Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Data Management Fundamentals Question and Answers

Data Management Fundamentals

Last Update May 2, 2024
Total Questions : 486

We are offering FREE DMF-1220 DAMA exam questions. All you do is to just go and sign up. Give your details, prepare DMF-1220 free exam questions and then go for complete pool of Data Management Fundamentals test questions that will help you more.

DMF-1220 pdf

DMF-1220 PDF

$35  $99.99
DMF-1220 Engine

DMF-1220 Testing Engine

$42  $119.99
DMF-1220 PDF + Engine

DMF-1220 PDF + Testing Engine

$56  $159.99
Questions 1

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

Options:

A.  

Data storage

B.  

Data marketing

C.  

Data aggregation

D.  

Data marking

E.  

Data masking

F.  

Data integration

Discussion 0
Questions 2

Types of metadata include:

Options:

A.  

Strategic

B.  

Business

C.  

Column-orientated

D.  

Operational

E.  

Graph

F.  

Technical

Discussion 0
Questions 3

One of the percentages to measure success of a records management system implantation is the percentage of the identified corporate records declared as such and put under records control.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Questions 4

The second stage of Kotter’s eight stage process is:

Options:

A.  

Developing a vision and a strategy

B.  

Establishing a sense of urgency

C.  

Creating short term wins

D.  

Creating the guiding coalition

Discussion 0
Questions 5

Characteristics that minimise distractions and maximise useful information include, but not limited to, consistent object attributes

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 6

Accomplish repository scanning in two distinct approaches, including:

Options:

A.  

Semi- proprietary integration

B.  

Proprietary interface

C.  

Semi-proprietary interface

D.  

Proprietary integration

Discussion 0
Questions 7

Project that use personal data should have a disciplined approach to the use of that data. They should account for:

Options:

A.  

What activities analytics will focus on

B.  

How they select their populations for study

C.  

All of the above

D.  

How data will be captured

E.  

How results will be made accessible

Discussion 0
Questions 8

Operational Metadata describes details of the processing and accessing of data. Which one is not an example:

Options:

A.  

Error logs

B.  

Schedule anomalies

C.  

Purge criteria

D.  

Failure logs

Discussion 0
Questions 9

Barriers to effective management of data quality include:

Options:

A.  

Inappropriate or ineffective instruments to measure value

B.  

Lack of awareness on the part of leadership and staff

C.  

Lack of leadership and management

D.  

Lack of business governance

E.  

None of the above

F.  

Difficulty in justification of improvements

Discussion 0
Questions 10

Databases are categorized in three general ways:

Options:

A.  

Warped

B.  

Non-relational

C.  

Relational

D.  

Accessible

E.  

None of the above

F.  

Hierarchical

Discussion 0
Questions 11

Bias refers to an inclination of outlook. Please select the types of data bias:

Options:

A.  

Data collection for pre-defined results

B.  

Hunch and search

C.  

Positive reinforcement

D.  

Context and Emotion

E.  

Biased use of data collected

F.  

Biased sampling methodology

Discussion 0
Questions 12

Well prepared records have characteristics such as:

Options:

A.  

Context

B.  

Content

C.  

Compliance

D.  

Timeliness

Discussion 0
Questions 13

Please select the correct general cost and benefit categories that can be applied consistently within an organization.

Options:

A.  

Cost of erasing data from servers

B.  

Cost of improving data

C.  

What the data could be sold for

D.  

Benefit of higher quality data

E.  

Cost of replacing data if it were lost

F.  

What competitors would pay for data

Discussion 0
Questions 14

Business rules describe why business should operate internally, in order to be successful and compliant with the outside world.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Questions 15

Implementing a BI portfolio is about identifying the right tools for the right user communities within or across business units.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 16

Within projects, conceptual data modelling and logical data modelling are part of requirements planning and analysis activities, while physical data modelling is a design activity.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 17

The most important reason to implement operational data quality measurements is to inform data consumers about levels of data effectiveness.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Questions 18

Modeling Bid data is a non-technical challenge but critical if an organization that want to describe and govern its data.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 19

Data governance requires control mechanisms and procedures for, but not limited to, assignment and tracking of action items.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Questions 20

JSON is an open, lightweight standard format for data interchange.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Questions 21

Data mining is a sub-field of supervised learning where users attempt to model data elements and predict future outcomes through the evaluation of probability estimates.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 22

Data Management Professionals only work with the technical aspects related to data.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 23

SOA stand for Service Orchestrated Architecture

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 24

Please select the transition phases in Bridges’ Transition process:

Options:

A.  

The neutral zone

B.  

The new beginning

C.  

The ending

D.  

The transition

E.  

The translation

F.  

The game

Discussion 0
Questions 25

Location Master Data includes business party addresses and business party location, as well as facility addresses for locations owned by organizations.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 26

Poorly managed Metadata leads to, among other, redundant data and data management processes.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 27

Please select the 3 visuals that depict DAMA’s Data Management Framework.

Options:

A.  

The DAMA Octagon

B.  

The Knowledge Area Context Diagram

C.  

The Data Quality Function Context Diagram

D.  

The DAMA Wheel

E.  

The Environmental Factors hexagon

Discussion 0
Questions 28

ISO 8000 will describe the structure and organization of data quality management, including:

Options:

A.  

Data Quality Assurance

B.  

None of the above

C.  

Data Quality Planning

D.  

Data Quality Audit

E.  

Data Quality Control

F.  

Data Quality Improvement

Discussion 0
Questions 29

CMDB provide the capability to manage and maintain Metdata specifically related to the IT assets, the relationships among them, and contractual details of the assets.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 30

Metadata is described using a different set of categories, not including:

Options:

A.  

Descriptive metadata

B.  

Database metadata

C.  

Structural metadata

D.  

Administrative metadata

Discussion 0
Questions 31

Corrective actions are implemented after a problem has occurred and been detected.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Questions 32

Device security standards include:

Options:

A.  

Access policies regarding connections using mobile devices

B.  

Awareness of security vulnerabilities

C.  

Installation of malware software

D.  

Storage of data on fixed devices

Discussion 0
Questions 33

Defining quality content requires understanding the context of its production and use, including:

Options:

A.  

Producers

B.  

Timing

C.  

None of the above

D.  

Delivery

E.  

Consumers

F.  

Format

Discussion 0
Questions 34

Different storage volumes include:

Options:

A.  

Gigabyte

B.  

Petabyte

C.  

Perabyte

D.  

Exabyte

E.  

Tetrabyte

F.  

Terabyte

Discussion 0
Questions 35

Developing complex event processing solutions require:

Options:

A.  

Preparation of historical data and pre-population of a predictive model

B.  

Integration testing for subsequent logging requirements

C.  

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.  

Executing the triggered action in response to the prediction

E.  

All of the above

F.  

None of the above

Discussion 0
Questions 36

Metrics tied to Reference and Master Data Quality include:

Options:

A.  

Addressing all queries

B.  

Data steward coverage

C.  

Implementing data management training

D.  

Data sharing volume and usage

E.  

Data ingestion and consumption

F.  

Service level agreements

Discussion 0
Questions 37

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the reduction in risk:

Options:

A.  

Specific risk management

B.  

General risk management

C.  

Data ethics

D.  

Data security

E.  

Publicity

F.  

Privacy

Discussion 0
Questions 38

Please select the four domains of enterprise architecture:

Options:

A.  

Enterprise software architecture

B.  

Enterprise technology architecture

C.  

Enterprise business architecture

D.  

Enterprise data architecture

E.  

Enterprise hardware architecture

F.  

Enterprise application architecture

Discussion 0
Questions 39

The business glossary application is structured to meet the functional requirements of the three core audiences:

Options:

A.  

Data users

B.  

Application users

C.  

Innovation users

D.  

Business users

E.  

Data stewards

F.  

Technical users

Discussion 0
Questions 40

Within each area of consideration mentioned in question 13, they should address morale adversity as per Ethical Risk Model for Sampling Projects.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Questions 41

Inputs in the Data Integration and Interoperability context diagram include:

Options:

A.  

Data needs & standards

B.  

Data semantics

C.  

Business goals & strategies

D.  

Source data

Discussion 0
Questions 42

Three classic implementation approaches that support Online Analytical Processing include:

Options:

A.  

QOLAP

B.  

ROLAP

C.  

OLAP2

D.  

HOLAP

E.  

MOLAP

F.  

None of the above

Discussion 0
Questions 43

A goal of data governance is to enable an organisation to manage its data as a liability.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 44

Match rules for different scenarios require different workflows, including:

Options:

A.  

Consistency rules

B.  

Duplicate identification match rules

C.  

Match-merge rules

D.  

Match-split rules

E.  

Match-link rules

F.  

All of the above

Discussion 0
Questions 45

Category information is one of the types of data that can be modelled.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 46

The goals of data security practices is to protect information assets in alignment with privacy and confidentiality regulations, contractual agreements and business requirements. These requirements come from:

Options:

A.  

Stakeholders

B.  

Government regulations

C.  

Proprietary business concerns

D.  

Legitimate access needs

E.  

Contractual obligations

F.  

None of the above

Discussion 0
Questions 47

Most document programs have policies related to:

Options:

A.  

Scope and compliance audits

B.  

Proper destruction of records

C.  

Proper construction of records

D.  

Identification and protection of vital records

E.  

Partition tolerance

F.  

All of the above

Discussion 0
Questions 48

Misleading visualisations could be an example where a base level of truthfulness and transparency are not adhered to.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 49

Examples of concepts that can be standardized within the data quality knowledge area include:

Options:

A.  

Standard measurement methodologies

B.  

Data security standards

C.  

Data remediation standards and procedures

D.  

None of the above

E.  

Data quality rules

F.  

Data quality rules

Discussion 0
Questions 50

Inputs in the data storage and operations context diagram include:

Options:

A.  

Data requirements

B.  

Service level agreements

C.  

Data Management Architecture

D.  

Systems Architecture

E.  

Data architecture

F.  

Data models

Discussion 0
Questions 51

For each subject area logical model: Decrease detail by adding attributes and less-significant entities and relationships.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 52

Governance ensures data is managed, but is not include the actual act of managing data.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 53

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 54

Enterprise data architecture description must include both [1] as well as [2]

Options:

A.  

[1] Data Flow Design [2] Data Context Diagram

B.  

[1] Enterprise Data Model [2] Architecture Diagram

C.  

[1] Enterprise Data Model [2] Data Flow Design

D.  

[1] Enterprise Data Model [2] Data Context Diagram

Discussion 0
Questions 55

Orchestration is the term used to describe how multiple processes are organized and executed in a system.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 56

Improving an organization’s ethical behaviour requires an informal Organizational Change Management (OCM) process.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 57

What ISO standard defines characteristics that can be tested by any organisation in the data supply chain to objectively determine conformance of the data to this ISO standard.

Options:

A.  

ISO 9000

B.  

ISO 7000

C.  

ISO 8000

D.  

ISO 9001

Discussion 0
Questions 58

A limitation of the centralized approach include: Maintenance of a decentralized repository is costly.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 59

Metadata is described using different set of categories, including:

Options:

A.  

Descriptive Metadata, Structural Metada, Administrative Metadata

B.  

Diagnostic Metadata, Structural Metada, Administrative Metadata

C.  

Prescriptive Metadata, Serial Metada, Administrative Metadata

D.  

Descriptive Metadata, Serial Metada, Administrative Metadata

E.  

None of the above

Discussion 0
Questions 60

A hacker is a person who finds unknown operations and pathways within complex computer system. Hackers are only bad.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 61

Confirming and documenting understanding of different perspectives facilitate:

Options:

A.  

Formalization

B.  

Normalization

C.  

Scope definition

D.  

Knowledge retention/documentation

Discussion 0
Questions 62

To mitigate risks, implement a network-based audit appliance, which can address most of the weaknesses associated with the native audit tools. This kind of appliance has the following benefits:

Options:

A.  

Granular transaction tracking

B.  

High performance

C.  

Transaction time

D.  

Separation of duties

Discussion 0
Questions 63

What type of key is used in physical and sometimes logical relational data modelling schemes to represent a relationship?

Options:

A.  

Primary key

B.  

Foreign key

C.  

Network key

D.  

Applications key

E.  

Door key

F.  

All of the above

Discussion 0
Questions 64

Malware refers to any infectious software created to damage, change or improperly access a computer or network.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 65

Principles for data asset accounting include:

Options:

A.  

Accounting Principle

B.  

Due Diligence Principle

C.  

Asset Principle

D.  

Audit Principle

E.  

Going Concern Principle

F.  

All of the above

Discussion 0
Questions 66

Disciplines within the enterprise architecture practice does not include:

Options:

A.  

Technology architecture

B.  

Application architecture

C.  

Information architecture

Service Architecture

D.  

Business architecture

Discussion 0
Questions 67

Instant Messaging (IM) allows a user to message each other in real-time.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 68

Control activities to manage metadata stores include:

Options:

A.  

Roadmap extrapolation

B.  

Load statistical analysis

C.  

Lineage

D.  

Missing metadata reports

E.  

Definitions resolutions improvement

F.  

Job scheduling and monitoring

Discussion 0
Questions 69

SOA stands for:

Options:

A.  

Service orchestrated architecture

B.  

Service orientated access

C.  

Service orientated architecture

D.  

Service overall architecture

Discussion 0
Questions 70

Enterprise data architecture project-related activities include:

Options:

A.  

Define maturity assessment

B.  

Define scope

C.  

Design

D.  

Implement

E.  

None of the above

F.  

All of the above

Discussion 0
Questions 71

Organizations conduct capability maturity assessments for a number of reasons, including:

Options:

A.  

Organizational change

B.  

Data management issues

C.  

Regulation

D.  

Data governance

E.  

Data modeling

F.  

New technology

Discussion 0
Questions 72

Data Integration and Interoperability (DII) describes processes related to the movement and consolidation of data within and between data stores, applications and organizations.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0