Free OG0-092 Exam Braindumps (page: 8)

Page 8 of 19

Scenario: Raxlon Inc.
Case Study Title (Case Study):

Raxlon Inc. is a Fortune 500 Company dealing in high value drugs and pharma products. Its annual turnover is over 120 billion $. It has more than 100,000 employees all over the globe in its R&D, Manufacturing and Marketing Units.
Raxlon’s CEO, Dr Peter Fowles, is a pharmacology expert and has over 72 patents on various types of drugs mainly used for treating patients with genetic disorders. Raxlon is now moving into a suite of high end critical drug products used for Genetic Repair of congenital Diseases like Alzhmeir’s disease and Epilepsy. Rexlon has a well developed EA practice and in 2009 the EA practice has adopted TOGAF 9 as the primary Framework for Enterprise Architectural Change Agent.

Dr Fowles’ main concerns are:
Security of the critical data which they have gained over the years after painstaking research. Although Rexlon had an adequate security system Dr Fowles feels it may not be adequate to deal with the new order of things, especially with data which is highly confidential and if leaked would have major financial impact on the Company.
Dr Fowles calls his CIO and explains his position to him and entrusts whim with the responsibly of evaluating the current security system, operation and governance and determine which are the gaps which need to be addressed during the fresh architectural work. Assume that a new Security Framework would be used in the ADM life cycle. To protect Rexlon’s valuable IP.
The CIO apprises the Lead Architect of the sensitive nature of the work he has to complete within the next 2 months.

Identify which of the following processes would be most appropriate for the Lead Architect to adopt in this situation.

  1. Identify the sources of threat, review the relevant security statutes, see how disaster recovery can be achieved, find who are the actors vis vis the system and design suitable access control mechanisms, identify critical data and applications and ensure that they are given the highest level of security
  2. First revisit the Preliminary Phase to determine the tailoring of ADM vis a vis Security. Identify any change in the Principles or additions to be carried out. Engage with all Stakeholders to finalize the Vision. Then in Business, Information systems and Technology Architectures ensure the Security Frame work adopted to the ADM addresses all critical security issues. Finally conduct an overall review to assess how effective the security ecosystem designed is and whether it meets the security level desired
  3. Invoke Preliminary Phase and Vision Phase Identify Sources of threat, review and determine revised regulatory, security and assumptions, document them get management buy in , develop business continuity plans especially for critical data operations, assure data, application and technological component security.
  4. Determine who are the people who are hacking into similar organizations, ensure that highly secure measures are taken when external people enter the R&D and manufacturing locations, ensure that there is a very strong firewall so that people cannot get illicit entry into the system, periodically check the effectiveness of the security measures

Answer(s): A



Scenario: MegaMart
Case Study Title (Case Study):

MegaMart is a Retail Chain which has expanded throughout India and the Far East.
The CEO and CIO decide that there is a crying need to put an Enterprise Architecture in place to realize MegaMart’s strategy to expand its revenue and diversify. The CIO has evaluated and decided to go in for TOGAF9 and adapt it to his enterprise requirements.

The Preliminary and Vision Phase have been completed.

As such very few architectural artifacts exist and the target architecture as of now is not very clear. As the Lead Architect how would you guide your team of architects for the Business Architecture definition?

  1. In the first iteration start with the definition of the Target Business Architecture using a Top down Approach. Then keep on iterating in Phase B till the Target Business Architecture is refined before going to Phase C and Phase D. After Phase C and Phase D are over, iterate again to Phase B and define the baseline Business Architecture, analyze the gaps finalize the Architecture Definitions documents and proceed to Phase C and Phase D.
  2. In the first iteration start with the definition of the Baseline Business Architecture using a Top Down approach. Define the Architecture Definition document after analyzing the impacts and reviewing with the stakeholders. Then proceed to Phase C and Phase D. In the next iteration finalize the Target Business Architecture and proceed to Phase C and Phase D.
  3. In the first iteration start with the definition of the Baseline Business Architecture using a Bottom Up approach. Define the Architecture Definition document after analyzing the impacts and reviewing with the stakeholders’.
    Proceed to Phase C and Phase D. In the next iteration finalize the Target Business Architecture, determine the gaps and the roadmap, and the impact and update the Architecture Definition document. after analyzing the impacts and reviewing with the stakeholders. Then proceed with the iteration.
  4. In the first iteration start with the definition of the Target Business Architecture using a Top Down approach. Define the Architecture Definition document after analyzing the impacts and reviewing with the stakeholders proceed to Phase C and Phase In the next iteration finalize the Baseline Business Architecture, determine the gaps and the roadmap, and the impact and update the Architecture Definition document. After analyzing the impacts and reviewing with the stakeholders. Then proceed with the iteration.

Answer(s): C



Scenario: AutoComp Corporation
AutoComp Corporation produces components for the Car industry. Driven by the global financial downturn they are looking to reduce IT costs. They believe there is a cost saving opportunity within IT but this is not quantified in terms of potential savings nor is there agreed target architecture.

Final decisions on the solutions are not yet fully agreed. They have completed their Vision Phase and first pass of the three architecture definition phases and now they want to finalize and plan their solutions. You are the Chief Architect from a consulting organization brought into review the work to date by AutoComp Corporation and to make recommendations to the CIO and the board on this.

Which of the following answers best describes how TOGAF recommends in this context?

  1. I would determine the business value of each solution, prioritize accordingly each set of solutions, conduct detailed Risk Assessment and Mitigation, do Compliance reviews and then implement the solutions. I would present my recommendations to the board for agreement. Once this is done, I would update the architectures reflecting any changes resulting from the board discussion.
  2. I would after confirming Enterprise Change Attributes and constraints, do a Consolidated Gap Analysis then dependencies, then group and allocate the transitions. I would also assess Enterprise readiness and risks. Then I would also assess the business value of the solutions, do risk analysis with mitigation and then schedule the work products.
  3. I would do a Consolidated Gap Analysis by considering then dependencies, then group and allocate the transitions. I would then look to produce artifacts that describe the recommended projects, the risk, issues and dependencies. This would also include transition architects to move us from current architecture to the recommended target architectures. I would present my recommendations to the board for agreement. Once this is done, I would update the architectures reflecting any changes resulting from the board discussion.
  4. I would look at the corporate culture and attitude to change, understand the constraints such as cost and the required time horizons. I would then look at the architecture work to ensure it is complete and seek to address any gaps. I would review the functional requirements and ensure there are complete interoperability requirements. I would then validate any dependencies and risks. Then formulate an implementation and migration strategy identifies major work packages and the transition architecture required. Finally, once agreement is reached with the board I will create project charters and re-factor any changes needed from the board discussion into the architecture.

Answer(s): D



Scenario: Eight Twelve
Eight Twelve has retail outlets throughout North America. An Enterprise Architecture practice already exists in Eight Twelve. Now the CEO and CIO decide that they want to use TOGAF9 to re-architect their Enterprise Architecture to cater to the changing strategies of Eight Twelve to better respond to the changes in the economic and technology environments.

Some of the key issues which need to be addressed in this re-architecting work are:

1. Since Eight Twelve’s retail chain operate 24 hours a day and are expanding to South America and Europe, the retail chain business ecosystem should be able to withstand any unforeseen disruptions which might affect the chain’s day to day operations. This is highly critical to ensure high levels of customer satisfaction and thus maintaining and enhancing Eight Twelve’s revenue chain.
2. Dependency between the application components, which are the nerve centers to Eight Twelve’s sophisticated range of services both external and internal, and the application platform and technology infrastructure should be minimal. This would facilitate scalability and ease of enhancement of the service offerings.
3. Eight Twelve uses the ARTS Data Model and the quality of data is of utmost importance for its operation.
4. Users of the Enterprise Information ecosystem should have an environment which is able to cater to their needs without any undue delays.

Which one of the following set of Architecture Principles do you feel is the most appropriate for these guidelines stated above for the TOGAF 9 architecting work which Eight Twelve is embarking on?

  1. a) Maximize Benefit to the Enterprise
    b) Data Trustee
    c) Service Orientation
    d) Responsive Change Management
  2. a) Business Continuity
    b) Data is an Asset
    c) Data is Shared
    d) Requirements Based Change
  3. a) Maximize Benefit to the Enterprise
    b) Data is an Asset
    c) Data is Shared
    d) Requirements Based Change
  4. a) Business Continuity
    b) Data Trustee
    c) Technology Independence
    d) Responsive Change Management

Answer(s): D



Page 8 of 19



Post your Comments and Discuss The Open Group OG0-092 exam with other Community members:

Jbobpop commented on November 27, 2015
Easy to purchase. Not like Avenset who likes to cheat people......! Thanks for a great site
DENMARK
upvote