Blog
Evan Cook Evan Cook
0 Course Enrolled • 0 Course CompletedBiography
Frenquent OGEA-102 Update - Practice OGEA-102 Online
There are some prominent features that are making the The Open Group OGEA-102 exam dumps the first choice of The Open Group OGEA-102 certification exam candidates. The prominent features are real and verified TOGAF Enterprise Architecture Part 2 Exam (OGEA-102) exam questions, availability of TOGAF Enterprise Architecture Part 2 Exam (OGEA-102) exam dumps in three different formats, affordable price, 1 year free updated The Open Group OGEA-102 exam questions download facility, and 100 percent The Open Group OGEA-102 exam passing money back guarantee.
How can you quickly change your present situation and be competent for the new life, for jobs, in particular? The answer is using our OGEA-102 practice materials. From my perspective, our free demo of OGEA-102 exam questions is possessed with high quality which is second to none. This is no exaggeration at all. Just as what have been reflected in the statistics, the pass rate for those who have chosen our OGEA-102 Exam Guide is as high as 99%, which in turn serves as the proof for the high quality of our OGEA-102 practice torrent.
>> Frenquent OGEA-102 Update <<
OGEA-102 Questions and Answers: TOGAF Enterprise Architecture Part 2 Exam & OGEA-102 Practice Test
Many candidates who take the qualifying exams are not aware of our products and are not guided by our systematic guidance, and our users are much superior to them. In similar educational products, the OGEA-102 quiz guide is absolutely the most practical. Also, from an economic point of view, our TOGAF Enterprise Architecture Part 2 Exam exam dumps is priced reasonable, so the OGEA-102 test material is very responsive to users, user satisfaction is also leading the same products. So economical and practical learning platform, I believe that will be able to meet the needs of users. Users can deeply depend on our TOGAF Enterprise Architecture Part 2 Exam exam dumps when you want to get a qualification. There may be many problems and difficulties you will face, but believe in our TOGAF Enterprise Architecture Part 2 Exam exam dumps if you want to be the next beneficiary, our OGEA-102 Quiz guide is not only superior in price than any other makers in the educational field , but also are distinctly superior in the quality of our products.
The Open Group TOGAF Enterprise Architecture Part 2 Exam Sample Questions (Q13-Q18):
NEW QUESTION # 13
You are working as an Enterprise Architect within an Enterprise Architecture (EA) team at a large government agency with multiple divisions. The agency has a well-established EA practice and follows the TOGAF standard as its method for architecture development. The government has mandated that the agency prepare for an "AI-first" world.
The agency wants to determine the impact and role of AI in its future services. The CIO has approved a Request for Architecture Work to explore the use of AI in services. Some leaders are concerned about reliance on AI, security, and employees' need to acquire new skills.
The EA team leader seeks suggestions on managing the risks associated with a new architecture for the AI-first project. Based on the TOGAF standard, which of the following is the best answer?
- A. Separate stakeholders into groups and categorize them. Develop models for each group and verify that their concerns are addressed in Phase G, Implementation Governance.
- B. Create an organization map to show the links between different agency parts. Hold a meeting to teach stakeholders to interpret the models. Manage risks as part of Security Architecture development.
- C. Identify key stakeholders and develop a Communication Plan that addresses their needs. Ensure the architecture addresses risk management and summarizes features of the architecture.
- D. Conduct an analysis of stakeholders, documenting their concerns and recording them in the Architecture Vision document. Risks should be recorded in the Architecture Requirements Specification and reviewed regularly.
Answer: D
Explanation:
In the context of the TOGAF standard, stakeholder management and addressing stakeholder concerns are critical components, especially for high-impact initiatives like adopting an AI-first approach. Here's why the selected answer aligns best with TOGAF principles and the scenario:
Stakeholder Analysis and Engagement:
Conducting a stakeholder analysis is essential as it helps identify and document the concerns, issues, and cultural factors influencing each stakeholder group. This aligns with TOGAF's emphasis on understanding and managing stakeholder concerns, particularly in the Preliminary and Architecture Vision phases of the ADM (Architecture Development Method). Since the scenario highlights diverse concerns about AI, understanding each group's unique perspective will help the EA team tailor the architecture to address these effectively.
Architecture Vision Document:
By documenting these concerns in the Architecture Vision document, the EA team can provide a clear, high-level representation of how AI will be adopted, its benefits, and how it addresses specific stakeholder concerns. This is critical for communicating the intent and value of the AI-first approach in a way that aligns with the agency's strategic goals, including addressing apprehensions about job security, skill development, and cyber resilience.
Risk Management and Architecture Requirements Specification:
TOGAF highlights the importance of identifying and managing risks early in the process. By documenting the requirements related to risk in the Architecture Requirements Specification, the EA team ensures that these concerns are formally integrated into the architecture and addressed throughout the ADM phases. Regular assessments and feedback loops will provide a mechanism for continual risk monitoring and adjustment as the AI-first initiative progresses.
Alignment with TOGAF's ADM Phases:
The approach specified aligns with TOGAF's guidance on managing risk and stakeholder concerns during the early ADM phases, specifically Architecture Vision and Requirements Management. In these phases, the framework emphasizes identifying and addressing risks associated with stakeholders' concerns to build a resilient and widely accepted architecture.
Reference to TOGAF Stakeholder Management Techniques:
TOGAF's stakeholder management techniques underscore the importance of understanding and addressing stakeholder needs as a foundational step. This involves assessing the influence and interest of various stakeholders and integrating their views into architectural development, ensuring that the architecture aligns with both business goals and operational realities.
In conclusion, by conducting a thorough stakeholder analysis and documenting concerns in both the Architecture Vision and Architecture Requirements Specification, the EA team can ensure that stakeholder concerns are addressed, that the architecture supports AI adoption effectively, and that potential risks are managed proactively. This approach will foster acceptance among stakeholders and ensure that the architecture aligns with the agency's strategic goals and risk management requirements as recommended by TOGAF.
NEW QUESTION # 14
Please read this scenario prior to answering the question
Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential.
The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software.
The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity.
The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets.
A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option.
Refer to the scenario
You have been asked to describe the steps you would take to improve the resilience of the current architecture?
Based on the TOGAF standard which of the following is the best answer?
- A. You would ensure that the company has in place up-to-date processes for managing change to the current Enterprise Architecture. Based on the scope of the concerns raised you recommend that this be managed at the infrastructure level. Changes should be made to the baseline description of the Technology Architecture. The changes should be approved by the Architecture Board and implemented by change management techniques.
- B. You would monitor for technology changes from your existing suppliers that could improve resilience. You would prepare and run a disaster recovery planning exercise for a ransomware attack and analyze the performance of the current Enterprise Architecture. Using the findings, you would prepare a gap analysis of the current Enterprise Architecture. You would prepare change requests to address identified gaps. You would add the changes implemented to the Architecture Repository.
- C. You would determine business continuity requirements, and undertake a gap analysis of the current Enterprise Architecture. You would make recommendations for change requirements to address the situation and create a change request. You would manage a meeting of the Architecture Board to assess and approve the change request. Once approved you would produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change.
- D. You would request an Architecture Compliance Review with the scope to examine the company's resilience to ransomware attacks. You would identify the departments involved and have them nominate representatives. You would then tailor checklists to address the requirement for increased resilience. You would circulate to the nominated representatives for them to complete. You would then review the completed checklists, identifying and resolving issues. You would then determine and present your recommendations.
Answer: C
Explanation:
Business continuity is the ability of an organization to maintain essential functions during and after a disaster or disruption. Business continuity requirements are the specifications and criteria that define the acceptable level of performance and availability of the business processes and services in the event of a disaster or disruption. A gap analysis is a technique that compares the current state of the architecture with the desired state, and identifies the gaps or differences that need to be addressed. A change request is a formal proposal for an amendment to some product or system, such as the architecture. A Request for Architecture Work is a document that describes the scope, approach, and expected outcomes of an architecture project123 The best answer is A, because it describes the steps that would improve the resilience of the current architecture, which is the ability to withstand and recover from a ransomware attack or any other disruption. The steps are:
Determine the business continuity requirements, which specify the minimum acceptable level of performance and availability of the business processes and services in case of a ransomware attack. This would involve identifying the critical business functions, the recovery time objectives, the recovery point objectives, and the dependencies and resources needed for recovery.
Undertake a gap analysis of the current Enterprise Architecture, which compares the current state of the architecture with the desired state based on the business continuity requirements. This would involve assessing the strengths and weaknesses of the current architecture, the risks and opportunities for improvement, and the gaps or differences that need to be addressed.
Make recommendations for change requirements to address the situation and create a change request. This would involve proposing solutions and alternatives to close the gaps, enhance the resilience, and mitigate the risks of the current architecture. The change request would document the rationale, scope, impact, and benefits of the proposed changes, and seek approval from the relevant stakeholders.
Manage a meeting of the Architecture Board to assess and approve the change request. The Architecture Board is a governance body that oversees the architecture work and ensures compliance with the architecture principles, standards, and goals. The meeting would involve presenting the change request, discussing the pros and cons, resolving any issues or conflicts, and obtaining the approval or rejection of the change request.
Once approved, produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change. The Request for Architecture Work would describe the scope, approach, and expected outcomes of the architecture project that would implement the approved change request. The Request for Architecture Work would initiate a new cycle of the Architecture Development Method (ADM), which is the core process of the TOGAF standard that guides the development and management of the enterprise architecture.
References: 1: The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 33: Business Scenarios 2: The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 30: Gap Analysis 3: The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 31: Architecture Change Management : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 7: Request for Architecture Work : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 34: Business Transformation Readiness Assessment : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 30: Gap Analysis : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 31: Architecture Change Management : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 50: Architecture Governance : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 7: Request for Architecture Work
NEW QUESTION # 15
Please read this scenario prior to answering the question
Your role is that of a consultant to the Lead Enterprise Architect to an international supplier of engineering services and automated manufacturing systems. It has three manufacturing plants where it assembles both standard and customized products for industrial production automation. Each of these plants has been operating its own planning and production scheduling systems, as well as applications and control systems that drive the automated production line.
The Enterprise Architecture department has been operating for several years and has mature, well-developed architecture governance and development processes that are based on the TOGAF Standard. The CIO sponsors the Enterprise Architecture.
During a recent management meeting, a senior Vice-President highlighted an interview where a competitor company's CIO is reported as saying that their production efficiency had been improved by replacing multiple planning and scheduling systems with a common Enterprise Resource Planning (ERP) system located in a central data center. Some discussion followed, with the CIO responding that the situations are not comparable, and the current architecture is already optimized.
In response, the Architecture Board approved a Request for Architecture Work covering the investigations to determine if such an architecture transformation would lead to improvements in efficiency. You have been assigned to support the architecture team working on this project.
A well-known concern of the plant managers is about the security and reliability of driving their planning and production scheduling from a remote centralized system. Any chosen system would also need to support the current supply chain network consisting of local partners at each of the plants.
Refer to the scenario
You have been asked to explain how you will initiate the architecture project.
Based on the TOGAF Standard, which of the following is the best answer?
- A. You would develop baseline and target Architectures for each of the manufacturing plants, ensuring that the views corresponding to selected viewpoints address key concerns of the stakeholders. A business case, together with performance metrics and measures should be defined to ensure the architecture meets the business needs. A consolidated gap analysis between the architectures will then validate the approach and determine the capability increments needed to achieve the target state.
- B. You would conduct a pilot project that will enable vendors to demonstrate potential off-the-shelf solutions that address the concerns of the stakeholders. Running a pilot project will save time and money later in the process. Based on the findings of that pilot project, a complete set of requirements can then be developed that will drive the evolution of the architecture. Once the requirements are completed, a formal stakeholder review should be held, and permission sought to proceed to develop the target architecture.
- C. You would hold a series of interviews at each of the manufacturing plants using the business scenarios technique. This will allow you to understand the systems and integrations with local partners. You would use stakeholder analysis to identify key players in the engagement, and to understand their concerns. You will then identify and document the key high-level stakeholder requirements for the architecture. You will then generate high level definitions of the baseline and target architectures.
- D. You would research vendor literature and conduct a series of briefings with vendors that are on the current approved supplier list. Based on the findings from the research, you would define a preliminary Architecture Vision including summary views, high-level requirements, and high-level definitions of the baseline and target environments from a business, information systems, and technology perspective. You would then use that to build consensus among the key stakeholders.
Answer: C
Explanation:
The best answer is C. You would hold a series of interviews at each of the manufacturing plants using the business scenarios technique. This will allow you to understand the systems and integrations with local partners. You would use stakeholder analysis to identify key players in the engagement, and to understand their concerns. You will then identify and document the key high-level stakeholder requirements for the architecture. You will then generate high level definitions of the baseline and target architectures.
This answer is based on the TOGAF standard, which recommends the following steps to initiate the architecture project1:
Establish the architecture project
Identify stakeholders, concerns, and business requirements
Confirm and elaborate business goals, business drivers, and constraints Evaluate business capabilities Assess readiness for business transformation Define scope Confirm and elaborate Architecture Principles, including business principles Develop Architecture Vision Define the Target Architecture value propositions and KPIs Identify the business transformation risks and mitigation activities Secure stakeholder and sponsor approval The answer C covers most of these steps, by using the business scenarios technique to elicit and validate the business requirements, goals, drivers, and constraints, as well as the current and future states of the architecture2. The answer C also uses stakeholder analysis to identify and engage the key stakeholders, and to address their concerns and expectations3. The answer C also generates high level definitions of the baseline and target architectures, which can be used to develop the Architecture Vision and the value propositions4.
The other answers are not the best approach for architecture development, because:
Answer A focuses on researching vendor literature and conducting briefings with vendors, which is not the best way to understand the business needs and the current situation of the enterprise. Answer A also defines a preliminary Architecture Vision without involving the stakeholders or validating the requirements, which may lead to misalignment and lack of consensus.
Answer B conducts a pilot project that will enable vendors to demonstrate potential solutions, which is premature and costly at this stage of the architecture project. Answer B also does not address the stakeholder concerns or the current systems and integrations, which may result in gaps and risks. Answer B also develops the requirements after the pilot project, which may not reflect the actual business needs and goals.
Answer D develops baseline and target architectures for each of the manufacturing plants, which may not consider the enterprise-wide perspective and the potential benefits of a common ERP system. Answer D also does not involve the stakeholders or address their concerns, which may result in resistance and conflict. Answer D also does not define the business case or the performance metrics, which are essential for demonstrating the value and feasibility of the architecture.
NEW QUESTION # 16
Please read this scenario prior to answering the question
You have been appointed as Chief Enterprise Architect (CEA). reporting to the Chief Technical Officer (CTO), of a company established as a separate operating entity by a major automotive manufacturer. The mission of the company is to build a new industry leading unified technology and software platform for electric vehicles.
The company uses the TOGAF Standard as the basis for its Enterprise Architecture (EA) framework, and architecture development follows the purpose-based EA Capability model as described in the TOGAF Series Guide: A Practitioners'Approach to Developing Enterprise Architecture Following the TOGAF® ADM.
An end-to-end Target Architecture has been completed with a roadmap for change over a five-year period. The new platform will be a cross-functional effort between hardware and software teams, with significant changes over the old platform. It is expected to be developed in several stages over three years. The EA team has inherited the architecture for the previous generation hardware and software automotive platform, some of which can be carried over to the new unified platform. The EA team has started to define the new platform, including defining which parts of the architecture to carry forward.
Enough of the Business Architecture has been defined, so that work can commence on the Information Systems and Technology Architectures. Those need to be defined to support the core business services that the company plans to provide. The core services will feature an innovative approach with swarm data generated by vehicles, paving the way for autonomous driving in the future.
The presentation and access to different variations of data that the company plans to offer through its platform pose an architecture challenge. The application portfolio and supporting infrastructure need to interact with various existing cloud services and data- Refer to the scenario You have been asked what approach should be taken to determine and organize the work to deliver the requested architectures?
Based on the TOGAF standard which of the following is the best answer?
- A. You would look outside the enterprise to research data models and application portfolios of leading big data businesses. You would develop just enough applications, data, and technology architecture to identify options. For each project this should include identification of candidate architecture and solution building blocks. You will identify solution providers, perform a readiness assessment, and assess the viability and fitness of the solution options. You will then document the draft Implementation and Migration plan.
- B. You will revisit ADM Phase A. identifying the stakeholders and creating a new Architecture Vision. You will update the Stakeholder map produced for the strategic architecture so it reflects the stakeholders who are now the most relevant to the projects that are to be developed. You would then ask the CTO to make some decisions about the Architecture Roadmap, and update the Implementation and Migration Plan to reflect the decisions.
- C. You will research leading data businesses, developing high-level Target Data, Application and Technology Architectures. You would review the Architecture Vision in order to estimate the level of detail, time, and breadth of the ADM cycle phases that will be needed to develop the architecture. You will identify and cost major work packages, and then develop an Architecture Roadmap. You would then seek approval by the Architecture Board and initiate the project.
- D. You would refer to the end-to-end Target Architecture for guidance and direction. The first objective should be to identify projects, dependencies and synergies, then prioritize before initiating the projects. You will develop high-level architecture descriptions. For each project you would estimate effort size, identify reference architectures, and candidate building blocks. You will identify the resource needs considering cost and value. You will document options, risks, and controls to enable viability analysis and trade-off with the stakeholders.
Answer: D
Explanation:
The Target Architecture is a description of the future state of the architecture that addresses the business goals and drivers, and satisfies the stakeholder requirements and concerns. The Target Architecture is developed through the Architecture Development Method (ADM), which is the core process of the TOGAF standard that guides the development and management of the enterprise architecture. The Target Architecture is typically divided into four domains: Business, Data, Application, and Technology. The Target Architecture also includes a roadmap for change, which defines the Transition Architectures, the Capability Increments, and the work packages that enable the transition from the Baseline Architecture to the Target Architecture12 The best answer is B, because it describes the approach that should be taken to determine and organize the work to deliver the requested architectures, which are the Information Systems and Technology Architectures. The answer covers the following steps:
Refer to the end-to-end Target Architecture for guidance and direction. The end-to-end Target Architecture provides the overall vision, scope, and objectives of the architecture work, and the alignment with the business strategy and goals. The end-to-end Target Architecture also provides the high-level definitions and principles for the four architecture domains, and the roadmap for change that outlines the major milestones and deliverables.
Identify projects, dependencies and synergies, then prioritize before initiating the projects. Projects are the units of work that implement the architecture work packages, which are the sets of actions or tasks that are required to implement a specific part of the architecture. Dependencies are the relationships and constraints that affect the order or priority of the projects, such as logical, temporal, or resource dependencies. Synergies are the benefits or advantages that result from the combination or coordination of the projects, such as cost savings, efficiency gains, or innovation opportunities. Prioritization is the process of ranking the projects according to their importance, urgency, or value, and assigning resources and schedules accordingly.
Develop high-level architecture descriptions. High-level architecture descriptions are the outputs of the architecture development phases (B, C, and D) of the ADM cycle, which describe the Business, Data, Application, and Technology Architectures in terms of the Architecture Building Blocks (ABBs) and the Solution Building Blocks (SBBs), which are reusable components of business, IT, or architectural capability. High-level architecture descriptions also include the Architecture Views, which are representations of the system of interest from the perspective of one or more stakeholders and their concerns.
For each project, estimate effort size, identify reference architectures, and candidate building blocks. Effort size is the measure of the amount of work, time, or resources required to complete a project. Effort size can be estimated using various techniques, such as analogy, expert judgment, parametric, or bottom-up. Reference architectures are standardized architectures that provide a common framework and vocabulary for a specific domain or industry. Reference architectures can be used as a source of best practices, patterns, and models for the architecture development. Candidate building blocks are the potential ABBs or SBBs that can be used to implement the architecture. Candidate building blocks can be identified from the Architecture Repository, which is a collection of architecture assets, such as models, patterns, principles, standards, and guidelines.
Identify the resource needs considering cost and value. Resource needs are the specifications and criteria that define the acceptable level and quality of the resources required to complete the project, such as human, financial, physical, or technological resources. Resource needs can be identified by analyzing the scope, complexity, and dependencies of the project, and the availability, capability, and suitability of the resources. Cost and value are the factors that influence the allocation and utilization of the resources, such as the budget, the return on investment, the benefits, or the risks.
Document options, risks, and controls to enable viability analysis and trade-off with the stakeholders. Options are the alternative ways of achieving the project objectives, such as different solutions, technologies, vendors, or approaches. Risks are the effects of uncertainty on the project objectives, such as threats or opportunities. Controls are the measures or actions that are taken to prevent, reduce, or mitigate the risks, such as policies, procedures, or standards. Viability analysis is the process of evaluating and comparing the options, risks, and controls, and determining the feasibility, suitability, and desirability of each option. Trade-off is the decision outcome that balances and reconciles the multiple, often conflicting, requirements and concerns of the stakeholders, and ensures alignment with the Architecture Vision and the Architecture Principles.
References: 1: The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 5: Introduction to the ADM 2: The TOGAF Standard, Version 9.2, Part IV: Architecture Content Framework, Chapter 36: Building Blocks : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 18: Phase A: Architecture Vision : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 19: Phase B: Business Architecture : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 20: Phase C: Information Systems Architectures : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 21: Phase F: Migration Planning : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 23: Architecture Principles : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 30: Trade-Off Analysis : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 46: Tools for Architecture Development : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 47: Architecture Board : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 48: Architecture Compliance : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 49: Architecture Contract : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 50: Architecture Governance : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 51: Architecture Maturity Models : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 52: Architecture Skills Framework
NEW QUESTION # 17
Please read this scenario prior to answering the question
Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential.
The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software.
The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity.
The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets.
A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option.
Refer to the scenario
You have been asked to describe the steps you would take to improve the resilience of the current architecture?
Based on the TOGAF standard which of the following is the best answer?
- A. You would ensure that the company has in place up-to-date processes for managing change to the current Enterprise Architecture. Based on the scope of the concerns raised you recommend that this be managed at the infrastructure level. Changes should be made to the baseline description of the Technology Architecture. The changes should be approved by the Architecture Board and implemented by change management techniques.
- B. You would monitor for technology changes from your existing suppliers that could improve resilience. You would prepare and run a disaster recovery planning exercise for a ransomware attack and analyze the performance of the current Enterprise Architecture. Using the findings, you would prepare a gap analysis of the current Enterprise Architecture. You would prepare change requests to address identified gaps. You would add the changes implemented to the Architecture Repository.
- C. You would determine business continuity requirements, and undertake a gap analysis of the current Enterprise Architecture. You would make recommendations for change requirements to address the situation and create a change request. You would manage a meeting of the Architecture Board to assess and approve the change request. Once approved you would produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change.
- D. You would request an Architecture Compliance Review with the scope to examine the company's resilience to ransomware attacks. You would identify the departments involved and have them nominate representatives. You would then tailor checklists to address the requirement for increased resilience. You would circulate to the nominated representatives for them to complete. You would then review the completed checklists, identifying and resolving issues. You would then determine and present your recommendations.
Answer: C
Explanation:
Business continuity is the ability of an organization to maintain essential functions during and after a disaster or disruption. Business continuity requirements are the specifications and criteria that define the acceptable level of performance and availability of the business processes and services in the event of a disaster or disruption. A gap analysis is a technique that compares the current state of the architecture with the desired state, and identifies the gaps or differences that need to be addressed. A change request is a formal proposal for an amendment to some product or system, such as the architecture. A Request for Architecture Work is a document that describes the scope, approach, and expected outcomes of an architecture project123 The best answer is A, because it describes the steps that would improve the resilience of the current architecture, which is the ability to withstand and recover from a ransomware attack or any other disruption. The steps are:
Determine the business continuity requirements, which specify the minimum acceptable level of performance and availability of the business processes and services in case of a ransomware attack. This would involve identifying the critical business functions, the recovery time objectives, the recovery point objectives, and the dependencies and resources needed for recovery.
Undertake a gap analysis of the current Enterprise Architecture, which compares the current state of the architecture with the desired state based on the business continuity requirements. This would involve assessing the strengths and weaknesses of the current architecture, the risks and opportunities for improvement, and the gaps or differences that need to be addressed.
Make recommendations for change requirements to address the situation and create a change request. This would involve proposing solutions and alternatives to close the gaps, enhance the resilience, and mitigate the risks of the current architecture. The change request would document the rationale, scope, impact, and benefits of the proposed changes, and seek approval from the relevant stakeholders.
Manage a meeting of the Architecture Board to assess and approve the change request. The Architecture Board is a governance body that oversees the architecture work and ensures compliance with the architecture principles, standards, and goals. The meeting would involve presenting the change request, discussing the pros and cons, resolving any issues or conflicts, and obtaining the approval or rejection of the change request.
Once approved, produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change. The Request for Architecture Work would describe the scope, approach, and expected outcomes of the architecture project that would implement the approved change request. The Request for Architecture Work would initiate a new cycle of the Architecture Development Method (ADM), which is the core process of the TOGAF standard that guides the development and management of the enterprise architecture.
NEW QUESTION # 18
......
You can download our OGEA-102 guide torrent immediately after you pay successfully. After you pay successfully you will receive the mails sent by our system in 10-15 minutes. Then you can click on the links and log in and you will use our software to learn our OGEA-102 prep torrent immediately. For the examinee the time is very valuable for them everyone hopes that they can gain high efficient learning and good marks. Not only our OGEA-102 Test Prep provide the best learning for them but also the purchase is convenient because the learners can immediately learn our OGEA-102 prep torrent after the purchase. So the using and the purchase are very fast and convenient for the learners.
Practice OGEA-102 Online: https://www.examsreviews.com/OGEA-102-pass4sure-exam-review.html
The Open Group Frenquent OGEA-102 Update In fact, you don't need to worry at all, The Open Group Frenquent OGEA-102 Update as well as the Cisco Certified Design Professional CCDP, The Open Group Frenquent OGEA-102 Update You need only to follow the study pattern devised in our material and you can achieve an amazing success in the exam, So you don’t have a better comprehension to our OGEA-102 exam dump.
While, the preparations for the OGEA-102 certification are necessary, so where to find the valid and latest OGEA-102 exam dumps is the best important thing for them.
A project charter dramatically reduces the risk of a project OGEA-102 being cancelled due to lack of support or perceived value to the company, In fact, you don't need to worry at all.
Free PDF Quiz 2025 Reliable OGEA-102: Frenquent TOGAF Enterprise Architecture Part 2 Exam Update
as well as the Cisco Certified Design Professional CCDP, You OGEA-102 Reliable Test Testking need only to follow the study pattern devised in our material and you can achieve an amazing success in the exam.
