ExamGecko
Home Home / The Open Group / OGEA-103

The Open Group OGEA-103 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions


Please read this scenario prior to answering the question You are the Chief Enterprise Architect at a large food service company specializing in sales to trade and wholesale, for example, restaurants and other food retailers. One of your company's competitors has launched a revolutionary product range and is running a very aggressive marketing campaign. Your company's resellers are successively announcing that they are not interested in your company's products and will sell your competitor's. The CEO has stated there must be significant change to address the situation. He has made it clear that new markets must be found for the company's products, and that the business needs to pivot, and address the retail market as well as the existing wholesale market. A consideration is the company's ability and willingness to change its business model, and if it is a temporary or permanent change. An additional risk factor is one of culture. The company has been used to a stable business with a reasonably well known and settled client base - all with its own local understandings and practices. The CEO is the sponsor of the EA program within the company. You have been engaged with the sales, logistics, production, and marketing teams, enabling the architecture activity to start. An Architecture Vision, Architecture Principles, and Requirements have all been agreed. As you move forward to develop a possible Target Architecture you have identified that some of the key stakeholders' preferences are incompatible. The incompatibilities are focused primarily on time-to-market, cost savings, and the need to bring out a fully featured product range, but there are additional factors. Refer to the scenario You have been asked how you will address the incompatibilities between key stakeholder preferences. Based on the TOGAF standard which of the following is the best answer?

Please read this scenario prior to answering the question You have been appointed as senior architect working for an autonomous driving technology development company. The mission of the company is to build an industry leading unified technology and software platform to support connected cars and autonomous driving. The company uses the TOGAF Standard as the basis for its Enterprise Architecture (EA) framework. Architecture development within the company follows the purpose-based EA Capability model as described in the TOGAF Series Guide: A Practitioners'Approach to Developing Enterprise Architecture Following the TOGAF ADM. An architecture to support strategy has been completed defining a long-range Target Architecture with a roadmap spanning five years. This has identified the need for a portfolio of projects over the next two years. The portfolio includes development of travel assistance systems using swarm data from vehicles on the road. The current phase of architecture development is focused on the Business Architecture which needs to support the core travel assistance services that the company plans to provide. The core services will manage and process the swarm data generated by vehicles, paving the way for autonomous driving in the future. The presentation and access to different variations of data that the company plans to offer through its platform poses an architecture challenge. The application portfolio needs to interact securely with various third-party cloud services, and V2X (Vehicle-to-Everything) service providers in many countries to be able to manage the data at scale. The security of V2X is a key concern for the stakeholders. Regulators have stated that the user's privacy be always protected, for example, so that the drivers' journey cannot be tracked or reconstructed by compiling data sent or received by the car. Refer to the scenario You have been asked to describe the risk and security considerations you would include in the current phase of the architecture development? Based on the TOGAF standard which of the following is the best answer?







Please read this scenario prior to answering the question Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential. The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software. The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity. The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets. A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option. Refer to the scenario You have been asked to describe the steps you would take to improve the resilience of the current architecture? Based on the TOGAF standard which of the following is the best answer?

What can architects present to stakeholders to extract hidden agendas, principles, and requirements that could impact the final Target Architecture?

A.
Solutions and Applications
A.
Solutions and Applications
Answers
B.
Alternatives and Trade-offs
B.
Alternatives and Trade-offs
Answers
C.
Business Scenarios and Business Models
C.
Business Scenarios and Business Models
Answers
D.
Architecture Views and Architecture Viewpoints
D.
Architecture Views and Architecture Viewpoints
Answers
Suggested answer: D

Explanation:

According to the TOGAF standard, architecture views and architecture viewpoints are the tools that architects can use to present the architecture to different stakeholders and address their concerns1.

* An architecture view is a representation of a system from the perspective of a related set of concerns1. It is intended to communicate the architecture to a specific audience and to illustrate how the stakeholder's interests are being met1.

