| 题目 |
题目类型 |
操作 |
| Reference data is any data used to _________ other... |
普通选择题 |
去答题
|
| Who should facilitate the sharing of system of rec... |
普通选择题 |
去答题
|
| A significant activity in vocabulary management is... |
普通选择题 |
去答题
|
| MDM can be implemented in all of the following EXC... |
普通选择题 |
去答题
|
| Reference data value domains change __________. 参考... |
普通选择题 |
去答题
|
| An on-going challenge in MDM is the ___________ of... |
普通选择题 |
去答题
|
| MDM can help with all of the following EXCEPT,MDM ... |
普通选择题 |
去答题
|
| The difficulties in creating a single view of the ... |
普通选择题 |
去答题
|
| Master Data Management requires identifying and de... |
普通选择题 |
去答题
|
| How does reference data usually appear to users in... |
普通选择题 |
去答题
|
| What type of data security requirement validates u... |
普通选择题 |
去答题
|
| What should be done first for implementing data se... |
普通选择题 |
去答题
|
| It is a best practice to assign each user to how m... |
普通选择题 |
去答题
|
| What is the first line of defense in protecting ac... |
普通选择题 |
去答题
|
| Which type of control is NOT used when mitigating ... |
普通选择题 |
去答题
|
| A RACI clarifies all of the following EXCEPT,RACI ... |
普通选择题 |
去答题
|
| Classify documents and reports based on the ______... |
普通选择题 |
去答题
|
| Data privacy regulations generally focus on achiev... |
普通选择题 |
去答题
|
| The _________ of data security is no substitute fo... |
普通选择题 |
去答题
|
| CRUD matrices help map __________ needs and guide ... |
普通选择题 |
去答题
|