practice questions Flashcards
When new governmental and industry regulations are formulated and enacted, Data Governance plays a key role in the process of identifying the data and information components for compliance. What do you see as their most important role in any regulatory compliance project?
a) Working with business and technical leadership to find the best answers to a standard set of regulatory compliance questions (How, Why, When, etc)
b) Provide access to any possible data set to the compliance team and allow them to mine the data for non-compliance
c) Take no part in any project at all, declaring it an audit and risk project
d) Create a DG ‘in-house’ project with a team of data stewards to create a standard response
e) Work in isolation and mine the data and information for compliance and non-compliance issues
a) Working with business and technical leadership to find the best answers to a standard set of regulatory compliance questions (How, Why, When, etc)
Which of these does NOT characterize an effective data steward?
a) Is a highly experienced technical expert in a variety of data management disciplines & tools
b) He / She works in association with the Data Owner to protect and enhance the data assets under his or her control
c) He / She is an effective communicator
d) He / she works collaboratively across the organization with data stakeholders and others identifying data problems and issues
e) Is a recognized subject matter expert in the data subject area / business domain that he or she is responsible for
a) Is a highly experienced technical expert in a variety of data management disciplines & tools
Which of these are NOT true of Data Governance?
a) DG is a continuous process of data improvement
b) There are different organization models for DG
c) DG is the exercise of authority and control over the management of data assets
d) IT is a key stakeholder in DG
e) A DG initiative should always be led by the IT department
e) A DG initiative should always be led by the IT department
Who is most responsible for communicating and promoting awareness on the value of Data Governance in the organization?
a) The Data Governance Office
b) The Data Governance Council
c) Data Champions
d) Everyone in the Data Management Community
e) Data Owners and Stewards
d) Everyone in the Data Management Community
Which of these is NOT a standard motivation for Data Governance?
a) Proactive governance
b) Decentralised Governance
c) Devolved governance
d) Reactive governance
e) Pre-emptive governance
c) Devolved governance
When defining your business continuity plan, which of the following should one consider doing?
a) Consider written policies and procedures, impact mitigating measures, required recovery time and acceptable amount of disruption, the criticality of the documents
b) Make sure that the data is retained sufficiently long, check that critical data is encrypted, check access rights
c) Have the contracts in place to acquire new hardware in case of technical problems, define policies
d) Write a report and discuss with management the required budget
e) Determine the risk, probability and impact, check document backup frequency
a) Consider written policies and procedures, impact mitigating measures, required recovery time and acceptable amount of disruption, the criticality of the documents
A goal of ‘Document and Content Management’ is to ensure effective and efficient retrieval and use of:
a) Data, but not information in unstructured formats
b) Data and information in structured formats
c) Data and information in unstructured formats
d) Data and information in relational formats
e) Information, but not data in unstructured formats
c) Data and information in unstructured formats
In 2009, ARMA International published GARP for managing records and information. GARP stands for:
a) Generally Acceptable Recordkeeping Principles
b) Global Accredited Recordkeeping Principles
c) Gregarious Archive of Recordkeeping Processes
d) G20 Approved Recordkeeping Principles
e) Generally Available Recordkeeping Practices
a) Generally Acceptable Recordkeeping Principles
The needs of data protection require us to ensure that:
a) Data is encrypted at all times
b) Data is processed only in ways compatible with the intended and communicated use it was collected for, and respects the consent of the data subject
c) Data can always be freely used in the company as it is a company asset
d) Data is secured with a password
e) Data is frequently backed up so that it can be recovered in all cases
b) Data is processed only in ways compatible with the intended and communicated use it was collected for, and respects the consent of the data subject
Non value-added information is often not removed because:
a) The policies are unclear of what is defined as non-value-added, storage is cheap so there is no cost driver, and it takes more effort to dispose than to keep
b) We might need the information at a later stage
c) Legislation is unclear on what should be kept
d) Data is an asset. It is likely to be recognized as valuable in the future
e) It should not be removed. All data is value-added
a) The policies are unclear of what is defined as non-value-added, storage is cheap so there is no cost driver, and it takes more effort to dispose than to keep
All of the following are TRUE statements on relationship types except:
a) A one-to-one relationship says that a parent entity may have one and only one child entity
b) A one-to-many relationship says that a child entity may have one or more parent entities
c) A many-to-many relationship says that an instance of each entity may be associated with many instances of the other entity, and vice versa
d) A recursive relationship relates instances of an entity to other instances of the same entity
e) A one-to-many relationship says that a parent entity may have one or more child entities
b) A one-to-many relationship says that a child entity may have one or more parent entities
In Dimensional data models, which of these is NOT true regarding Measures?