* An architecture viewpoint is a specification of the conventions and rules for constructing and using an architecture view for a particular purpose1. It defines the content, structure, format, and techniques to be used in the view1.

By using architecture views and viewpoints, architects can tailor the presentation of the architecture to suit the needs and expectations of different stakeholders1. They can also elicit feedback from the stakeholders and discover any hidden agendas, principles, or requirements that could impact the final target architecture2. For example, a business scenario is a technique that can be used to create a business view of the architecture and capture the business requirements and drivers3. A business model is another technique that can be used to describe the value proposition, revenue streams, cost structure, and key resources of the business4.

Which of the following best describes the need for the ADM process to be governed?

A.
To enable development of reference architectures
A.
To enable development of reference architectures
Answers
B.
To verify that the method is being applied correctly
B.
To verify that the method is being applied correctly
Answers
C.
To enable a fast response to market changes
C.
To enable a fast response to market changes
Answers
D.
To permit the architecture domains to be integrated
D.
To permit the architecture domains to be integrated
Answers
Suggested answer: B

Explanation:

According to the TOGAF standard, the need for the ADM process to be governed is to ensure that the architecture development and implementation activities are conducted in a consistent, coherent, and compliant manner1. Governance provides the means to verify that the method is being applied correctly and effectively, and that the architecture deliverables and artifacts meet the quality and standards criteria1. Governance also enables the management of risks, issues, changes, and dependencies that may arise during the ADM process1.

Some of the benefits of governing the ADM process are2:

* Improved alignment of the architecture with the business strategy and objectives

* Enhanced stakeholder engagement and communication

* Increased reuse and integration of architecture assets and resources

* Reduced complexity and duplication of architecture efforts

* Increased agility and adaptability of the architecture to changing needs and requirements

* Improved compliance and auditability of the architecture outcomes and outputs

What is the purpose of the Preliminary Phase?

A.
Developing an Enterprise Architecture Capability.
A.
Developing an Enterprise Architecture Capability.
Answers
B.
Describing the target architecture.
B.
Describing the target architecture.
Answers
C.
Defining the Enterprise Strategy.
C.
Defining the Enterprise Strategy.
Answers
D.
Identifying the stakeholders and their requirements.
D.
Identifying the stakeholders and their requirements.
Answers
Suggested answer: A

Explanation:

An Enterprise Architecture Capability is the ability of the organization to perform effective and efficient architecture work, including the definition, governance, and management of its architectures2. The Preliminary Phase involves the following activities1:

* Reviewing the organizational context, scope, and drivers for conducting Enterprise Architecture

* Establishing the Architecture Capability desired by the organization, including the maturity level, roles, responsibilities, processes, and tools

* Defining and establishing the Organizational Model for Enterprise Architecture, which describes how the architecture function is organized and integrated within the enterprise

* Defining and establishing the Architecture Governance framework, which provides the mechanisms for ensuring the quality, consistency, and compliance of the architecture work

* Selecting and implementing the tools that support the Architecture Capability, such as repositories, modeling tools, and communication tools

* Defining the Architecture Principles that will guide and constrain the architecture work, based on the business principles, goals, and drivers of the organization

* Defining the Organization-Specific Architecture Framework, which is an adaptation of the generic TOGAF ADM to suit the specific requirements, standards, and practices of the organization

The Preliminary Phase is essential for preparing the organization for the successful development and implementation of its architectures, as well as for ensuring the alignment of the architecture work with the business strategy and objectives1.

Consider the following ADM phases objectives.

Objective

1- Determine whether an incremental approach is required, and if so identify Transition Architectures that will deliver continuous business value

2- Generate the initial complete version of the Architecture Roadmap, based upon the gap analysis and candidate Architecture Roadmap components from Phases B, C, and D

3- Finalize the Architecture Roadmap and the supporting Implementation and Migration Plan

4- Ensure that the business value and cost of work packages and Transition Architectures is understood by key stakeholders

Which phase does each objective match?

