Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! DMF-1220 Data Management Fundamentals is now Stable and With Pass Result

DMF-1220 Practice Exam Questions and Answers

Data Management Fundamentals

Last Update 5 days ago
Total Questions : 486

DMF-1220 is stable now with all latest exam questions are added 5 days ago. Just download our Full package and start your journey with DAMA Data Management Fundamentals certification. All these DAMA DMF-1220 practice exam questions are real and verified by our Experts in the related industry fields.

DMF-1220 PDF

DMF-1220 PDF (Printable)
$48
$119.99

DMF-1220 Testing Engine

DMF-1220 PDF (Printable)
$56
$139.99

DMF-1220 PDF + Testing Engine

DMF-1220 PDF (Printable)
$70.8
$176.99
Question # 1

Data science involves the iterative inclusion of data sources into models that develop insights. Dat science depends on:

Options:

A.  

Consistency

B.  

Rich data sources

C.  

Information alignment and analysis

D.  

Information delivery

E.  

Presentation of findings and data insights

F.  

All of the above

Discussion 0
Question # 2

Data management professionals who understand formal change management will be more successful in bringing about changes that will help their organizations get more value from their data. To do so, it is important to understand:

Options:

A.  

The triggers for effective change

B.  

Data architecture

C.  

How people experience changes

D.  

Data security

E.  

The barriers to change

F.  

Why change fails

Discussion 0
Question # 3

Controlling data availability requires management of user entitlements and of structures that technically control access based on entitlements.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 4

What type of key is used in physical and sometimes logical relational data modelling schemes to represent a relationship?

Options:

A.  

Primary key

B.  

Foreign key

C.  

Network key

D.  

Applications key

E.  

Door key

F.  

All of the above

Discussion 0
Question # 5

Inputs in the data modelling and design context diagram include:

Options:

A.  

Data standards

B.  

Data sets

C.  

Data Management Architecture

D.  

Systems Architecture

E.  

Data architecture

F.  

Enterprise taxonomy

Discussion 0
Question # 6

Reference and Master Data Management follow these guiding principles:

Options:

A.  

Quality

B.  

Stewardship

C.  

Authority

D.  

Ownership

E.  

Exclusivity

F.  

Inclusivity

Discussion 0
Question # 7

Functionality-focused requirements associated with a comprehensive metadata solution, include:

Options:

A.  

Synchronization

B.  

Structure

C.  

None of the above

D.  

History

E.  

Volatility

F.  

Access rights

Discussion 0
Question # 8

A metadata repository is essential to assure the integrity and consistent use of an enterprise data model across business processes.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 9

DAMA International’s Certified Data Management Professional (CDMP) certification required that data management professionals subscribe to a formal code of ethics, including an obligation to handle data ethically for the sake of society beyond the organization that employs them.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 10

Integration of ETL data flows will usually be developed within tools specialised to manage those flows in a proprietary way.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 11

Malware refers to any infectious software created to damage, change or improperly access a computer or network.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 12

Data quality management is a key capability of a data management practice and organization.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 13

Inputs in the reference and master data context diagram include:

Options:

A.  

None of the above

B.  

Business Drivers

C.  

Business model

D.  

Data Glossary

E.  

Cultural Drivers

F.  

All of the above

Discussion 0
Question # 14

Most document programs have policies related to:

Options:

A.  

Scope and compliance audits

B.  

Proper destruction of records

C.  

Proper construction of records

D.  

Identification and protection of vital records

E.  

Partition tolerance

F.  

All of the above

Discussion 0
Question # 15

Value is the difference between the cost of a thing and the benefit derived from that thing.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 16

In the Data Warehousing and Business Intelligence Context Diagram, a primary deliverable is the DW and BI Architecture.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 17

SOR Stands for:

Options:

A.  

Service of Record

B.  

System of Record

C.  

System on Record

D.  

Service over Record

Discussion 0
Question # 18

A goal of data architecture is to identify data storage and processing requirements.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 19

Analytics models are associated with different depths of analysis, including:

Options:

A.  

Quality testing

B.  

Explanatory modeling

C.  

Descriptive modeling

D.  

Performance modeling

E.  

All of the above

F.  