a) Measures are found in Fact tables
b) Measures should be numeric and additive
c) Just because a value is numerical does not mean it is a measure
d) Care must be taken if a measure is a snapshot figure
e) Measures can always be added across all dimensions
e) Measures can always be added across all dimensions
Complete the following statement. A business rule:
a) Only exists at the level of the physical data model
b) Defines constraints on what can and cannot be done
c) Identifies an entity instance
d) Measures a business process
e) Defines an entity
b) Defines constraints on what can and cannot be done
Identify who has primary responsibility for data capture and usage design within programs.
a) DM Executive, BI Analysts, Data Security Administrator
b) Data Architects, Data Analysts,Database Administrators
c) Business Data Stewards, Subject Matter Experts (SMEs)
d) Software Architects, Developers
e) Suppliers, Consumers
d) Software Architects, Developers
In the conceptual data model an instantiation of a particular business entity is described as:
a) Row
b) Record
c) Dataset
d) Entity occurrence
e) Rule
d) Entity occurrence
Which of these is NOT a typical activity in Data Quality Management?
a) Identifying data problems and issues
b) Analysing data quality
c) Enterprise Data Modelling
d) Defining business requirements and business rules
e) Creating inspection and monitoring processes
c) Enterprise Data Modelling
Which of these is NOT an expected role of a Data Quality Oversight Board?
a) Producing certification & compliance policies
b) Data profiling & analysis
c) Setting data quality improvement priorities
d) Developing & maintaining data quality
e) Establishing communications & feedback mechanisms
b) Data profiling & analysis
What is Manual Directed Data Quality Correction?
a) The automation of all data cleanse and correction routines
b) Teams of data correctors supervised by data subject matter experts
c) The use of spreadsheets to manually inspect and correct data
d) The use of automated cleanse and correction tools with results manually checked before committing outputs
e) Using a data quality improvement manual to guide data cleanse and correction activities
d) The use of automated cleanse and correction tools with results manually checked before committing outputs
Which of the following is the best example of the data quality dimension of ‘consistency’?
a) The source data for the end of month report arrived 1 week late
b) The phone numbers in the customer file do not adhere to the standard format
c) All the records in the CRM have been accounted for in the data warehouse
d) The revenue data in the dataset is always $100 out
e) The customer file has 50% duplicated entries
c) All the records in the CRM have been accounted for in the data warehouse
A Data Quality dimension is:
a) A core concept in dimensional modelling
b) One aspect of data quality used extensively in data governance
c) A measurable feature or characteristic of data
d) The value of a particular piece of data
e) A valid value in a list
c) A measurable feature or characteristic of data
Stakeholders whose concerns must be addressed in data security management include:
a) Media analysts, Internal Risk Management, Suppliers, or Regulators
b) Clients, Patients, Citizens, Suppliers, or Business Partners
c) The Internal Audit and Risk committees of the organisation
d) External Standards organisations, Regulators, or the Media
e) All of these
b) Clients, Patients, Citizens, Suppliers, or Business Partners
Which of these statements best defines Data Security Management?
a) The planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets
b) None of these
c) The definition of controls, technical standards, frameworks, and audit trail capabilities to identify who has or has had access to information
d) The implementation and execution of checkpoints, checklists, controls, and technical mechanisms to govern the access to information in an enterprise
e) The planning, implementation, and testing of security technologies, authentication mechanisms, and other controls to prevent access to information
a) The planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets
Apart from security requirements internal to the organisation, what other strategic goals should a Data Security Management system address?
a) Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality needs of all stakeholders
b) Compliance with ISO29100 and PCI-DSS
c) Ensuring the organisation doesn’t engage in SPAM marketing
d) None of these
e) Compliance with ISO27001 and HIPPA
a) Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality needs of all stakeholders
Which of these are characteristics of an effective data security policy?
a) The defined procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted
b) The procedures defined are benchmarked, supported by technology, framework based, and peer reviewed
c) The defined procedures are tightly defined, with rigid and effective enforcement sanctions, and alignment with technology capabilities
d) The policies are specific, measurable, achievable, realistic, and technology aligned
e) None of these
a) The defined procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted
What is the role of the Data Governance Council in defining an Information Security policy?
a) The Data Governance Council should implement the Data Security Policy
b) The Data Governance Council should draft early versions of the Data Security Policy
c) The Data Governance Council should define the Data Security Policy
d) The Data Governance Council should review and approve the high-level Data Security Policy
e) The Data Governance Council should have no role in Data Security
d) The Data Governance Council should review and approve the high-level Data Security Policy