A.
1E-2F-3E-4F
A.
1E-2F-3E-4F
Answers
B.
1G-2E-3F-4F
B.
1G-2E-3F-4F
Answers
C.
1E-2E-3F-4F
C.
1E-2E-3F-4F
Answers
D.
1F-2E-3F-4G
D.
1F-2E-3F-4G
Answers
Suggested answer: B

Explanation:

According to the TOGAF standard, the objectives of each ADM phase are as follows1:

* Phase E: Opportunities and Solutions

o Determine whether an incremental approach is required, and if so identify Transition Architectures that will deliver continuous business value

o Identify and group major work packages within the Architecture Roadmap

o Identify and group major implementation projects to realize the Architecture Roadmap

o Identify dependencies between increments and projects

o Estimate cost, benefit, and risk at a high level for each increment and project

o Conduct initial prioritization and sequencing of the Architecture Roadmap and projects

* Phase F: Migration Planning

o Generate the initial complete version of the Architecture Roadmap, based upon the gap analysis and candidate Architecture Roadmap components from Phases B, C, and D

o Confirm the Transition Architectures with relevant stakeholders

o Create the Implementation and Migration Plan, including Transition Architectures, work packages, projects, and other activities

o Confirm and agree the Architecture Roadmap and Implementation and Migration Plan with relevant stakeholders

* Phase G: Implementation Governance

o Finalize the Architecture Roadmap and the supporting Implementation and Migration Plan

o Ensure conformance with the Target Architecture by implementation projects

o Perform appropriate Architecture Governance functions for the solution and any implementation-driven architecture Change Requests

o Ensure that the architecture lifecycle is maintained

o Ensure that the Architecture Governance Framework is executed

* Phase H: Architecture Change Management

o Ensure that the business value and cost of work packages and Transition Architectures is understood by key stakeholders

o Manage risks and issues related to the Architecture Roadmap and Implementation and Migration Plan

o Monitor the implementation projects and Transition Architectures

o Manage changes to the architecture baseline

o Manage changes to the Architecture Capability

Therefore, the correct matching of the objectives and the phases is:

* 1G: Determine whether an incremental approach is required, and if so identify Transition Architectures that will deliver continuous business value

* 2E: Generate the initial complete version of the Architecture Roadmap, based upon the gap analysis and candidate Architecture Roadmap components from Phases B, C, and D

* 3F: Finalize the Architecture Roadmap and the supporting Implementation and Migration Plan

* 4F: Ensure that the business value and cost of work packages and Transition Architectures is understood by key stakeholders

Which of the following best summarizes the purpose of Enterprise Architecture?

A.
Taking major improvement decisions.
A.
Taking major improvement decisions.
Answers
B.
Guiding effective change.
B.
Guiding effective change.
Answers
C.
Controlling the bigger changes.
C.
Controlling the bigger changes.
Answers
D.
Governing the Stakeholders.
D.
Governing the Stakeholders.
Answers
Suggested answer: B

Explanation:

EA applies architecture principles and practices to analyze, design, plan, and implement enterprise analysis that supports digital transformation, IT growth, and the modernization of IT2. EA also helps organizations improve the efficiency, timeliness, and reliability of business information, as well as the alignment, agility, and adaptability of the architecture to the changing needs and requirements3. Therefore, the best summary of the purpose of EA is to guide effective change.

Exhibit

Consider the illustration showing an architecture development cycle Which description matches the phase of the ADM labeled as item 2?

A.
Conducts implementation planning for the architecture defined in previous phases
A.
Conducts implementation planning for the architecture defined in previous phases
Answers
B.
Establishes procedures for managing change to the new architecture
B.
Establishes procedures for managing change to the new architecture
Answers
C.
Operates the process of managing architecture requirements
C.
Operates the process of managing architecture requirements
Answers
D.
Provides architectural oversight for the implementation
D.
Provides architectural oversight for the implementation
Answers
Suggested answer: D

Explanation:

Based on the illustration, the phase of the ADM labeled as item 2 is the Implementation Governance phase. This phase provides architectural oversight for the implementation. It ensures that the implementation project conforms to the architecture. It also provides a framework for monitoring and managing the implementation.

The Implementation Governance phase involves the following activities:

Finalizing the Architecture Roadmap and the supporting Implementation and Migration Plan

Assigning an Architecture Board to oversee the implementation

Establishing Architecture Contracts with the implementation partners

Reviewing and approving the implementation project plans and deliverables

Performing Architecture Compliance reviews to ensure alignment with the architecture

Performing Architecture Audit reviews to ensure quality and performance of the architecture

Resolving any architecture issues or change requests that arise during the implementation

Maintaining the architecture lifecycle and ensuring its continuity

The Implementation Governance phase is essential for ensuring that the architecture is realized as intended and that it delivers the expected business value and outcomes.

What are the following activities part of?

. Risk classification

. Risk identification

. Initial risk assessment

A.
Security Architecture
A.
Security Architecture
Answers
B.
Phase A
B.
Phase A
Answers
C.
Phase G
C.
Phase G
Answers
D.
Risk Management
D.
Risk Management
Answers
Suggested answer: D

Explanation:

Risk management is a generic technique that can be applied across all phases of the Architecture Development Method (ADM), as well as in the Preliminary Phase and the Requirements Management Phase2. Risk management involves the following steps1:

* Risk identification: This step involves identifying the potential risks that may affect the architecture project, such as technical, business, organizational, environmental, or legal risks. The risks can be identified through various sources, such as stakeholder interviews, workshops, surveys, checklists, historical data, or expert judgment.

* Risk classification: This step involves categorizing the risks based on their nature, source, impact, and priority. The risks can be classified according to different criteria, such as time, cost, scope, quality, security, or compliance. The classification helps in prioritizing the risks and allocating resources and efforts to address them effectively.

* Initial risk assessment: This step involves assessing the likelihood and impact of each risk, and determining the initial level of risk. The likelihood is the probability of the risk occurring, and the impact is the severity of the consequences if the risk occurs. The initial level of risk is the product of the likelihood and impact, and it indicates the urgency and importance of the risk. The initial risk assessment helps in identifying the most critical risks that need immediate attention and mitigation.

Please read this scenario prior to answering the question

Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential.

The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software.

The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity.

The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets.

A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option.

Refer to the scenario

You have been asked to describe the steps you would take to improve the resilience of the current architecture?

Based on the TOGAF standard which of the following is the best answer?

A.
You would determine business continuity requirements, and undertake a gap analysis of the current Enterprise Architecture. You would make recommendations for change requirements to address the situation and create a change request. You would manage a meeting of the Architecture Board to assess and approve the change request. Once approved you would produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change.
A.
You would determine business continuity requirements, and undertake a gap analysis of the current Enterprise Architecture. You would make recommendations for change requirements to address the situation and create a change request. You would manage a meeting of the Architecture Board to assess and approve the change request. Once approved you would produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change.
Answers
B.
You would monitor for technology changes from your existing suppliers that could improve resilience. You would prepare and run a disaster recovery planning exercise for a ransomware attack and analyze the performance of the current Enterprise Architecture. Using the findings, you would prepare a gap analysis of the current Enterprise Architecture. You would prepare change requests to address identified gaps. You would add the changes implemented to the Architecture Repository.
B.
You would monitor for technology changes from your existing suppliers that could improve resilience. You would prepare and run a disaster recovery planning exercise for a ransomware attack and analyze the performance of the current Enterprise Architecture. Using the findings, you would prepare a gap analysis of the current Enterprise Architecture. You would prepare change requests to address identified gaps. You would add the changes implemented to the Architecture Repository.
Answers
C.
You would ensure that the company has in place up-to-date processes for managing change to the current Enterprise Architecture. Based on the scope of the concerns raised you recommend that this be managed at the infrastructure level. Changes should be made to the baseline description of the Technology Architecture. The changes should be approved by the Architecture Board and implemented by change management techniques.
C.
You would ensure that the company has in place up-to-date processes for managing change to the current Enterprise Architecture. Based on the scope of the concerns raised you recommend that this be managed at the infrastructure level. Changes should be made to the baseline description of the Technology Architecture. The changes should be approved by the Architecture Board and implemented by change management techniques.
Answers
D.
You would request an Architecture Compliance Review with the scope to examine the company's resilience to ransomware attacks. You would identify the departments involved and have them nominate representatives. You would then tailor checklists to address the requirement for increased resilience. You would circulate to the nominated representatives for them to complete. You would then review the completed checklists, identifying and resolving issues. You would then determine and present your recommendations.
D.
You would request an Architecture Compliance Review with the scope to examine the company's resilience to ransomware attacks. You would identify the departments involved and have them nominate representatives. You would then tailor checklists to address the requirement for increased resilience. You would circulate to the nominated representatives for them to complete. You would then review the completed checklists, identifying and resolving issues. You would then determine and present your recommendations.
Answers
Suggested answer: A

