practice questions Flashcards

1
Q

When new governmental and industry regulations are formulated and enacted, Data Governance plays a key role in the process of identifying the data and information components for compliance. What do you see as their most important role in any regulatory compliance project?

a) Working with business and technical leadership to find the best answers to a standard set of regulatory compliance questions (How, Why, When, etc)
b) Provide access to any possible data set to the compliance team and allow them to mine the data for non-compliance
c) Take no part in any project at all, declaring it an audit and risk project
d) Create a DG ‘in-house’ project with a team of data stewards to create a standard response
e) Work in isolation and mine the data and information for compliance and non-compliance issues

A

a) Working with business and technical leadership to find the best answers to a standard set of regulatory compliance questions (How, Why, When, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these does NOT characterize an effective data steward?

a) Is a highly experienced technical expert in a variety of data management disciplines & tools
b) He / She works in association with the Data Owner to protect and enhance the data assets under his or her control
c) He / She is an effective communicator
d) He / she works collaboratively across the organization with data stakeholders and others identifying data problems and issues
e) Is a recognized subject matter expert in the data subject area / business domain that he or she is responsible for

A

a) Is a highly experienced technical expert in a variety of data management disciplines & tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these are NOT true of Data Governance?

a) DG is a continuous process of data improvement
b) There are different organization models for DG
c) DG is the exercise of authority and control over the management of data assets
d) IT is a key stakeholder in DG
e) A DG initiative should always be led by the IT department

A

e) A DG initiative should always be led by the IT department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is most responsible for communicating and promoting awareness on the value of Data Governance in the organization?

a) The Data Governance Office
b) The Data Governance Council
c) Data Champions
d) Everyone in the Data Management Community
e) Data Owners and Stewards

A

d) Everyone in the Data Management Community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is NOT a standard motivation for Data Governance?

a) Proactive governance
b) Decentralised Governance
c) Devolved governance
d) Reactive governance
e) Pre-emptive governance

A

c) Devolved governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When defining your business continuity plan, which of the following should one consider doing?

a) Consider written policies and procedures, impact mitigating measures, required recovery time and acceptable amount of disruption, the criticality of the documents
b) Make sure that the data is retained sufficiently long, check that critical data is encrypted, check access rights
c) Have the contracts in place to acquire new hardware in case of technical problems, define policies
d) Write a report and discuss with management the required budget
e) Determine the risk, probability and impact, check document backup frequency

A

a) Consider written policies and procedures, impact mitigating measures, required recovery time and acceptable amount of disruption, the criticality of the documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A goal of ‘Document and Content Management’ is to ensure effective and efficient retrieval and use of:

a) Data, but not information in unstructured formats
b) Data and information in structured formats
c) Data and information in unstructured formats
d) Data and information in relational formats
e) Information, but not data in unstructured formats

A

c) Data and information in unstructured formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In 2009, ARMA International published GARP for managing records and information. GARP stands for:

a) Generally Acceptable Recordkeeping Principles
b) Global Accredited Recordkeeping Principles
c) Gregarious Archive of Recordkeeping Processes
d) G20 Approved Recordkeeping Principles
e) Generally Available Recordkeeping Practices

A

a) Generally Acceptable Recordkeeping Principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The needs of data protection require us to ensure that:

a) Data is encrypted at all times
b) Data is processed only in ways compatible with the intended and communicated use it was collected for, and respects the consent of the data subject
c) Data can always be freely used in the company as it is a company asset
d) Data is secured with a password
e) Data is frequently backed up so that it can be recovered in all cases

A

b) Data is processed only in ways compatible with the intended and communicated use it was collected for, and respects the consent of the data subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non value-added information is often not removed because:

a) The policies are unclear of what is defined as non-value-added, storage is cheap so there is no cost driver, and it takes more effort to dispose than to keep
b) We might need the information at a later stage
c) Legislation is unclear on what should be kept
d) Data is an asset. It is likely to be recognized as valuable in the future
e) It should not be removed. All data is value-added

A

a) The policies are unclear of what is defined as non-value-added, storage is cheap so there is no cost driver, and it takes more effort to dispose than to keep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All of the following are TRUE statements on relationship types except:

a) A one-to-one relationship says that a parent entity may have one and only one child entity
b) A one-to-many relationship says that a child entity may have one or more parent entities
c) A many-to-many relationship says that an instance of each entity may be associated with many instances of the other entity, and vice versa
d) A recursive relationship relates instances of an entity to other instances of the same entity
e) A one-to-many relationship says that a parent entity may have one or more child entities

A

b) A one-to-many relationship says that a child entity may have one or more parent entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Dimensional data models, which of these is NOT true regarding Measures?

a) Measures are found in Fact tables
b) Measures should be numeric and additive
c) Just because a value is numerical does not mean it is a measure
d) Care must be taken if a measure is a snapshot figure
e) Measures can always be added across all dimensions

A

e) Measures can always be added across all dimensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Complete the following statement. A business rule:

a) Only exists at the level of the physical data model
b) Defines constraints on what can and cannot be done
c) Identifies an entity instance
d) Measures a business process
e) Defines an entity

A

b) Defines constraints on what can and cannot be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify who has primary responsibility for data capture and usage design within programs.

a) DM Executive, BI Analysts, Data Security Administrator
b) Data Architects, Data Analysts,Database Administrators
c) Business Data Stewards, Subject Matter Experts (SMEs)
d) Software Architects, Developers
e) Suppliers, Consumers

A

d) Software Architects, Developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the conceptual data model an instantiation of a particular business entity is described as:

a) Row
b) Record
c) Dataset
d) Entity occurrence
e) Rule

A

d) Entity occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these is NOT a typical activity in Data Quality Management?

a) Identifying data problems and issues
b) Analysing data quality
c) Enterprise Data Modelling
d) Defining business requirements and business rules
e) Creating inspection and monitoring processes

A

c) Enterprise Data Modelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of these is NOT an expected role of a Data Quality Oversight Board?

a) Producing certification & compliance policies
b) Data profiling & analysis
c) Setting data quality improvement priorities
d) Developing & maintaining data quality
e) Establishing communications & feedback mechanisms

A

b) Data profiling & analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Manual Directed Data Quality Correction?

a) The automation of all data cleanse and correction routines
b) Teams of data correctors supervised by data subject matter experts
c) The use of spreadsheets to manually inspect and correct data
d) The use of automated cleanse and correction tools with results manually checked before committing outputs
e) Using a data quality improvement manual to guide data cleanse and correction activities

A

d) The use of automated cleanse and correction tools with results manually checked before committing outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is the best example of the data quality dimension of ‘consistency’?

a) The source data for the end of month report arrived 1 week late
b) The phone numbers in the customer file do not adhere to the standard format
c) All the records in the CRM have been accounted for in the data warehouse
d) The revenue data in the dataset is always $100 out
e) The customer file has 50% duplicated entries

A

c) All the records in the CRM have been accounted for in the data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Data Quality dimension is:

a) A core concept in dimensional modelling
b) One aspect of data quality used extensively in data governance
c) A measurable feature or characteristic of data
d) The value of a particular piece of data
e) A valid value in a list

A

c) A measurable feature or characteristic of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Stakeholders whose concerns must be addressed in data security management include:

a) Media analysts, Internal Risk Management, Suppliers, or Regulators
b) Clients, Patients, Citizens, Suppliers, or Business Partners
c) The Internal Audit and Risk committees of the organisation
d) External Standards organisations, Regulators, or the Media
e) All of these

A

b) Clients, Patients, Citizens, Suppliers, or Business Partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of these statements best defines Data Security Management?

a) The planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets
b) None of these
c) The definition of controls, technical standards, frameworks, and audit trail capabilities to identify who has or has had access to information
d) The implementation and execution of checkpoints, checklists, controls, and technical mechanisms to govern the access to information in an enterprise
e) The planning, implementation, and testing of security technologies, authentication mechanisms, and other controls to prevent access to information

A

a) The planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Apart from security requirements internal to the organisation, what other strategic goals should a Data Security Management system address?

a) Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality needs of all stakeholders
b) Compliance with ISO29100 and PCI-DSS
c) Ensuring the organisation doesn’t engage in SPAM marketing
d) None of these
e) Compliance with ISO27001 and HIPPA

A

a) Regulatory requirements for privacy and confidentiality AND Privacy and Confidentiality needs of all stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of these are characteristics of an effective data security policy?

a) The defined procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted
b) The procedures defined are benchmarked, supported by technology, framework based, and peer reviewed
c) The defined procedures are tightly defined, with rigid and effective enforcement sanctions, and alignment with technology capabilities
d) The policies are specific, measurable, achievable, realistic, and technology aligned
e) None of these

A

a) The defined procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the role of the Data Governance Council in defining an Information Security policy?

a) The Data Governance Council should implement the Data Security Policy
b) The Data Governance Council should draft early versions of the Data Security Policy
c) The Data Governance Council should define the Data Security Policy
d) The Data Governance Council should review and approve the high-level Data Security Policy
e) The Data Governance Council should have no role in Data Security

A

d) The Data Governance Council should review and approve the high-level Data Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You need to discover possible relationships or to show data patterns in an exploratory fashion when you do not necessarily have a specific question to ask. What kind of data tool would you use to identify patterns of data using various algorithms?

a) Data Visualisation Application
b) Meta-Data Data Lineage View
c) Data Quality Profiler
d) ETL Jobs
e) Data Mining

A

e) Data Mining

27
Q

One of the difficulties when integrating multiple source systems is:

a) Determining valid links or equivalences between data elements
b) Modifying the source systems to align to the enterprise data model
c) Having a data quality rule applicable to all source systems
d) Maintaining documentation describing the data warehouse operation
e) Completing the data architecture on time for the first release

A

a) Determining valid links or equivalences between data elements

28
Q

When performing an evaluation of analytic applications, which of the following questions is least relevant to identify the level of effort needed?

a) How much of the tool infrastructure meets our organisational infrastructure
b) How much do the canned processes in the tool match our business
c) Number of source systems we need to integrate into the tool
d) Annual costs such as license, maintenance, etc.
e) The Standard source systems for which ETL is supplied

A

d) Annual costs such as license, maintenance, etc.

29
Q

Critical to the incremental development of the data warehouse is:

a) The assurance to include velocity, variety and veracity measurement
b) A strong release management process
c) A strong capacity management process
d) A strong incident management process
e) An agile development team

A

b) A strong release management process

30
Q

In its broadest context, the data warehouse includes:

a) All the data in the enterprise
b) Any data stores or extracts used to support the delivery for BI purposes
c) Either an Inmon or Kimball approach
d) Data stores and extracts that can be transformed into star schemas
e) An integrated data store, ETL logic, and extensive data cleansing routines

A

b) Any data stores or extracts used to support the delivery for BI purposes

31
Q

Which of these is a valid definition of Master Data?

a) Data that other data sits hierarchically beneath
b) Data about the business entities that provide context for business transactions
c) Data that rarely, if ever, changes
d) Data that is only held in one data source
e) Data that if missing or incorrect will cause transactions and processes to fail

A

b) Data about the business entities that provide context for business transactions

32
Q

Master Data Management:

a) Is synonymous with Reference Data Management
b) Is time-consuming with questionable impact on data quality
c) Controls the definition of business entities
d) Allows applications to define business entities as needed and manages the mappings between common data in a central location
e) Ensures coded values are always used

A

c) Controls the definition of business entities

33
Q

Reference data:

a) Is always supplied by outside vendors
b) When incorrect has a greater impact than errors in Master and Transaction data
c) Has obvious definitions
d) Has limited value
e) Is used to categorize and classify other data

A

e) Is used to categorize and classify other data

34
Q

Which of the following is NOT a primary Master Data Management area of focus?

a) Identifying duplicate records
b) Producing clear data definitions for Master Data
c) Providing access to golden data records
d) Producing read only versions of key data items
e) Generating a golden record/best version of the truth

A

d) Producing read only versions of key data items

35
Q

Which of the following statements regarding a value domain is FALSE?

a) A value domain is a set of allowed values for a given code set
b) More than one set of reference data value domains may refer to the same conceptual domain
c) Conforming value domains across the organization facilitates data quality
d) A value domain provides a set of permissible values by which a data element can be implemented
e) Value domains are defined by external standard organizations

A

e) Value domains are defined by external standard organizations

36
Q

To which of the following initiatives was the establishment of an industry Meta-Data Standard essential?

a) Internet Protocols
b) BASEL II/ SOX
c) Proprietary XML
d) JSON
e) EDI

A

e) EDI

37
Q

A business perspective product in the MetaData repository is:

a) Data Dictionary
b) Systems Inventory
c) Data Glossary
d) ETL flow
e) Physical Data Model

A

c) Data Glossary

38
Q

What would you not expect to find in the MetaData repository?

a) Data Requirements
b) Data Dictionary
c) Data Models
d) Data Lineage diagrams and models
e) Data storage devices

A

e) Data storage devices

39
Q

What type of Meta-Data provides developers and administrators with knowledge and information about systems?

a) Business Meta-Data
b) Data Stewardship Meta-Data
c) Process Meta-Data
d) Unstructured Meta-Data
e) Technical Operational Meta-Data

A

e) Technical Operational Meta-Data

40
Q

We would expect to consult the Metadata Library when:

a) Selecting a Data Storage device
b) Formulating a Goverance policy
c) Assessing the impact of change
d) Accessing the internet
e) Implementing a Data Quality tool

A

c) Assessing the impact of change

41
Q

In the Information Management Lifecycle, the Data Governance Activity ‘Define the Data Governance Framework’ is considered in which Lifecycle stage?

a) Maintain and Use
b) Specify
c) Plan
d) Create and Acquire
e) Enable

A

c) Plan

42
Q

According to the DAMA DMBoK, the Data Governance Council (DGC) is the highest authority organization for data governance in an organization. Who should typically chair this Council?

a) The chair should rotate across the Data Owners
b) The Chief Information Officer (CIO)
c) Any Executive / C-level participant in the DGC
d) The Chief Data Architect
e) Chief Data Steward (Business) / Chief Data Officer

A

e) Chief Data Steward (Business) / Chief Data Officer

43
Q

A document management system is an application used to track and store electronic documents and electronic images of paper documents which provides the following capabilities:

a) Local disk storage and indexing of documents
b) Storage, versioning, security, meta-data management, indexing and retrieval
c) Securing forwarding of documents to colleagues, never having to dispose of documents
d) Wiki, collaboration, online editing
e) Scanning and transcoding of documents

A

b) Storage, versioning, security, meta-data management, indexing and retrieval

44
Q

Which of the following are primary deliverables of proper document and record management?

a) Managed records in many media formats, e-discovery records, policies and procedures, contracts and financial documents
b) Data from tracking devices, building sensor data
c) Relational databases, database logs, paper documents
d) Spreadsheets, company library books, sales transactions
e) Local drives of laptops, transcripts of phone calls

A

a) Managed records in many media formats, e-discovery records, policies and procedures, contracts and financial documents

45
Q

What is the difference between cardinality rules and data integrity rules?

a) Cardinality rules define the quantity of each entity instance that can participate in a relationship between two entities, and referential integrity rules ensure valid values
b) There is no difference. Cardinality rules and Referential integrity rules are synonyms
c) Referential integrity rules only appear on a relational data model, and cardinality rules only appear on a dimensional data model
d) Referential integrity rules define the quantity of each entity instance that can participate in a relationship between two entities, and cardinality rules ensure valid values
e) Referential integrity rules quantify the relationships between two or more entities, and cardinality rules quantify the common attributes across entities

A

a) Cardinality rules define the quantity of each entity instance that can participate in a relationship between two entities, and referential integrity rules ensure valid values

46
Q

What are relationship labels?

a) The verb phrases describing the business rules in each direction between two entities
b) A relationship without cardinality
c) The nullability setting on a foreign key
d) A foreign key that has been role-named
e) A non-identifying relationship

A

a) The verb phrases describing the business rules in each direction between two entities

47
Q

A RACI matrix is a useful tool to support the ______ in an outsourced arrangement.

a) Service level Agreement
b) Alignment of Business goals
c) Attributing Costs
d) Transfer of access controls
e) Segregation of duties

A

e) Segregation of duties

48
Q

Definition of Data Security Policies should be:

a) Determined by external Regulators
b) Based on defined standards and templates
c) A collaborative effort between Business and IT
d) Reviewed by external Regulators
e) Conducted by external consultants

A

c) A collaborative effort between Business and IT

49
Q

What is a common motivation for Reference and Master Data Management?

a) The need to consolidate all data into one physical database
b) Business Intelligence and Data Warehousing
c) The need to improve data quality and data integrity across multiple data sources
d) Regulatory acts such as BCBS239, GDPR and SOX
e) The need to build a Data Dictionary of all core data entities & attributes

A

c) The need to improve data quality and data integrity across multiple data sources

50
Q

A strong argument for pursuing a Reference Data and/or Master Data management initiative is:

a) Job security for the data people
b) It will not require a lot of effort
c) It will not require a lot of time
d) By centralizing the management of Reference and Master data, the organization can conform critical data needed for analysis
e) They are essential functions in the data management framework

A

d) By centralizing the management of Reference and Master data, the organization can conform critical data needed for analysis

51
Q

We do not expect to consult the MetaData repository when:

a) None of the these
b) Assessing the impact of change
c) Updating the operating system that the Master Data management toolset is running on
d) Undertaking a data quality assessment
e) Investigating a data issue

A

c) Updating the operating system that the Master Data management toolset is running on

52
Q

These are examples of which type of Meta-Data: Data Stores and Data Involved, Government/ Regulatory Bodies; Roles and Responsibilities; Process Dependencies and Decomposition?

a) Operational Meta-Data
b) Process Meta-Data
c) Business Meta-Data
d) Technical Meta-Data
e) Data Stewardship Meta-Data

A

b) Process Meta-Data

53
Q

Which of the following is a Meta-Data scheme focused specifically on documents?

a) Descriptive Meta-Data
b) Preservation Meta-Data
c) Business Meta-Data
d) Administrative Meta-Data
e) Structural Meta-Data

A

b) Preservation Meta-Data

54
Q

Every enterprise is subject to many governmental and industry regulations, many of which regulate how data and information is used and managed. Part of the Data Governance Function is to:

a) Perform ad-hoc audits of possible regulations to report to the DG Council on an information only basis
b) This is about data; Data Governance is accountable for the whole process, with Risk and Audit reporting to DG
c) Enforce enterprise-wide mandatory compliance to regulations
d) This is a risk and audit responsibility; Data Governance plays no role in this
e) Monitor and ensure that organisations meet any regulatory compliance requirements

A

e) Monitor and ensure that organisations meet any regulatory compliance requirements

55
Q

Which of the following is not a step in the ‘document and content management lifecycle’?

a) Manage versions and control
b) Capture records and content
c) Create a content strategy
d) Manage retention and disposal
e) Audit documents and records

A

c) Create a content strategy

56
Q

In a recursive relationship:

a) All of the above
b) The relationship could be an identifying relationship
c) The relationship could be mandatory at either end
d) None of these, recursive relationships are not allowed in Data Models
e) The foreign key must have a role name to avoid attribute duplication

A

e) The foreign key must have a role name to avoid attribute duplication

57
Q

Which of these is NOT a type of key found in a data model?

a) Local key
b) Alternate key
c) Foreign key
d) Primary key
e) Surrogate key

A

a) Local key

58
Q

Top down’ and ‘bottom up’ data analysis and profiling is best done in concert because:

a) It gets everyone involved
b) It gives something for the architects to do while the profilers get on with the work
c) It allows the profiler to show the business the true state of the data
d) Data quality tools are more productive when they are effectively configured
e) It balances business relevance and the actual state of the data

A

e) It balances business relevance and the actual state of the data

59
Q

Which of these are increasingly driving legislation for information security and data privacy?

a) A recognition of Ethical issues in information management
b) A resistance to open data and transparency
c) GDPR
d) A desire for economic protectionism
e) An objective of making life more challenging for information management professionals

A

a) A recognition of Ethical issues in information management

60
Q

Which of the following define the data security touch points in an organisation?

a) Legislation
b) Business rules and process workflow
c) Industry standards
d) Risk Assessment
e) Internal Audit

A

b) Business rules and process workflow

61
Q

A type of Master data architecture is:

a) Virtualised
b) Hybrid
c) Repository
d) All of the above
e) Registry

A

d) All of the above

62
Q

The number of artifacts that must be searched in the Metadata repository for all Business change projects are:

a) Conceptual, Logical and Physical models must be examined
b) Conceptual data models and the Business Data Glossary must be examined
c) The Business Data Glossary and Systems Inventory must be consulted
d) There is no mandatory number of artefacts to be searched but it is highly recommended that the library is examined
e) The Business Data Glossary and Data Dictionary must be examined

A

d) There is no mandatory number of artefacts to be searched but it is highly recommended that the library is examined

63
Q

The MetaData repository enables us to establish multiple perspectives of data. These are:

a) Structured and unstructured
b) Internal and External
c) 3rd normal form and un normalised
d) Dimensional and non dimensional perspective
e) Business and Technical Perspective

A

e) Business and Technical Perspective

64
Q

What is the difference between an Industry and a Consensus Meta-Data Standard?

a) Industry standards are determined by regulators within a given global region and consensus standards are agreed on the Data Governance Council within an organisation
b) Consensus standards are formed by government legislation whereas industry standards evolve from best practice
c) Industry Standards refer to internationally approved global standards such as ISO whereas consensus standards refer to those agreed to within an organisation
d) Consensus standards are formed by an international panel of experts whereas industry standards are dictated by a panel of vendors
e) The terms are used interchangeably to describe the same concept

A

e) The terms are used interchangeably to describe the same concept