None of the above

Discussion 0
Question # 20

A business driver for Master Data Management program is managing data quality.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 21

The target of organizational change is expedition.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 22

A limitation of the centralized metadata repository approach is it may be less expensive.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 23

Select three correct attributes a data governance programme must be:

Options:

A.  

Embedded

B.  

Flexible

C.  

Measures

D.  

Rigid

E.  

Independent responsibility

F.  

Sustainable

Discussion 0
Question # 24

Please select the correct name for the PDM abbreviation when referring to modelling.

Options:

A.  

Physical Dimension Model

B.  

Photo Data Model

C.  

None of the above

D.  

Probabilistic Dimension Model

E.  

Photo Dimensional Model

F.  

Physical Data Model

Discussion 0
Question # 25

Access to data for Multidimensional databases use a variant of SQL called MDX or Multidimensional expression.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 26

Deliverables in the data quality context diagram include:

Options:

A.  

DQM Procedures

B.  

Data architecture

C.  

Data governance

D.  

DQ Policies and guidelines

E.  

Analyses from data profiling

F.  

Data quality Service Level Agreements

Discussion 0
Question # 27

The goals of Data Integration and Interoperability include:

Options:

A.  

Provide data securely, with regulatory compliance, in the format and timeframe needed.

B.  

Lower cost and complexity of managing solutions by developing shared models and interfaces.

C.  

Managing the availability of data throughout the data lifecycle

D.  

Provide the starting point for customizations, integration or even replacement of an application

E.  

Identify meaningful events and automatically trigger alerts and actions.

F.  

Support business intelligence, analytics, master data management and operational efficiency efforts.

Discussion 0
Question # 28

Technical Metadata provides data about the technical data, the systems that store data, and the processes that move between systems.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 29

Changes to reference data do not need to be management, only metadata should be managed.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 30

SOA is an abbreviation for service orientated architecture.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 31

The DMBOK support’s DAMA’s mission by:

Options:

A.  

Establish a common vocabulary

B.  

Guides IT personnel to improve data management

C.  

Serving as the fundamental reference guide

D.  

roviding a functional framework

Discussion 0
Question # 32

The four main types of NoSQL databases are:

Options:

A.  

Document

B.  

Row-orientated

C.  

Graph

D.  

Strategic

E.  

Key-value

F.  

Column-orientated

Discussion 0
Question # 33

Field overloading: Unnecessary data duplication is often a result of poor data management.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 34

Examples of the ‘Who’ entity category include: employee; patient; player; and suspect.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 35

The biggest business driver for developing organizational capabilities around Big Data and Data Science is the desire to find and act on business opportunities that may be discovered through data sets generated through a diversified range of processes.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 36

Enterprise data architecture influences the scope boundaries of project and system releases. An example of influence is data replication control.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 37

Security Risks include elements that can compromise a network and/or database.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 38

Enterprise data architecture usually include the following work streams:

Options:

A.  

Strategy

B.  

Governance

C.  

Organization

D.  

Results

E.  

Working methods

F.  

All of the above

Discussion 0
Question # 39

Please select the correct general cost and benefit categories that can be applied consistently within an organization.

Options:

A.  

Cost of erasing data from servers

B.  

Cost of improving data

C.  

What the data could be sold for

D.  

Benefit of higher quality data

E.  

Cost of replacing data if it were lost

F.  

What competitors would pay for data

Discussion 0
Question # 40

Business glossaries have the following objectives:

Options:

A.  

Improve the alignment between technology assets and the business organization

B.  

All of the above

C.  

Cultural factors that might improve the concepts and terminology

D.  

Maximise search capability and enable access to documented institutional knowledge

E.  

Enable common understanding of the core business concepts and terminology

F.  

Reduce the risk that data will be misused due to inconsistent understanding of the business concepts.

Discussion 0
Question # 41

A hacker is a person who finds unknown operations and pathways within complex computer system. Hackers are only bad.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 42

The data-vault is an object-orientated, time-based and uniquely linked set of normalized tables that support one or more functional areas of business.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 43

Confirming and documenting understanding of different perspectives facilitate:

Options:

A.  

Formalization

B.  

Normalization

C.  

Scope definition

D.  

Knowledge retention/documentation

Discussion 0
Question # 44

SOA stand for Service Orchestrated Architecture

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 45

On example of a transformation process in ETL is:

Options:

A.  

Re-ordering

B.  

Recording

C.  

Duping

D.  

Servicing

Discussion 0
Question # 46

The CAP theorem asserts that the distributed system cannot comply with all the parts of the ACI

D.  

A distributed system must instead trade-off between the following properties:

Options:

A.  

Consistency

B.  

Utilization

C.  

Availability

D.  

System development

E.  

Partition tolerance

F.  

All of the above

Discussion 0
Question # 47

Real-time data integration is usually triggered by batch processing, such as historic data.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 48

The first two steps in the data science process are:

Options:

A.  

Define Big Data data strategy & Business Need(s)

B.  

Choose Data Sources

C.  

Develop Data Science Hypotheses and Mehods

D.  

Acquire & Ingest Data source(s)

Discussion 0
Question # 49

Accomplish repository scanning in two distinct approaches, including:

Options:

A.  

Semi- proprietary integration

B.  

Proprietary interface

C.  

Semi-proprietary interface

D.  

Proprietary integration

Discussion 0
Question # 50

Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 51

The load step of the ETL is physically storing or presenting the results of the transformation into the source system.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 52

A content strategy should end with an inventory of current state and a gap assessment.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 53

Master data management includes several basic steps, which include: Develop rules for accurately matching and merging entity instances.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 54

Metadata is described using three sets od categories, including:

Options:

A.  

Structural Metadata

B.  

Descriptive Metadata

C.  

Generic Metadata

D.  

Administrative metadata

E.  

Conceptual Metadata

Discussion 0
Question # 55

A Data Management Maturity Assessment (DMMA) can be used to evaluate data management overall, or it can be used to focus on a single Knowledge Area or even a single process.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 56

CMA is an abbreviation for Capability Maturity Assessment.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 57

Self-service is a fundamental delivery channel in the BI portfolio.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 58

The data in Data warehouses and marts differ. Data is organized by subject rather than function

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 59

Corrective actions are implemented after a problem has occurred and been detected.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 60

An advantage of a centralized repository include: High availability since it is independent of the source systems.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 61

Developing complex event processing solutions require:

Options:

A.  

Preparation of historical data and pre-population of a predictive model

B.  

Integration testing for subsequent logging requirements

C.  

Processing of real-time data stream to fully populate a predictive model and identify meaningful events

D.  

Executing the triggered action in response to the prediction

E.  

All of the above

F.  

None of the above

Discussion 0
Question # 62

Data and enterprise architecture deal with complexity from two viewpoints:

Options:

A.  

None of the above

B.  

Implementation-orientated

C.  

Quality-orientated

D.  

Architecture-orientated

E.  

Innovation-orientated

F.  

Industry-orientated

Discussion 0
Question # 63

DMMA ratings represent a snapshot of the organization’s capability level.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 64

Please select the four domains of enterprise architecture:

Options:

A.  

Enterprise software architecture

B.  

Enterprise technology architecture

C.  

Enterprise business architecture

D.  

Enterprise data architecture

E.  

Enterprise hardware architecture

F.  

Enterprise application architecture

Discussion 0
Question # 65

Data integrity is the state of being partitioned – protected from being whole.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 66

A node is a group of computers hosting either processing or data as part of a distributed database.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 67

Structural Metadata describe srealtionships within and among resource and enables identification and retrieval.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 68

Typically, DW/BI projects have three concurrent development tracks, including:

Options:

A.  

Technology

B.  

Trickle Feeds

C.  

Data

D.  

BI Tools

E.  

Messaging

F.  

Streaming

Discussion 0
Question # 69

Data profiling also includes cross-column analysis, which can identify overlapping or duplicate columns and expose embedded value dependencies.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 70

A System of Reference is an authoritative system where data consumers can obtain reliable data to support transactions and analysis, even if the information did not originate in the system reference.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 71

The Belmont principles that may be adapted for Information Management disciplines, include:

Options:

A.  

Respect for Persons

B.  

Respect for Machines

C.  

Beneficence

D.  

Criminality

E.  

Justice

Discussion 0
Question # 72

Data Management Professionals only work with the technical aspects related to data.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Get DMF-1220 dumps and pass your exam in 24 hours!

Free Exams Sample Questions