Question # 1
Scenario: Please read this scenario prior to answering the Question You are serving as the Chief Architect for a large, global commodities trading company which has been growing rapidly through a series of acquisitions. Each business is performing well in its markets. However, the lack of integration between headquarters and the business units has increasingly caused problems in the handling of customer and financial information. The inability to share information across businesses has resulted in lost opportunities to "leverage the synergies" that had been intended when the businesses were acquired. At present, each business unit maintains its own applications. Despite an earlier initiative to install a common application to manage customer, products, supplier, and inventory information, each business unit has different ways of defining each of these core elements and has customized the common application to the point where the ability to exchange information is difficult, costly, and error-prone. As a result, the company has made the decision to introduce a single enterprise-wide application to consolidate information from several applications that exist across the lines of business. The application will be used by all business units and accessed by suppliers through well defined interfaces. The Corporate Board is concerned that the new application must be able to manage and safeguard confidential customer information in a secure manner that meets or exceeds the legal requirements of the countries in which the company operates. This will be an increasingly important capability as the company expands its online services in cooperation with its trading partners. The CIO has formed an Enterprise Architecture department, and one of the primary goals in its charter is to coordinate efforts between the implementation team and the business unit personnel who will be involved in the migration process. The CIO has also formed a cross-functional Architecture Board to oversee and govern the architecture. The company has an existing team of security architects. TOGAF 9 has been selected for use for the Enterprise Architecture program. The CIO has endorsed this choice with the full support of top management.
Refer to the Scenario In the Preliminary Phase you need to define suitable policies and ensure that the company has the appropriate capability to address the concerns of the Corporate Board. Based on TOGAF 9, which of the following is the best answer?
A. You start by clarifying the intent that the Board has for raising these concerns. This enables you to understand the implications of the concern in terms of regulatory requirements and the potential impact on current business goals and objectives. You propose that a security architect or security architecture team be allocated to develop a comprehensive security architecture and that this be considered an additional domain architecture.
B. You evaluate the implications of the Board's concerns by examining the security and regulatory impacts on business goals, business drivers and objectives. Based on your understanding, you then update the current security policy to include an emphasis on the concerns. You define architecture principles to form constraints on the architecture work to be undertaken in the project. You then allocate a security architect to ensure that security considerations are included in the architecture planning for all domains.
C. You identify and document the security and regulatory requirements for the application and the data being collected. You ensure that written policies are put in place to address the requirements, and that they are communicated across the organization, together with appropriate training for key employees. You identify constraints on the architecture and communicate those to the architecture team. You establish an agreement with the security architects defining their role within the ongoing architecture project.
D. You evaluate the implications of the concerns raised by the Corporate Board in terms of regulatory requirements and their impact on business goals and objectives. Based on this understanding, you then issue a Request for Architecture Work to commence an architecture development project to develop a solution that will address the concerns. You allocate a security architect to oversee the implementation of the new application that is being developed.
Answer
C. You identify and document the security and regulatory requirements for the application and the data being collected. You ensure that written policies are put in place to address the requirements, and that they are communicated across the organization, together with appropriate training for key employees. You identify constraints on the architecture and communicate those to the architecture team. You establish an agreement with the security architects defining their role within the ongoing architecture project.
Question # 2
Scenario: Zephyr Enterprises Please read this scenario prior to answering the question Zephyr Enterprises specializes in the development of wind turbine blades for use in large-scale commercial wind energy production systems. Zephyr has manufacturing facilities located in Palm Springs, California, Omaha, Nebraska, and Winnipeg, Ontario. Each of these plants supplies a different manufacturer that builds and sells complete systems. The turbine blades are custom engineered to meet each manufacturers design specifications. Until recently, most turbine blades were fabricated manually using molded fiber-reinforced plastics. However, recent improvements in composite materials, coupled with enhanced automated methods for precision application of materials during the molding process, have led to significant reduction in weight, increase in strength, and greatly improved blade longevity. Zephyr has pioneered the development of a proprietary automated process for continuous extrusion of the turbine blades. Patents have been filed to protect the process, but certain trade secrets must be closely guarded. Zephyr has a mature Enterprise Architecture organization that is supported by a cross-functional Architecture Review Board. The Chief Information Officer and the Chief Operating Officer cosponsor the Enterprise Architecture program. Zephyr has used TOGAF and its Architecture Development Method (ADM) to develop its automated manufacturing processes and systems that are used to design, manufacture, and test the blade assemblies. They have recently updated to TOGAF 9 and have adapted the Zephyr Enterprise Architecture to closely follow the TOGAF 9 framework. All of Zephyrs IT architects have been trained and certified on TOGAF 9.Recently, an architecture project was completed that defined a standard approach for controlling the Automated Test System that is used at each plant to perform final quality assurance tests on each completed blade assembly. The Manufacturing Architecture Board approved the plan for immediate implementation at each plant. An Architecture Contract was developed that detailed the work needed to implement and deploy the new Automated Test System controller. The Chief Engineer, sponsor of the activity, has expressed concern that a uniform process be employed at each site to ensure consistency.
Refer to the Zephyr Enterprises Scenario: You have been assigned by the Lead Architect for the Automated Test System controller project to conduct Compliance Assessments at each manufacturing plant. During the course of the assessment at the Omaha plant, you discover that the Distributed Data Acquisition System they have purchased uses a proprietary Remote Procedure Call (RPC) that utilizes kernel mode threads instead of the user mode threads that are specified in the Architecture Definition Document. In all other respects, the system meets the requirements stated in the Architecture Definition Document and seems to perform correctly. You have been asked to describe the compliance of this system for the final report. Based on TOGAF 9, which of the following is the best answer?
A. You observe that all of the features in the Architecture Definition Document have been implemented in accordance with the specification, except for the RPC mechanism. Your recommendation is that the system be described as conformant.
B. You observe that the system has many features in common with the Architecture Definition Document, and those features have been implemented in accordance with the specification. However, you note that the RPC mechanism has been implemented using features that are not covered by the specification. Your recommendation is that the system be described as consistent.
C. You observe that the implementation of the RPC mechanism has no features in common with the Architecture Definition Document, therefore the question of its conformance should not be considered. Your recommendation is that the system be described as consistent.
D. You observe that the system meets most of the requirements stated in the Architecture Definition Document and appears to work correctly. However, you note that the RPC mechanism has not been implemented according to the specification. Your recommendation is that the system be described as non-conformant.
Answer
D. You observe that the system meets most of the requirements stated in the Architecture Definition Document and appears to work correctly. However, you note that the RPC mechanism has not been implemented according to the specification. Your recommendation is that the system be described as non-conformant.
Question # 3
TP Banking is a strong financial institute with a well-known acquisition history with an internal IT department managing over 100 projects related to infrastructure and services. The CIO has decided to create an Enterprise Architecture based on TOGAF 9 as reaction to the difficult market conditions. An Architecture Vision and a set of domain architectures were approved. The CIO is asking you (the Lead Architect) to define an Implementation and Migration Plan that realizes the vision already agreed with the stakeholders involved. Refer to the scenario above You are leading a group of domain architects and you are working with the corporate PMO, the business strategy team and service operations. You are meeting the stakeholders to clarify how you want to proceed with the Implementation and Migration Plan. Choose one of the following answers
A. You propose to start collecting the existing deliverables describing the different domains in order to enable the Enterprise Architecture tram to integrate them with the support of the operation management. Every domain architect will then evaluate the impact on the projects already planned for the domain. The single revised plans will be integrated together and consolidated into a strategic implementation and migration strategy defining an IT roadmap.
B. You communicate the need for urgency. The projects already planned will be cancelled and the implementation of the new architecture vision will be set as first priority. A set of new projects will be defined to implement the new strategy. You will use the requirements from Phases B through D and define new projects for each one of the requirements. The use of defined interoperability architecture guidelines will then enable the project teams to work together and define a set of new point-to-point interfaces.
C. You describe the concept of Transition Architectures and clarify that the business value can be achieved by all the projects delivering their increments in a coordinated approach. Capability gaps and project dependencies are analyzed for each domain this will then enable the projects to be organized in work packages. You will then agree on the roadmap for the implementation and migration strategy meeting with all the key stakeholders.
D. You communicate the CIO's will to transform the corporation and then that he's seeking help from the domain architects to do that. The requirements are managed in order to enable every Architect to participate to the planning that will result in a detailed list of work activities with impact on the IT portfolio of projects. A five year Target Architecture will then be defined and a report will keep track of dependencies and factors assessment.
Answer
C. You describe the concept of Transition Architectures and clarify that the business value can be achieved by all the projects delivering their increments in a coordinated approach. Capability gaps and project dependencies are analyzed for each domain this will then enable the projects to be organized in work packages. You will then agree on the roadmap for the implementation and migration strategy meeting with all the key stakeholders.
Question # 4
Carter Woods, a global furniture firm, wants to improve the efficiency of its sales force by replacing their legacy configuration and ordering systems based on manual and paper based processes with an online ordering platform. Carter Woods uses the Architecture Delivery Method from TOGAF 9. The CIO sponsored this activity and the Baseline Architecture was defined on the initial iteration defining: approach, scope and architectural vision including a set of architecture principles related to the Data domain: Data is an asset. Data is shared. Data is accessible. A set of aspects to clarify arose from the business analysis from the assumption to replace the legacy systems with an online centralized one. These main concerns are: · To identify the changes to existing business processes. · To identify the data entities that can be shared among the sales agents. · To clarify how to keep the data secured. · To identify the list of non-sales application to be integrated with the sales applications
Refer to the scenario above You, as Lead Enterprise Architect, need to identify the most appropriate architecture viewpoints to address the concerns above mentioned. Choose one of the following answers
A. Depict the Business Architecture using a Role catalog and a Process/Event/Control/Product catalog. Depict the Data Architecture using a System/Data matrix, a Data Entity/Data Component catalog and Data Security diagram. Depict the Application Architecture using an Interface catalog. Define the Technology Architecture via a Network Computing/Hardware diagram.
