Master Comptia-Data+ Data Governance with our interactive study cards designed for effective learning. These flashcards use proven spaced repetition techniques to help you memorize key concepts, definitions, and facts. Perfect for students, professionals, and lifelong learners seeking to improve knowledge retention and ace exams through active recall practice.
Click any card to reveal the answer
Framework of policies procedures and standards for managing data assets
Ensure data quality security compliance and proper use across organization
Structure defining roles responsibilities and processes for data management
Individual responsible for data classification security and access decisions
Person responsible for data quality integrity and day-to-day management
IT professional responsible for technical storage and security of data
Owner has authority and accountability steward manages quality and processes
Group of stakeholders overseeing data governance policies and decisions
Process of organizing data into categories based on sensitivity and importance
Public Internal Confidential and Restricted or Highly Confidential
Information requiring protection due to privacy security or regulatory requirements
Data that can identify a specific individual
Name Social Security number email address phone number and address
Medical information protected under HIPAA regulations
Credit card and payment information requiring PCI DSS compliance
Protecting personal information from unauthorized access and ensuring proper use
General Data Protection Regulation EU law protecting personal data and privacy
California Consumer Privacy Act protecting California residents' data rights
Right to access rectification erasure data portability and objection
Individual's right to request deletion of their personal data
Policies defining how long data must be kept before deletion
Document specifying retention periods for different data types
Legal compliance cost management and risk reduction
Secure destruction of data that is no longer needed
Shredding degaussing cryptographic erasure and physical destruction
Hiding sensitive data by replacing it with fictitious but realistic values
Removing identifying information so data cannot be linked to individuals
Replacing identifying fields with pseudonyms while maintaining data utility
Documentation of data's origin transformations and movement through systems
Ensures traceability supports compliance and aids troubleshooting
Measure of data's fitness for its intended use
Accuracy completeness consistency timeliness validity and uniqueness
Degree to which data correctly represents real-world values
Extent to which all required data is present
Data values are uniform across different systems and datasets
Data conforms to defined formats rules and constraints
Analyzing data to assess quality identify patterns and understand structure
Process of detecting and correcting inaccurate or corrupt data
Processes ensuring consistent accurate master data across organization
Organized inventory of data assets with metadata and documentation
Data that describes other data including structure source and meaning
Technical metadata business metadata and operational metadata
Document defining data elements their meanings and relationships
Reviewing and verifying data management practices and compliance
Unauthorized access to or disclosure of sensitive data
Procedures for detecting containing and recovering from data security incidents
Mechanisms restricting who can view modify or use data
Users should have minimum data access needed for their role
Assigning permissions based on user roles rather than individuals
Converting data into coded form to prevent unauthorized access
Protecting stored data through encryption
Protecting data being transmitted across networks
Remember: Use all available resources to study. Flearn alone cannot guarantee success in any exams—make sure to supplement your learning!