<< Prev Question Next Question >>

Question 125/126

Accomplish repository scanning in two distinct approaches, including:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (126q)
Question 1: Architects seek to design in a way that brings value to an o...
Question 2: Enterprise data architecture description must include both [...
Question 3: The most important reason to implement operational data qual...
1 commentQuestion 4: Select the areas to consider when constructing an organizati...
Question 5: Within projects, conceptual data modelling and logical data ...
Question 6: A control activity in the metadata management environment in...
Question 7: For each subject area logical model: Decrease detail by addi...
1 commentQuestion 8: It is unwise to implement data quality checks to ensure that...
Question 9: Real-time data integration is usually triggered by batch pro...
Question 10: Data architect: A senior analyst responsible for data archit...
Question 11: Activities that drive the goals in the context diagram are c...
Question 12: There are numerous methods of implementing databases on the ...
Question 13: Factors that have shown to play a key role in the success in...
Question 14: Business activity information is one of the types of data th...
Question 15: Inputs in the reference and master data context diagram incl...
Question 16: The best DW/BI architects will design a mechanism to connect...
Question 17: Key processing steps for MDM include:...
Question 18: There are several methods for masking data:...
Question 19: Instant Messaging (IM) allows a user to message each other i...
Question 20: Data replication can be active or passive....
Question 21: Field overloading: Unnecessary data duplication is often a r...
Question 22: Principles for data asset accounting include:...
Question 23: In matching, false positives are three references that do no...
Question 24: Please select the 3 visuals that depict DAMA's Data Manageme...
Question 25: Those responsible for the data-sharing environment have an o...
Question 26: A critical step in data management organization design is id...
Question 27: Examples of the 'Who' entity category include: employee; pat...
Question 28: Companies do not rely on their information systems to run th...
Question 29: Access to data for Multidimensional databases use a variant ...
Question 30: Some ways to measure value of data include:...
Question 31: There are three techniques for data-based change data captur...
Question 32: Examples of concepts that can be standardized within the dat...
Question 33: The database administrator (DBA) is the most established and...
Question 34: Data profiling also includes cross-column analysis, which ca...
Question 35: Examples of transformation in the ETL process onclude:...
Question 36: Data management organizational constructs include the follow...
Question 37: Product Master data can only focus on an organization's inte...
Question 38: Subtype absorption: The subtype entity attributes are includ...
Question 39: SLA Stands for:
Question 40: Examples of technical metadata include:...
Question 41: Archiving is the process of moving data off immediately acce...
Question 42: Control activities to manage metadata stores include:...
Question 43: ETL is the basic process which is central to all areas in Da...
Question 44: Data governance can be understood in terms of political gove...
Question 45: The business glossary should capture business terms attribut...
2 commentQuestion 46: What are the primary drivers of data security activities?...
Question 47: Operational Metadata describes details of the processing and...
Question 48: Content needs to be modular, structured, reusable and device...
Question 49: Disciplines within the enterprise architecture practice does...
Question 50: When constructing models and diagrams during formalisation o...
Question 51: All organizations have the same Master Data Management Drive...
Question 52: Effective data management involves a set of complex, interre...
Question 53: Different types of product Master Data solutions include:...
Question 54: Barriers to effective management of data quality include:...
Question 55: Common OLAP operations include:...
Question 56: Business rules describe why business should operate internal...
Question 57: A hacker is a person who finds unknown operations and pathwa...
Question 58: Metadata management solutions include architectural layers i...
Question 59: ISO 8000 will describe the structure and organization of dat...
Question 60: The first two steps in the data science process are:...
Question 61: A sandbox is an alternate environment that allows write-only...
Question 62: A general principle for managing metadata includes Responsib...
Question 63: A goal of a Reference and Master Data Management program inc...
Question 64: Customer relationship management systems manage Master Data ...
Question 65: Project that use personal data should have a disciplined app...
Question 66: The categories of the Data Model Scorecard with the highest ...
Question 67: Test environments serve many uses:...
Question 68: Match rules for different scenarios require different workfl...
Question 69: Please select the answer that best fits the following descri...
Question 70: Advantages if a centralized metadata repository include:...
Question 71: Select three correct attributes a data governance programme ...
Question 72: Most document programs have policies related to:...
Question 73: Governance ensures data is managed, but is not include the a...
Question 74: Decentralized informality can be made more formal through a ...
Question 75: An advantage of a centralized repository include: Quick meta...
Question 76: Metadata is described using three sets od categories, includ...
Question 77: All metadata management solutions include architectural laye...
Question 78: Please select the option that correctly orders the models in...
Question 79: DBAs exclusively perform all the activities of data storage ...
Question 80: Data parsing is the process of analysing data using pre-dete...
Question 81: There are several reasons to denormalize dat a. The first is...
Question 82: Data management professionals who understand formal change m...
Question 83: The acronym CMDB stands for:
Question 84: Part of alignment includes developing organizational touchpo...
Question 85: Within the Data Handling Ethics Context Diagram a key delive...
Question 86: Examples of concepts that can be standardized within the dat...
Question 87: The Belmont principles that may be adapted for Information M...
Question 88: MPP is an abbreviation for Major Parallel Processing....
Question 89: Data modelling tools and model repositories are necessary fo...
Question 90: Layers of data governance are often part of the solution. Th...
Question 91: Data security includes the planning, development and executi...
Question 92: Business Intelligence tool types include:...
Question 93: A communication plan includes an engagement model for stakeh...
Question 94: Data governance requires control mechanisms and procedures f...
Question 95: Issue management is the process for identifying, quantifying...
Question 96: In a SQL injection attack, a perpetrator inserts authorized ...
Question 97: Effectiveness metrics for a data governance programme includ...
Question 98: The IT security policy provides categories for individual ap...
Question 99: The implementation of a Data Warehouse should follow these g...
Question 100: In the context of big data the Three V's refer to: Volume, V...
Question 101: Examples of business processes when constructing data flow d...
Question 102: Confirming and documenting understanding of different perspe...
Question 103: Data modeller: responsible for fata model version control an...
Question 104: Enterprise Architecture domains include:...
Question 105: One of the deliverables in the Data Integration and Interope...
Question 106: The dependencies of enterprise technology architecture are t...
Question 107: An effective team is based on two simple foundations: trust ...
Question 108: Several global regulations have significant implications on ...
Question 109: Enterprise data architecture usually include the following w...
Question 110: A e-discovery readiness assessment should examine and identi...
Question 111: DAMA International's Certified Data Management Professional ...
Question 112: Data security issues, breaches and unwarranted restrictions ...
Question 113: Location Master Data includes business party addresses and b...
Question 114: The four main types of NoSQL databases are:...
Question 115: The first two steps of the Reference data Change request pro...
Question 116: Developing complex event processing solutions require:...
Question 117: Structural Metadata describe srealtionships within and among...
Question 118: Data governance requires control mechanisms and procedures f...
Question 119: The Data Warehouse has a set of storage areas, including:...
Question 120: Data flows map and document relationships between data and l...
Question 121: Small reference data value sets in the logical data model ca...
Question 122: The DW encompasses all components in the data staging and da...
Question 123: Data Integrity includes ideas associated with completeness, ...
Question 124: A deliverable in the data modelling and design context diagr...
Question 125: Accomplish repository scanning in two distinct approaches, i...
Question 126: The biggest business driver for developing organizational ca...