Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

A.

FALSE

B.

TRUE

Drivers for data governance most often focus on reducing risk or improving processes. Please select the elements that relate to the improvement of processes:

A.

Regulatory compliance

B.

Data quality improvements

C.

Metadata management

D.

Efficiency in development projects

E.

Vendor management

F.

All of the above

There are several reasons to denormalize data. The first is to improve performance by:

A.

Creating smaller copies of fata to reduce costly run-time calculations and/or table scans of large tables.

B.

None of the above

C.

Pre-calculating and sorting costly data calculations to avoid runt-time system resource competition.

D.

Making tables more readable when no foreign key exists

E.

Combining data from multiple other tables in advance to avoid costly run-time joins

F.

All of the above

Sample value metrics for a data governance program include:

A.

Reduction of risk

B.

Improved efficiency in operations

C.

Effectiveness of education

D.

Achievements of goals and objectives

E.

Contributions to business objectives

F.

Effectiveness of communication

If data is a governed resource, like other resources (e.g., human resources, finance, property), how is Data Governance different from other types of Governance?

A.

Oversight of a particular resource

B.

Agreed models for risk management over the particular resource

C.

Oversight of a resource that represents other resources, therefore supporting other resource governance

D.

Ensuring compliance with regulation for the particular resource

E.

Agreed models for decision making and decision rights, defined authority, and escalation paths for the resource

For each subject area logical model: Decrease detail by adding attributes and less-significant entities and relationships.

A.

TRUE

B.

FALSE

A weak point in an organization’s defenses is a:

A.

Anti-virus software

B.

Security model problem

C.

Penetration

D.

Vulnerability

E.

Firewall

One of the percentages to measure success of a records management system implantation is the percentage of the identified corporate records declared as such and put under records control.

A.

FALSE

B.

TRUE

Data Quality rules and standards are a form of data. To be effective, they need to be managed, as data and rules should be:

A.

Managed outside of the repository and only the results of data quality assessments stored as rules metadata

B.

Documented consistently, tied to business impact, backed by data analysis, and accessible to all data consumers

C.

Organized with metrics so the data stewards can review the data and see what rules apply

D.

Focused on rules that can be integrated into application services

E.

Focused on managing relationships that have gone wrong in the past and may go wrong in the future

Examples of data enhancement includes:

A.

All of the above

B.

Audit data

C.

Contextual information

D.

Incorporate Enterprise Technology

E.

Reference vocabularies

F.

Select Notation

Compound authorization groups provide a means to:

A.

Effectively prepare for data security audits

B.

Distract the data security officer

C.

Encrypt sensitive transmissions of data

D.

Precisely configure an individual's access to a system

E.

Obfuscate a user's actual access to a system

Which DMBok knowledge area is most likely responsible for a high percentage of

returned mail?

A.

Data Quality

B.

Reference and Master Data

C.

Data Warchousing and Business Intelligence

D.

Data Integration and Interoperability

E.

Metadata Management

In gathering requirements for DW/BI projects, begin with the data goals and strategies first.

A.

TRUE

B.

FALSE

A successful Data Governance program requires that all enterprise data be certified.

A.

FALSE

B.

TRUE

A Global ID is the MDM solution-assigned and maintained unique identifier attached to reconciled records.

A.

TRUE

B.

FALSE