Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

DMF-1220 Exam Dumps - Data Management Fundamentals

Go to page:
Question # 185

Device security standard include:

A.

Installation of anti-malware and encryption software

B.

Relational security policies

C.

Access policies regarding connections using mobile devices

D.

Regulation compliance standards

E.

None of the above

F.

Awareness of security vulnerabilities

Full Access
Question # 186

Data replication is useful as it provides:

A.

The ability to spread the workload across multiple databases

B.

Opportunities to secure sensitive data

C.

An alternative to backups

D.

Enables different table structures to be built

E.

Insights into customer retention

Full Access
Question # 187

There are three techniques for data-based change data capture, namely:

A.

The source system populates specific data elements.

B.

Application automated interfaces

C.

The source system processes copy data that has changed into a separate object as part of the transaction, which is then used for the extract process.

D.

The source systems send binary code through ASCI that makes the process rapid.

E.

The source system processes add to a simple list of objects and identifiers when changing data, which is then used to control selection of data extraction.

F.

None of the above

Full Access
Question # 188

Looking at the DMBoK definition of Data Governance, and other industry definitions, what are some of the common key elements of Data Governance?

A.

Exercise of authority, formalization of reporting lines, implementation of supporting technology, definition of common glossaries

B.

Alignment of Business and IT strategies, definition of data standards, implementation of Data Governance and metadata software tools

C.

Agreed models for decision making and decision rights, defined authority and escalation paths, structures for assigning accountability and delegating responsibility, alignment with business objectives

D.

Agreed architectures, transparent policies, shared language, effective tools, delegated authority, stewardship

E.

Agreed models for data design and definition, decision rights regarding standards and controls, delegation of accountability

Full Access
Question # 189

The loading of country codes into a CRM is a classic:

A.

Reference data integration

B.

Fact data integration

C.

Master data integration

D.

Analytics data integration

E.

Transaction data integration

Full Access
Question # 190

Technical metadata describes details of the processing and accessing of data.

A.

FALSE

B.

TRUE

Full Access
Question # 191

Companies do not rely on their information systems to run their operations.

A.

TRUE

B.

FALSE

Full Access
Question # 192

Data profiling examples include:

A.

Counts of null

B.

Max/Min value

C.

Max/Min length

D.

Frequency distribution

E.

Data type and format

F.

None of the above

Full Access
Go to page: