Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

DMF-1220 Exam Dumps - DAMA CDMP Questions and Answers

Question # 94

Data Management maturity has many goals for accomplishment including having a positive effect on culture. This is important to a Data Governance program for the following reason:

Options:

A.

It is important to be able to assess the level of current state for each component against the Data Governance best practices to determine how readily the culture has accepted Data Governance

B.

Data Governance does not affect the culture of the organization directly

C.

It is important to have many goals so that you can show progress on some of the goals even if you can't meet all of them

D.

Data management maturity only has one goal

E.

Best practices for data management are not the same as best practices for Data Governance

Buy Now
Question # 95

Reference data management entails the preventative maintenance of undefined domain values, definitions and the relationship within and across domain values.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 96

In gathering requirements for DW/BI projects, begin with the data goals and strategies first.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 97

Match rules for different scenarios require different workflows, including:

Options:

A.

Consistency rules

B.

Duplicate identification match rules

C.

Match-merge rules

D.

Match-split rules

E.

Match-link rules

F.

All of the above

Buy Now
Question # 98

The CAP theorem asserts that the distributed system cannot comply with all the parts of the ACID. A distributed system must instead trade-off between the following properties:

Options:

A.

Consistency

B.

Utilization

C.

Availability

D.

System development

E.

Partition tolerance

F.

All of the above

Buy Now
Question # 99

The second stage of Kotter’s eight stage process is:

Options:

A.

Developing a vision and a strategy

B.

Establishing a sense of urgency

C.

Creating short term wins

D.

Creating the guiding coalition

Buy Now
Question # 100

In a SQL injection attack, a perpetrator inserts authorized database statements into a vulnerable SQL data channel, such as a stored procedure.

Options:

A.

FALSE

B.

TRUE

Buy Now
Question # 101

Reference and Master Data Management follow these guiding principles:

Options:

A.

Quality

B.

Stewardship

C.

Authority

D.

Ownership

E.

Exclusivity

F.

Inclusivity

Buy Now
Question # 102

Data modelling is most infrequently performed in the context of systems and maintenance efforts, known as SDLC.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 103

A successful Data Governance program requires that all enterprise data be certified.

Options:

A.

FALSE

B.

TRUE

Buy Now
Question # 104

What changes in data processing when a gas utility checks the condition of its assets using a drone rather than a team of people driving alongside the pipeline?

Options:

A.

Previously, they received condition data, now they receive observation data that needs to be analyzed to extract the condition

B.

Previously, they received reference data, now they receive incident data to find the work order

C.

Video data is much easier to read than structured data from the teams

D.

Previously, they received master data, now they receive reference data to find the incidents

E.

Previously, they received metadata, now they receive transactional data that needs to be analyzed to extract the data

Buy Now
Question # 105

A database uses foreign keys from code tables for column values. This is a way of implementing:

Options:

A.

Master data

B.

Event data

C.

Reference data

D.

Star schema data

E.

Temporal data

Buy Now
Question # 106

Effective data management involves a set of complex, interrelated processes that enable an organisation to use its data to achieve strategic goals.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 107

A e-discovery readiness assessment should examine and identify opportunities for the commercial response program.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 108

Obfuscating or redacting data is the practice of making information anonymous ot removing sensitive information. Risks are present in the following instances:

Options:

A.

Data storage

B.

Data marketing

C.

Data aggregation

D.

Data marking

E.

Data masking

F.

Data integration

Buy Now
Exam Code: DMF-1220
Exam Name: Data Management Fundamentals
Last Update: Jun 15, 2025
Questions: 725
DMF-1220 pdf

DMF-1220 PDF

$29.75  $84.99
DMF-1220 Engine

DMF-1220 Testing Engine

$33.25  $94.99
DMF-1220 PDF + Engine

DMF-1220 PDF + Testing Engine

$47.25  $134.99