B. Depict the Business Architecture using a Business Interaction matrix and a Location catalog. Depict the Data Architecture using a Data Lifecycle diagram and a Data Migration diagram. Depict the Application Architecture using a Software Engineering diagram. Depict the Technology Architecture using a Communications Engineering diagram.
C. Depict the Business Architecture using a Business Footprint diagram and a Location catalog. Depict the Data Architecture using a Data Migration diagram, System/Data matrix and Data Lifecycle diagram. Depict the Application Architecture using an Application Communication diagram. Depict the Technology Architecture using a Network Computing/Hardware diagram.
D. Depict the Business Architecture using a Role catalog and Location catalog. Depict the Data Architecture using a System/Data matrix, Data Entity/Business Function matrix and Data Security diagram. Depict the Application Architecture using an Application Interaction matrix. Define the Technology Architecture via a Network Computing/Hardware diagram.
Answer
A. Depict the Business Architecture using a Role catalog and a Process/Event/Control/Product catalog. Depict the Data Architecture using a System/Data matrix, a Data Entity/Data Component catalog and Data Security diagram. Depict the Application Architecture using an Interface catalog. Define the Technology Architecture via a Network Computing/Hardware diagram.
Question # 5
Scenario: Sollace Manufacturing Please read this scenario prior to answering the question Sollace Manufacturing is a major supplier in the automotive industry, headquartered In Cleveland, Ohio with manufacturing plants in Chicago, Sao Paulo, Stuttgart, Yokohama, and Seoul. Each of these plants has been operating its own planning and production scheduling systems, as well as custom developed applications that drive the automated production equipment at each plant. Sollace Manufacturing is implementing lean manufacturing principles to minimize waste and improve the efficiency of all of its production operations. During a recent exercise held for internal quality improvement, it was determined that a significant reduction in process waste could be achieved by replacing the current planning and scheduling systems with a common Enterprise Resource Planning (ERP) system located in the Cleveland data center. This central system would provide support to each of the plants replacing the functionality in the existing systems. It would also eliminate the need for full data centers at each of the plant facilities. A reduced number of IT staff could support the remaining applications. In some cases, a third-party contractor could provide those staff. The Sollace Manufacturing Enterprise Architecture department has been operating for several years and has mature, well-developed architecture governance and development processes that are strongly based on TOGAF 9. At a recent meeting, the Architecture Review Board approved a Request for Architecture Work from the Chief Engineer of Global Manufacturing Operations who is the project sponsor. The request covered the initial architectural investigations and the development of a comprehensive architecture to plan the transformation. The Common ERP Deployment architecture project team has now been formed, and the project team has been asked to develop an Architecture Vision that will achieve the desired outcomes and benefits. Some of the plant managers have expressed concern about the security and reliability of driving their planning and production scheduling from a central system located in Cleveland. The Chief Engineer wants to know how these concerns can be addressed. Refer to the Sollace Manufacturing Scenario You are serving as the Lead Enterprise Architect for the Common ERP Deployment architecture project. One of the earliest initiatives in the Enterprise Architecture program at Sollace Manufacturing was the definition of a set of IT principles and architecture principles that are well aligned with the overall enterprise principles. These now need to be updated to address the concerns raised. You have been asked to select a set of principles most appropriate for guiding the team to define a robust solution. [Note: You should assume that Sollace Manufacturing has adopted the example set of principles that are listed and defined in TOGAF 9, Section 23.6.] Based on TOGAF 9, which of the following is the best answer?
A. Common-use Applications, Data is Shared, Data is Accessible, Data Security, Interoperability, Control Technical Diversity
B. Business Continuity, Service-orientation, Data is Accessible, Data Security, Responsive Change Management
C. Maximize Benefit to the Enterprise, Business Continuity, Common-use Applications, Data is Shared, Data is Accessible, Data Security
D. Information Management is Everybody's Business, IT Responsibility, Data Trustee, Technology Independence, Responsive Change Management
Answer
C. Maximize Benefit to the Enterprise, Business Continuity, Common-use Applications, Data is Shared, Data is Accessible, Data Security
Helping People Grow Their Careers
1. Updated TOGAF Exam Dumps Questions
2. Free OG0-092 Updates for 90 days
3. 24/7 Customer Support
4. 96% Exam Success Rate
5. OG0-092 The Open Group Dumps PDF Questions & Answers are Compiled by Certification Experts
6. TOGAF Dumps Questions Just Like on the Real Exam Environment
7. Live Support Available for Customer Help
8. Verified Answers
9. The Open Group Discount Coupon Available on Bulk Purchase
10. Pass Your TOGAF 9 Part 2 Exam Easily in First Attempt
11. 100% Exam Passing Assurance
-->