Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

DA0-001 Exam Dumps - CompTIA Data+ Certification Exam

Go to page:
Question # 9

Which of the following actions should be taken when transmitting data to mitigate the chance of a data leak occurring? (Choose two.)

A.

Data identification

B.

Data processing

C.

Data Reporting

D.

Data encryption

E.

Data masking

F.

Fata removal

Full Access
Question # 10

Jenny wants to study the academic performance of undergraduate sophomores and wants to determine the average grade point average at different points during an academic year.

What best describes the data set she needs?

A.

Sample.

B.

Observation.

C.

Variable.

D.

Population.

Full Access
Question # 11

Which of the ing is the correct ion for a tab-delimited spre file?

A.

tap

B.

tar

C.

sv

D.

az

Full Access
Question # 12

Which of the following roles is responsible for ensuring an organization's data quality, security, privacy, and regulatory compliance?

A.

Data owner.

B.

Data steward.

C.

Data custodian.

D.

Data processor.

Full Access
Question # 13

What would be an example of an acceptable form of primary identification for the Data+ exam?

A.

Passport.

B.

School ID card.

C.

Employee ID card.

D.

Credit card with photo and signature.

Full Access
Question # 14

Which of the following is used for calculations and pivot tables?

A.

IBM SPSS

B.

SAS

C.

Microsoft Excel

D.

Domo

Full Access
Question # 15

An analyst is reporting on the average income for a county and is reviewing the following data:

Which of the following is the reason the analyst would need to cleanse the data in this data set?

A.

Data completeness

B.

Data outliers

C.

Duplicate data

D.

Missing values

Full Access
Question # 16

An analyst needs to summarize the number of people in Chicago in 2022 using the following set of data:

Which of the following steps should the analyst use to provide results? (Select two).

A.

Aggregation

B.

Sorting

C.

Filtering

D.

Indexing

E.

Cleaning

F.

Replacing

Full Access
Go to page: