1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
a. Data governance reduces innovation.
Which of the following statements inaccurately describes data governance?
a. Data governance reduces innovation.
b. It is difficult to measure the benefits of data governance.
c. Managing changes in organizational data workflows is complex and difficult.
d. The multiple and potentially conflicting demands of data ownership regulation is best addressed by a coordinated organizational approach.
d. Physical data model
The primary and foreign keys that are used in the database are examples of properties of the:
a. Master data.
b. Data classification.
c. Logical data model
d. Physical data model
d. Extrinsic
Which of the following is not one of the broad categories of information quality, according to the ISACA COBIT models (5 and 2019)?
a. Intrinsic
b. Contextual
c. Security and accessibility
d. Extrinsic
d. Unit of measurement
Chicken Lickin’ Good Manufacturing reports daily chicken production in kilograms (kg). This choice is best described as an example of:
a. Population
b. Sample
c. Records
d. Unit of measurement
c. Uncertainty
The confidence interval is a measure of:
a. Population density
b. Accuracy
c. Uncertainty
d. Risk
b. Data owner
It is most common for the ___________ to approve requests for access to new datasets.
a. Data custodian
b. Data owner ✅
c. Chief risk officer
d. Data steward
b. A primary key
Which of the following terms is used to describe the unique attribute that identifies a specific record in a table?
a. A foreign key
b. A primary key
c. A secondary key
d. A schema
c. Normalized
Data stored in _____________ form minimizes data redundancy and is less prone to errors.
a. Proprietary
b. TSV
c. Normalized
d. PDF
a. Database management system (DBMS)
Which of the following components of a database is responsible for maintaining the referential integrity of the data in the system?
a. Database management system (DBMS)
b. Data query language (DQL).
c. Data manipulation language (DML).
d. Data definition language (DDL).
d. B and C
Database management software is considered:
a. Outerwear
b. Software
c. Middleware
d. B and C
c. Character, field, record, file.
What is the correct ascending hierarchy of data in a system?
a. Character, record, file, field.
b. Field, character, file, record.
c. Character, field, record, file.
d. Field, record, file, character.
b. data mining
Analysis of data in a database using tools which look for trends or anomalies without knowledge in advance of the meaning of the data is referred to as:
a. Artificial intelligence
b. Data mining
c. Virtual reality
d. Transitory analysis
a. Pattern recognition
Which of the following is a critical success factor in data mining a large data store?
a. Pattern recognition
b. Effective search engines
c. Image processing systems
d. Accurate universal resource locator (URL)
c. Sales data
Which of the following is least likely to be an example of big data?
a. Dark data
b. Multifactor identification data
c. Sales data
d. Video conferencing data
b. Have a strong governance structure.
Big data initiatives should:
a. Be independent of existing IT initiatives.
b. Have a strong governance structure.
c. Be a subset of the event response plan.
d. Be overseen by the internal audit department.
d. Production
after changes to a source program have been made and verified, it moves to:
a. Atlanta
b. Development
c. The operator
d. Production
d. Change control
A brokerage firm has changed a program so as to permit higher transaction volumes. After proper testing of the change, the revised programs were authorized and copied to the production library. This practice is an example of:
a. Prototyping
b. Program integration
c. SDLC (System Development Life Cycle)
d. Change control
d. Gantt charts
The most appropriate data-gathering techniques for a system survey include interviews, quick questionnaires, observations, and:
a. Prototypes
b. Systems documentation
c. PERT charts
d. Gantt charts
b. Identify data records.
In an accounting system, a header can be used to:
a. Help format a word processing document.
b. Identify data records.
c. Identify file folders.
d. All of the above.
a. Guide managers, users, and auditors to adopt best practices related to the management of information technology.
One important purpose of COBIT is to:
a. Guide managers, users, and auditors to adopt best practices related to the management of information technology.
b. Identify specific control plans that should be implemented to reduce the occurrences of fraud.
c. Specify the components of an information system that should be installed in an e-commerce environment.
d. Suggest the type of information that should be made available for management decision making.
b. Authentication
Major Tom's Ground Control Flight Services uses biometrics. The control goal of the use of biometrics is:
a. Accountability
b. Authentication
c. Authorization
d. Certification
c. Separates unauthorized individuals from computer resources.
Which of the following statements best characterizes the function of a physical access control?
a. Protects systems from the transmission of Trojan horses.
b. Provides authentication of users attempting to log in to the system.
c. Separates unauthorized individuals from computer resources.
d. Minimizes the risk of incurring a power or hardware failure.
d. "Network firewall" and "application firewall" are two different names for a program designed to prevent and detect unauthorized access to the system.
Which of the following statements about firewalls is NOT true?
a. Firewalls frequently include both a hardware component and a software component.
b. Firewalls screen data packets to determine if they are acceptable or unacceptable and block unacceptable packets from the system.
c. Application firewalls, in addition to monitoring data packets, control the execution of programs and examine the handling of data by specific applications.
b. Adequate physical layout space for the operating system.
When designing the physical layout of a data processing center, which of the following would be least likely to be a necessary control?
a. Design of controls to restrict access.
b. Adequate physical layout space for the operating system.
c. Inclusion of an adequate power supply system with surge protection.
d. Consideration of risks related to other uses of electricity in the area.