So you don’t have a better comprehension to our OGEA-102 exam dump, Moreover, we have professional backup.
- OGEA-102 PDF Questions 🔬 OGEA-102 Exam Sample Online 🐗 OGEA-102 New Test Camp 👳 Easily obtain ➽ OGEA-102 🢪 for free download through ⇛ www.prep4pass.com ⇚ ⏯OGEA-102 Test Lab Questions
- Free PDF 2025 Valid OGEA-102: Frenquent TOGAF Enterprise Architecture Part 2 Exam Update 🤮 ➡ www.pdfvce.com ️⬅️ is best website to obtain ⇛ OGEA-102 ⇚ for free download 🪒Training OGEA-102 Online
- OGEA-102 100% Accuracy 🙂 OGEA-102 Trustworthy Exam Torrent 🧖 Reliable OGEA-102 Test Notes ⚗ Open website 「 www.prep4pass.com 」 and search for ▷ OGEA-102 ◁ for free download 🚉Reliable OGEA-102 Test Notes
- OGEA-102 Test Simulator Online 🤯 OGEA-102 Trustworthy Exam Torrent 🐥 OGEA-102 Test Simulator Online 📔 Search for ( OGEA-102 ) and obtain a free download on 《 www.pdfvce.com 》 🪑OGEA-102 Exam Sample Online
- Free PDF 2025 Valid OGEA-102: Frenquent TOGAF Enterprise Architecture Part 2 Exam Update 🎑 Search for ( OGEA-102 ) and download exam materials for free through ▷ www.prep4pass.com ◁ 🙏Training OGEA-102 Online
- Top Frenquent OGEA-102 Update | Pass-Sure The Open Group Practice OGEA-102 Online: TOGAF Enterprise Architecture Part 2 Exam ❓ The page for free download of [ OGEA-102 ] on ✔ www.pdfvce.com ️✔️ will open immediately 🦃Latest OGEA-102 Braindumps Questions
- OGEA-102 Exam Sample Online 🧗 Latest OGEA-102 Braindumps Sheet 🔦 Latest OGEA-102 Braindumps Sheet 👉 Download ⇛ OGEA-102 ⇚ for free by simply entering ⮆ www.prep4away.com ⮄ website 📔OGEA-102 New Dumps Free
- 100% Pass The Open Group - OGEA-102 - TOGAF Enterprise Architecture Part 2 Exam –Reliable Frenquent Update 🚢 Easily obtain free download of ⮆ OGEA-102 ⮄ by searching on ▛ www.pdfvce.com ▟ 😅OGEA-102 Trustworthy Exam Torrent
- Get Unparalleled Frenquent OGEA-102 Update and Fantastic Practice OGEA-102 Online 🔏 Open 「 www.pass4leader.com 」 enter “ OGEA-102 ” and obtain a free download 🔴OGEA-102 Reliable Test Prep
- OGEA-102 100% Accuracy 🧓 Reliable OGEA-102 Exam Pattern 🦠 OGEA-102 Valid Exam Vce 🐭 Easily obtain 【 OGEA-102 】 for free download through ▛ www.pdfvce.com ▟ 🛴Test OGEA-102 Sample Questions
- High-quality Frenquent OGEA-102 Update | Valuable Practice OGEA-102 Online and Effective TOGAF Enterprise Architecture Part 2 Exam Sample Questions Pdf 🐘 Open website ▶ www.prep4away.com ◀ and search for ⮆ OGEA-102 ⮄ for free download 🧇Reliable OGEA-102 Exam Pattern
- OGEA-102 Exam Questions
- app.esevanakendram.com eclass.bssninternational.com learn.thebluhart.com mascarasvenecianas.com yogasangrah.com jptsexams1.com rapmoderndigital.online www.kelas.rizki-tech.com www.macglearninghub.com aaa.yyiii.com