Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

DMF-1220 Exam Dumps - Data Management Fundamentals

Go to page:
Question # 89

A critical step in data management organization design is identifying the best-fit operating model for the organization.

A.

TRUE

B.

FALSE

Full Access
Question # 90

Vulnerability is defined as:

A.

a patch in a system that allows it to be successfully unpatched and compromised.

B.

being highly data risk rated

C.

a strength in a system that allows external stakeholders to view data records.

D.

a weakness or defect in a system that allows it to be successfully attacked and compromised.

Full Access
Question # 91

Why is it so important to conduct a Data Governance Readiness Assessment?

A.

Because it will show that the Data Governance team is working hard

B.

It will give the Business some metrics

C.

It is important because the organization will have an opportunity for business people to be identified as data stewards

D.

It is important because it will prove that the IT department is best qualified to define, develop, and manage the organization’s data assets

E.

It will identify the readiness and level of maturity that an organization will need to effectively govern and sustain its data, process, and policies

Full Access
Question # 92

To mitigate risks, implement a network-based audit appliance, which can address most of the weaknesses associated with the native audit tools. This kind of appliance has the following benefits:

A.

Granular transaction tracking

B.

High performance

C.

Transaction time

D.

Separation of duties

Full Access
Question # 93

What types of data are considered Technical Data?

A.

Data standards; ETL job details; source-to-target mappings

B.

Valid value constraints; File format schemas; data models; data access rights

C.

Attributes that are only used for status reporting; data quality rules; data usage, database table names

D.

Physical database and column names; ETL job details; recovery and backup rules; data access rights

E.

Physical data models; calculations and algorithms; program and application names

Full Access
Question # 94

Which DMBok knowledge area is most likely responsible for a high percentage of

returned mail?

A.

Data Quality

B.

Reference and Master Data

C.

Data Warchousing and Business Intelligence

D.

Data Integration and Interoperability

E.

Metadata Management

Full Access
Question # 95

The acroymn ACID stands for.

A.

Atomicity, completeness, independence and durability

B.

Actual, created, identifled and deleted

C.

Avallable, completeness, isolation and dangerous

D.

Atomicity, consistency, isolation and durability

E.

Available, corrupt, isolation and durable

Full Access
Question # 96

Sample value metrics for a data governance program include:

A.

Reduction of risk

B.

Improved efficiency in operations

C.

Effectiveness of education

D.

Achievements of goals and objectives

E.

Contributions to business objectives

F.

Effectiveness of communication

Full Access
Go to page: