?
Answer: Chief Data Steward or Chief Data Officer.
According to the DMBoK, which of these is NOT a valid dimension of Data Quality?
Answer: Relevance.
What is the difference between a Data Security Policy and an information technology
security policy?
Answer: Data Security policies are more granular in nature and take a data-centric
approach.
What is the name of the legislation that protects educational records in the United
States?
Answer: FERPA.
According to Henry Morris of IDC, Analytical Applications provide business with a pre-
built solution to optimize a functional area or industry vertical
Answer: TRUE.
What is a hash?
Answer: An algorithm that converts encoded values into data (or vise versa).
What/How.
Answer: Which of the following should staff do to guarantee optimum database
performance of database operations?
What process directly involves assessing the impact of proposed changes to existing
data product entries?
Answer: Metadata.
According to the DAMA DMBoK, what parts of the Data Lifecycle are integral parts of the
SDLC
Answer: Plan, Specify, Enable.
An employee may work for one other employee and may manage one or more
employees. There is an indeterminate number of levels in this management hierarchy.
What type of relationship would work best?
Answer: recursive.
In computer programming, data types can be divided into two categories. What are they?
Answer: Value types and reference types.
What kind data model does Ralph Kimball's data warehouse approach use?
Answer: Dimensional.
What is the correct term for the consolidation of multiple data entities in a dimension?
Answer: Controlled Redundancy.
What is the differerence between data in Data warehouses and marts and data in
applications?
Answer: All the options are valid.
What artefacts describe how to do Data Governance?
Answer: Data Procedures.
What is the process called which monitors a data set for inserts, updates and deletes,
and then passes these deltas on to other data consumers?
Answer: CDC.
The Transform process makes the selected data compatible with the structure of the
target data store. What is NOT a valid example of transformation?
Answer: The staging of extracted data in memory.
In the source system, gender codes are stored as integers, but the target system stores
them as "male", "female" and "unknown". What type of transformation is needed?
Answer: Semantic conversion.
What is the process of determining whether two references to real world objects refer to
the same or different objects called?
Answer: Entity resolution.
Relevance
Completeness
Timeliness
Reasonableness
Correct answer
Relevance
Why / How
What / Who
What / How
How / Why
Correct answer
What / How
When defining Data Quality indicators, care must be taken to ensure that
they have what? *
1/1
Measurability, Relevance, and Acceptability
Correct
The data operations team assures that the data is recoverable by what?
*
1/1
Guaranteeing the applications take proper exports of the data
Maintaining a test, development, and production environment
Making sure the disks are checked regularly for write errors
Analyzing database error logs
Defining and executing the data recovery plan
Correct
not clear
Data Governance touchpoints throughout the project lifecycle are
facilitated by this organization? *
0/1
The Master Data Office
The Data Governance Office
The Data Stewards Office
The Data Governance Steering Committee
Incorrect
The Project Management Office
Correct answer
The Data Governance Office
Correct answer
The value of a metric is limited unless it can be linked to some aspect of a business. The metric's
acceptability threshold needs to correlate with business expectations
When defining Data Quality indicators, care must be taken to ensure that
they have what?*
1/1
Timeliness, Validity, and Accuracy
Measurability, Relevance, and Acceptability
More conceptual data models than logical data models, and more logical data models
than physical data models.
The same number of each of the model types.
Database performance depends upon two independent facets. These
are?*
1/1
Choice of DBMS and programming language
Hardware and network
Availability and speed
Distance to data center and network bandwidth
Number of users and number of tables
In data security, which of the following is not one of the four "A's":*
1/1
Access
Authentication
Audit
Available