Want to pass your TOGAF 9 Part 2 OG0-092 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
Scenario: Raxlon Inc.
Case Study Title (Case Study): Raxlon Inc. is a Fortune 500 Company dealing in high value drugs and pharma products. Its annual turnover is over 120 billion $. It has more than 100,000 employees all over the globe in its RandD, Manufacturing and Marketing Units. Raxlon's CEO, Dr Peter Fowles, is a pharmacology expert and has over 72 patents on various types of drugs mainly used for treating patients with genetic disorders. Raxlon is now moving into a suite of high end critical drug products used for Genetic Repair of congenital Diseases like Alzhmeir's disease and Epilepsy. Rexlon has a well developed EA practice and in 2009 the EA practice has adopted TOGAF 9 as the primary Framework for Enterprise Architectural Change Agent.
Dr Fowles' main concerns are: Security of the critical data which they have gained over the years after painstaking research. Although Rexlon had an adequate security system Dr Fowles feels it may not be adequate to deal with the new order of things, especially with data which is highly confidential and if leaked would have major financial impact on the Company. Dr Fowles calls his CIO and explains his position to him and entrusts whim with the responsibly of evaluating the current security system, operation and governance and determine which are the gaps which need to be addressed during the fresh architectural work. Assume that a new Security Framework would be used in the ADM life cycle. To protect Rexlon's valuable IP. The CIO apprises the Lead Architect of the sensitive nature of the work he has to complete within the next 2 months.
Identify which of the following processes would be most appropriate for the Lead Architect to adopt in this situation.
A. Identify the sources of threat, review the relevant security statutes, see how disaster recovery can be achieved, find who are the actors vis vis the system and design suitable access control mechanisms, identify critical data and applications and ensure that they are given the highest level of security
B. First revisit the Preliminary Phase to determine the tailoring of ADM vis a vis Security. Identify any change in the Principles or additions to be carried out. Engage with all Stakeholders to finalize the Vision. Then in Business, Information systems and Technology Architectures ensure the Security Frame work adopted to the ADM addresses all critical security issues. Finally conduct an overall review to assess how effective the security ecosystem designed is and whether it meets the security level desired
C. Invoke Preliminary Phase and Vision Phase Identify Sources of threat, review and determine revised regulatory, security and assumptions, document them get management buy in , develop business continuity plans especially for critical data operations, assure data, application and technological component security.
D. Determine who are the people who are hacking into similar organizations, ensure that highly secure measures are taken when external people enter the RandD and manufacturing locations, ensure that there is a very strong firewall so that people cannot get illicit entry into the system, periodically check the effectiveness of the security measures
Please read this scenario prior to answering the question You are serving as the Lead Architect for a chain of convenience stores, operating as a franchise, which has over 5000 retail outlets throughout the Asia-Pacific region. The stores operate 24 hours a day and 7 days a week and rely on point- of-sale technology to manage their inventory.
Stores place all orders on-line. The back-office systems collect real-time data to support ordering and product selection decisions including the tailoring of product assortment based on sales history, customer demographics as well as the next day's weather forecast. In many cases, several stores are located in neighboring areas. This strategy makes distribution to each store cheaper, as well as making multiple deliveries per day possible.
An Enterprise Architecture practice exists within the company, with the CEO and CIO as joint sponsors. They have decided to adopt TOGAF 9 within the practice and the first project is to restructure the Enterprise Architecture so that it can better accommodate the changing strategies within the company and also better respond to changes in economic and technical environments.
The CIO has stated that the following issues need to be addressed in the restructuring: The systems should be able to withstand any unforeseen disruptions which might affect day to day operations. This is highly critical for ensuring high levels of customer satisfaction and maintaining and growing revenue. Dependencies between the application components, the application platform, and technology infrastructure should be minimal and well defined. This will facilitate scalability and ease of enhancement of the service offerings. The company is adopting the ARTS Operational Data Model and Data Warehouse Model from the National Retail Federation. This will address past problems with data quality and inconsistent data. To remain competitive, new products and promotions must undergo market trials and if these are successful, deployed across the retail chain. Information systems must be able to manage changes and updates without undue delays.