Explanation:

Business continuity is the ability of an organization to maintain essential functions during and after a disaster or disruption. Business continuity requirements are the specifications and criteria that define the acceptable level of performance and availability of the business processes and services in the event of a disaster or disruption. A gap analysis is a technique that compares the current state of the architecture with the desired state, and identifies the gaps or differences that need to be addressed. A change request is a formal proposal for an amendment to some product or system, such as the architecture.A Request for Architecture Work is a document that describes the scope, approach, and expected outcomes of an architecture project123

The best answer is A, because it describes the steps that would improve the resilience of the current architecture, which is the ability to withstand and recover from a ransomware attack or any other disruption. The steps are:

Determine the business continuity requirements, which specify the minimum acceptable level of performance and availability of the business processes and services in case of a ransomware attack. This would involve identifying the critical business functions, the recovery time objectives, the recovery point objectives, and the dependencies and resources needed for recovery.

Undertake a gap analysis of the current Enterprise Architecture, which compares the current state of the architecture with the desired state based on the business continuity requirements. This would involve assessing the strengths and weaknesses of the current architecture, the risks and opportunities for improvement, and the gaps or differences that need to be addressed.

Make recommendations for change requirements to address the situation and create a change request. This would involve proposing solutions and alternatives to close the gaps, enhance the resilience, and mitigate the risks of the current architecture. The change request would document the rationale, scope, impact, and benefits of the proposed changes, and seek approval from the relevant stakeholders.

Manage a meeting of the Architecture Board to assess and approve the change request. The Architecture Board is a governance body that oversees the architecture work and ensures compliance with the architecture principles, standards, and goals. The meeting would involve presenting the change request, discussing the pros and cons, resolving any issues or conflicts, and obtaining the approval or rejection of the change request.

Once approved, produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change. The Request for Architecture Work would describe the scope, approach, and expected outcomes of the architecture project that would implement the approved change request. The Request for Architecture Work would initiate a new cycle of the Architecture Development Method (ADM), which is the core process of the TOGAF standard that guides the development and management of the enterprise architecture.

Please read this scenario prior to answering the question

You are serving as the Lead Architect for an Enterprise Architecture team within a leading multinational biotechnology company. The company works in three major industries, including healthcare, crop production, and agriculture. Your team works within the healthcare division.

The healthcare division is developing a new vaccine, and has to demonstrate its effectiveness and safety in a set of clinical trials that satisfy the regulatory requirements of the relevant health authorities. The clinical trials are undertaken by its research laboratories at multiple facilities worldwide. In addition to internal research and development activities, the healthcare division is also involved in publicly funded collaborative research projects with industrial and academic partners.

The Enterprise Architecture team has been engaged in an architecture project to develop a secure system that will allow the healthcare researchers to share information more easily about their clinical trials, and work more collaboratively across the organization and also with its partners. This system will also connect with external partners.

The Enterprise Architecture team uses the TOGAF ADM with extensions required to support healthcare manufacturing practices and laboratory practices. Due to the highly sensitive nature of the information that is managed, special care has been taken to ensure that each architecture domain considers the security and privacy issues that are relevant.

The Vice President for Worldwide Clinical Research is the sponsor of the Enterprise Architecture activity. She has stated that disruptions must be minimized for the clinical trials, and that the rollout must be undertaken incrementally.

Refer to the scenario

You have been asked to recommend the approach to identify the work packages for an incremental rollout meeting the requirements.

Based on the TOGAF standard which of the following is the best answer?

A.
You recommend that the Solution Building Blocks from a Consolidated Gaps, Solutions and Dependencies Matrix be grouped into a set of work packages. Using the matrix as a planning tool, regroup the work packages to account for dependencies. Sequence the work packages into the Capability Increments needed to achieve the Target Architecture, so that the implementation team can schedule the rollout one region at a time to minimize disruption. Document the work packages for the Enterprise Architecture using a Transition Architecture State Evolution Table.
A.
You recommend that the Solution Building Blocks from a Consolidated Gaps, Solutions and Dependencies Matrix be grouped into a set of work packages. Using the matrix as a planning tool, regroup the work packages to account for dependencies. Sequence the work packages into the Capability Increments needed to achieve the Target Architecture, so that the implementation team can schedule the rollout one region at a time to minimize disruption. Document the work packages for the Enterprise Architecture using a Transition Architecture State Evolution Table.
Answers
B.
You recommend that a Consolidated Gaps. Solutions and Dependencies Matrix is used as a planning tool for creating work packages. For each gap classify whether the solution is either a new development, purchased solution, or based on an existing product. Group the similar solutions together to define the work packages. Regroup the work packages into a set of Capability Increments to transition to the Target Architecture considering the schedule for clinical trials, and document in an Architecture Definition Increments Table.
B.
You recommend that a Consolidated Gaps. Solutions and Dependencies Matrix is used as a planning tool for creating work packages. For each gap classify whether the solution is either a new development, purchased solution, or based on an existing product. Group the similar solutions together to define the work packages. Regroup the work packages into a set of Capability Increments to transition to the Target Architecture considering the schedule for clinical trials, and document in an Architecture Definition Increments Table.
Answers
C.
You recommend that an Implementation Factor Catalog is drawn up to indicate actions and constraints. A Consolidated Gaps. Solutions and Dependencies Matrix should also be created. For each gap. identify a proposed solution and classify it as new development, purchased solution, or based on an existing product. Group similar activities together to form work packages. Identify dependencies between work packages factoring in the clinical trial schedules. Regroup the work packages into a set of Capability Increments scheduled into a series of Transition Architectures.
C.
You recommend that an Implementation Factor Catalog is drawn up to indicate actions and constraints. A Consolidated Gaps. Solutions and Dependencies Matrix should also be created. For each gap. identify a proposed solution and classify it as new development, purchased solution, or based on an existing product. Group similar activities together to form work packages. Identify dependencies between work packages factoring in the clinical trial schedules. Regroup the work packages into a set of Capability Increments scheduled into a series of Transition Architectures.
Answers
D.
You recommend that the set of required Solution Building Blocks be determined by identifying those which need to be developed and which need to be procured. Eliminate any duplicates. Group the remaining Solution Building Blocks together to create the work packages using a CRUD (create, read, update, delete) matrix. Rank the work packages and select the most cost-effective options for inclusion in a series of Transition Architectures. Schedule the roll out of the work packages to be sequential across the geographic regions.
D.
You recommend that the set of required Solution Building Blocks be determined by identifying those which need to be developed and which need to be procured. Eliminate any duplicates. Group the remaining Solution Building Blocks together to create the work packages using a CRUD (create, read, update, delete) matrix. Rank the work packages and select the most cost-effective options for inclusion in a series of Transition Architectures. Schedule the roll out of the work packages to be sequential across the geographic regions.
Answers
Suggested answer: B

Explanation:

A Consolidated Gaps, Solutions and Dependencies Matrix is a technique that can be used to create work packages for an incremental rollout of the architecture. A work package is a set of actions or tasks that are required to implement a specific part of the architecture. A work package can be associated with one or more Architecture Building Blocks (ABBs) or Solution Building Blocks (SBBs), which are reusable components of business, IT, or architectural capability. A work package can also be associated with one or more Capability Increments, which are defined, discrete portions of the overall capability that deliver business value.A Capability Increment can be realized by one or more Transition Architectures, which are intermediate states of the architecture that enable the transition from the Baseline Architecture to the Target Architecture123

The steps for creating work packages using this technique are:

For each gap between the Baseline Architecture and the Target Architecture, identify a proposed solution and classify it as new development, purchased solution, or based on an existing product. A gap is a difference or deficiency in the current state of the architecture that needs to be addressed by the future state of the architecture. A solution is a way of resolving a gap by implementing one or more ABBs or SBBs.

Group similar solutions together to define the work packages. Similar solutions are those that have common characteristics, such as functionality, technology, vendor, or location.

Identify dependencies between work packages, such as logical, temporal, or resource dependencies. Dependencies indicate the order or priority of the work packages, and the constraints or risks that may affect their implementation.

Regroup the work packages into a set of Capability Increments to transition to the Target Architecture. Capability Increments should be defined based on the business value, effort, and risk associated with each work package, and the schedule and objectives of the clinical trials. Capability Increments should also be aligned with the Architecture Vision and the Architecture Principles.

Document the work packages and the Capability Increments in an Architecture Definition Increments Table, which shows the mapping between the work packages, the ABBs, the SBBs, and the Capability Increments. The table also shows the dependencies, assumptions, and issues related to each work package and Capability Increment.

Therefore, the best answer is B, because it describes the approach to identify the work packages for an incremental rollout meeting the requirements, using the Consolidated Gaps, Solutions and Dependencies Matrix as a planning tool.

Which of the following describes how the Enterprise Continuum is used when developing an enterprise architecture?

A.
To identify and understand business requirements
A.
To identify and understand business requirements
Answers
B.
To coordinate with the other management frameworks in use
B.
To coordinate with the other management frameworks in use
Answers
C.
To describe how an architecture addresses stakeholder concerns
C.
To describe how an architecture addresses stakeholder concerns
Answers
D.
To classify architecture and solution assets
D.
To classify architecture and solution assets
Answers
Suggested answer: D

Explanation:

The Enterprise Continuum consists of two complementary concepts: the Architecture Continuum and the Solutions Continuum1. The Architecture Continuum provides a consistent way to describe and understand the generic and reusable architecture building blocks, such as models, patterns, and standards, that can be applied and tailored to specific situations2. The Solutions Continuum provides a consistent way to describe and understand the specific and implemented solution building blocks, such as products, services, and components, that realize the architecture building blocks3. The Enterprise Continuum enables the reuse and integration of architecture and solution assets across different levels of abstraction, scope, and detail, ranging from foundation architectures to organization-specific architectures1.

The Enterprise Continuum is used when developing an enterprise architecture to support the following activities1:

* Selecting relevant architecture and solution assets from the Architecture Repository or other sources, based on the business drivers, goals, and requirements

* Adapting and customizing the architecture and solution assets to suit the specific needs and context of the enterprise

* Defining and developing the target architecture and the architecture roadmap, based on the gaps and opportunities identified between the baseline and the target states

* Defining and developing the implementation and migration plan, based on the architecture roadmap and the solution building blocks

* Governing and managing the architecture and solution assets throughout the architecture lifecycle, ensuring their quality, consistency, and compliance

Total 108 questions
Go to page: of 11