ExamGecko
Home / The Open Group / OGEA-103 / List of questions
Ask Question

The Open Group OGEA-103 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

What can architects present to stakeholders to extract hidden agendas, principles, and requirements that could impact the final Target Architecture?

Become a Premium Member for full access
  Unlock Premium Member

Question 62

Report Export Collapse

Which of the following best describes the need for the ADM process to be governed?

Become a Premium Member for full access
  Unlock Premium Member

Question 63

Report Export Collapse

What is the purpose of the Preliminary Phase?

Become a Premium Member for full access
  Unlock Premium Member

Question 64

Report Export Collapse

Consider the following ADM phases objectives.

Objective

1- Determine whether an incremental approach is required, and if so identify Transition Architectures that will deliver continuous business value

2- Generate the initial complete version of the Architecture Roadmap, based upon the gap analysis and candidate Architecture Roadmap components from Phases B, C, and D

3- Finalize the Architecture Roadmap and the supporting Implementation and Migration Plan

4- Ensure that the business value and cost of work packages and Transition Architectures is understood by key stakeholders

Which phase does each objective match?

Become a Premium Member for full access
  Unlock Premium Member

Question 65

Report Export Collapse

Which of the following best summarizes the purpose of Enterprise Architecture?

Become a Premium Member for full access
  Unlock Premium Member

Question 66

Report Export Collapse

Exhibit

The Open Group OGEA-103 image Question 66 77844 09232024005541000000

Consider the illustration showing an architecture development cycle Which description matches the phase of the ADM labeled as item 2?

Become a Premium Member for full access
  Unlock Premium Member

Question 67

Report Export Collapse

What are the following activities part of?

. Risk classification

. Risk identification

. Initial risk assessment

Become a Premium Member for full access
  Unlock Premium Member

Question 68

Report Export Collapse

Please read this scenario prior to answering the question

Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential.

The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software.

The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity.

The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets.

A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option.

Refer to the scenario

You have been asked to describe the steps you would take to improve the resilience of the current architecture?

Based on the TOGAF standard which of the following is the best answer?

Become a Premium Member for full access
  Unlock Premium Member

Question 69

Report Export Collapse

Please read this scenario prior to answering the question

You are serving as the Lead Architect for an Enterprise Architecture team within a leading multinational biotechnology company. The company works in three major industries, including healthcare, crop production, and agriculture. Your team works within the healthcare division.

The healthcare division is developing a new vaccine, and has to demonstrate its effectiveness and safety in a set of clinical trials that satisfy the regulatory requirements of the relevant health authorities. The clinical trials are undertaken by its research laboratories at multiple facilities worldwide. In addition to internal research and development activities, the healthcare division is also involved in publicly funded collaborative research projects with industrial and academic partners.

The Enterprise Architecture team has been engaged in an architecture project to develop a secure system that will allow the healthcare researchers to share information more easily about their clinical trials, and work more collaboratively across the organization and also with its partners. This system will also connect with external partners.

The Enterprise Architecture team uses the TOGAF ADM with extensions required to support healthcare manufacturing practices and laboratory practices. Due to the highly sensitive nature of the information that is managed, special care has been taken to ensure that each architecture domain considers the security and privacy issues that are relevant.

The Vice President for Worldwide Clinical Research is the sponsor of the Enterprise Architecture activity. She has stated that disruptions must be minimized for the clinical trials, and that the rollout must be undertaken incrementally.

Refer to the scenario

You have been asked to recommend the approach to identify the work packages for an incremental rollout meeting the requirements.

Based on the TOGAF standard which of the following is the best answer?

Become a Premium Member for full access
  Unlock Premium Member

Question 70

Report Export Collapse

Which of the following describes how the Enterprise Continuum is used when developing an enterprise architecture?

Become a Premium Member for full access
  Unlock Premium Member
Total 114 questions
Go to page: of 12

Related questions





Please read this scenario prior to answering the question Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential. The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software. The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity. The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets. A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option. Refer to the scenario You have been asked to describe the steps you would take to improve the resilience of the current architecture? Based on the TOGAF standard which of the following is the best answer?



Please read this scenario prior to answering the question You have been appointed as senior architect working for an autonomous driving technology development company. The mission of the company is to build an industry leading unified technology and software platform to support connected cars and autonomous driving. The company uses the TOGAF Standard as the basis for its Enterprise Architecture (EA) framework. Architecture development within the company follows the purpose-based EA Capability model as described in the TOGAF Series Guide: A Practitioners'Approach to Developing Enterprise Architecture Following the TOGAF ADM. An architecture to support strategy has been completed defining a long-range Target Architecture with a roadmap spanning five years. This has identified the need for a portfolio of projects over the next two years. The portfolio includes development of travel assistance systems using swarm data from vehicles on the road. The current phase of architecture development is focused on the Business Architecture which needs to support the core travel assistance services that the company plans to provide. The core services will manage and process the swarm data generated by vehicles, paving the way for autonomous driving in the future. The presentation and access to different variations of data that the company plans to offer through its platform poses an architecture challenge. The application portfolio needs to interact securely with various third-party cloud services, and V2X (Vehicle-to-Everything) service providers in many countries to be able to manage the data at scale. The security of V2X is a key concern for the stakeholders. Regulators have stated that the user's privacy be always protected, for example, so that the drivers' journey cannot be tracked or reconstructed by compiling data sent or received by the car. Refer to the scenario You have been asked to describe the risk and security considerations you would include in the current phase of the architecture development? Based on the TOGAF standard which of the following is the best answer?

Please read this scenario prior to answering the question You are working as the Chief Enterprise Architect within a law firm specializing in personal injury cases. Many of the firm's competitors have improved their litigation strategies, and efficiency by streamlining their processes using Artificial Intelligence {Al). The CIO has approved a Request for Architecture Work to examine the use of Machine Learning in defining a new Al-driven litigation and finance process for the firm. This process would instruct the lawyers and analysts as to what tasks and portfolio they should work on. The key objectives are to increase task profitability, maximize staff utilization, and increase individual profitability. The CIO has emphasized that the architecture should enable the fast implementation of continuous Machine Learning. The solution will need to be constantly measured for delivered value and be quickly iterated to success. Some of the partners have expressed concerns about letting the Al make the decisions, others about the risks associated with use of it for the type of service they deliver. The CIO wants to know if these concerns can be addressed, and how risks will be covered by a new architecture enabling Al and Machine Learning. Refer to the scenario You have been asked to respond to the CIO recommending an approach that would enable the development of an architecture that addresses the concerns of the CIO and the concerns of the partners. Based on the TOGAF standard which of the following is the best answer?