Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

BI tool types include:

A.

BPM

B.

Operational reporting

C.

Data lake extraction

D.

Diagnostic, self-service analytics

E.

Descriptive, self-service analytics

F.

Reduction of risk

RACI is an acronym that is made up of the following terms.

A.

Control

B.

Responsible

C.

Accountable

D.

Informed

E.

Reliable

F.

Consulted

All data is of equal importance. Data quality management efforts should be spread between all the data in the organization.

A.

TRUE

B.

FALSE

Integrating data security with document and content management knowledge areas.

guides the implementation of:

A.

Appropriate access and authorization to unstructured data

B.

Fitness for purpose metrics for unstructured data

C.

Appropriate privacy controls on data marts

D.

Appropriate access and authorization to structured data

E.

Straight-through processing for NoSQL queries

Please select the incorrect item that does not represent a dimension in the Data Values category in Data Quality for the Information age.

A.

Currency

B.

Timeliness

C.

Consistency

D.

Completeness

Confirming and documenting understanding of different perspectives facilitate:

A.

Formalization

B.

Normalization

C.

Scope definition

D.

Knowledge retention/documentation

Who should write the main content for a security policy for an organisation?

A.

A security knowledge area specialist

B.

A data governance knowledge area specialist

C.

The data warehouse developer

D.

The database administrator

E.

The data steward associated with the data

A business driver for Master Data Management program is managing data quality.

A.

TRUE

B.

FALSE

Please select the correct definition of Data Management from the options below.

A.

Data Management is the strict control of all plans, policies, programs and practices that enable the business strategy to be successfully executed.

B.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data and information assets throughout their lifecycles.

C.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of data assets throughout their lifecycles.

D.

Data Management is the development, execution and supervision of plans, policies, programs and practices that deliver, control, protect and enhance the value of information assets throughout their lifecycles.

A change management program supporting Data Governance should focus communication on what?

A.

Promoting the value of its data assets, monitor and act on feedback about Data Governance activities & implement data management training programs.

B.

Promote the value of its data assets

C.

Show the value of data stewardship & implement data management training program

D.

How many errors are in each of the various department's data

E.

Implement a data management training program and create a data dictionary

The library of Alexandria was one of the largest collection of books in the ancient

world. Which DMBoK knowledge area is most aligned with managing the collection?

A.

Data Integration and Interoperability

B.

Reference and Master Data

C.

Data Security

D.

Document and Content Management

E.

Data Govemance

Please select the answer that does not represent a machine learning algorithm:

A.

Reinforcement learning

B.

Supervised learning

C.

Artificial learning

D.

Unsupervised learning

A complexity in documenting data lineage is:

A.

Establishing data quality metrics

B.

Conflicting application requirements from data owners

C.

Choosing which content management software to use

D.

Identifying source databases

E.

Different data element names and formats

A design approach for managing the risk of errors in data marts is:

A.

Purge the data in the data marts and reload from the data warehouse

B.

Purge the data in the source system and reload the data warehouse

C.

Purge the data in the data warehouse and copy back to the data mart

D.

Purge the data in the data warehouse and reload from the source systems

E.

Purge the data generally and reload from the best system

Device security standard include:

A.

Installation of anti-malware and encryption software

B.

Relational security policies

C.

Access policies regarding connections using mobile devices

D.

Regulation compliance standards

E.

None of the above

F.

Awareness of security vulnerabilities