Refer to the Scenario [Note: You should assume that the company has adopted the example set of principles that are listed and defined in TOGAF, Section 23.6. You may need to refer to Chapter 23 of the reference text in order to answer this question.]
You have been asked to identify the most relevant architecture principles for the current situation.
Based on TOGAF, which of the following is the best answer? [Note: The ordering of the principles listed in each answer is not significant.]
A. Interoperability, Data is Accessible, Data is Shared, Requirements Based Change, Control Technical Diversity
B. Technology Independence, Business Continuity, Common Vocabulary and Data Definitions, Data Trustee, Responsive Change Management
C. IT Responsibility, Data Security, Ease of Use, Requirements Based Change, Common Use Applications
D. Interoperability, Maximize Benefit to the Enterprise, Data Trustee, Data is an Asset, Responsive Change Management
Scenario
Please read this scenario prior to answering the question
You are serving as the Lead Architect for the Enterprise Architecture team at a multinational company. The company has grown rapidly by acquisition and has inherited numerous supply chain processes and related IT systems. Several supply chain processes have had problems related to the timing of purchases, which has led to excess inventory. The Vice President in charge of Supply Chain Management has made the decision to consolidate and reduce redundant processes and systems. The company will move to a "Justin-time" supply chain management so as to keep inventory costs low.
The TOGAF standard is followed for internal Enterprise Architecture activities. This project is using an iterative approach for executing the Architecture Development Method (ADM).
At present, there are no architectural assets in the Architecture Repository related to this initiative. All assets will need to be acquired, customized, or created. The company prefers to implement commercial off the shelf package applications with little customization. The CIO, who is the project sponsor, has stated that she is not concerned about preserving the existing supply chain management processes or systems.
The architecture development project has completed Phase A and has started a number of iteration cycles to develop the Architecture. As a packaged application is being considered, the next iteration will include both the Business and Application Architectures. Key stakeholder concerns that should be addressed by these architectures include:
1.
What groups of people should be involved in the supply chain management-related business processes?
2.
What non-supply chain management applications will need to be integrated with any new supply chain management applications?
3.
What data will need to be shared?
Refer to the Scenario
[Note: You may need to refer to the Architectural Artifacts chapter, section 31.6 (located in Part IV) of the reference text in order to answer this question.]
You have been asked to identify the most appropriate catalogs matrices and diagrams to support the next iteration of Architecture development.
Based on the TOGAF standard, which of the following is the best answer?
A. You would describe the Baseline Business Architecture with a Business Service/function catalog, an Organization/Actor catalog, and a Data Entity/Business Function matrix. You would describe the Baseline Data Architecture using a Data Entity/Data Component catalog. You would describe the Baseline Application Architecture with an Application/Function matrix.
B. In the next iteration of Architecture development, you would describe the Target Business Architecture with an Organization/Actor catalog, a Business Service/Function catalog, and Data Lifecycle diagrams. You would describe the Target Application Architecture with a Data Entity/Data Component catalog. You would describe the Target Application Architecture with an Application Interaction matrix and Application Communication diagrams.
C. You would describe the Target Business Architecture with a Business Service/Function catalog, and a Business Interaction matrix. You would describe the Target Data Architecture with a Data Entity/ Business Function matrix and an Application/Data matrix. You would describe the Target Application Architecture with Application Communication diagrams and an Application Interaction matrix.
D. In the next iteration of Architecture development, you would describe the Baseline Business Architecture with a Value Chain diagram, and a Baseline Business Process catalog. You would describe the Baseline Data Architecture with a Data diagram. You would describe the Baseline Application Architecture with an Environments and Locations diagram.