Complete the sentence. The architecture domains that are considered by the TOGAF standard as subsets of an overall enterprise architecture are Business, Technology,
A. Logical and Physical
B. Information and Data
C. Capability and Segment
D. Application and Data
Complete the sentence The purpose of the Preliminary Phase is to_____________.
A. describe the target architecture
B. define the enterprise strategy
C. identify the stakeholders and their requirements
D. architect an Enterprise Architecture Capability
Complete the following sentence. In the ADM documents which are under development and have not undergone any formal review and approval process are_______________.
A. called “draft1”
B. Invalid
C. In between phases
D. Known as `'Version 0.1''
What are the following activities part or?
Initial risk assessment Risk mitigation and residual risk assessment Risk monitoring
A. Risk Management
B. Phase A
C. Security Architecture
D. Phase C
Consider the following ADM phases objectives.
Objective:
1.Develop the Target Data Architecture that enables the Business Architecture and the Architecture Vision
2.Develop the Target Business Architecture that describes how the enterprise needs to operate to achieve the business goals
3.Develop a high-level aspirational vision of the capabilities and business value to be delivered as a result of the proposed Enterprise Architecture
4.Identify candidate Architecture Roadmap components based upon gaps between the Baseline and Target Technology Architectures
Which phase does each objective match?
A. 1B-2D-3A-4C
B. 1C-2D-3B-4A
C. 1C-2B-3A-4D
D. 1A-2B-3C-4D
In which part of the ADM cycle do building block gaps become associated with work packages that will address the gaps?
A. Phases G and H
B. Phases F
C. Phases B C and D
D. Phase E
Consider the following statement:
According to the TOGAF Standard a governed approach of a particular deliverable will ensure a system of continuous monitoring to check integrity changes decision-making and audit of all architecture-related activities
Which deliverable is being referred to?
A. An Architecture Contract
B. The Architecture Definition Document
C. The Architecture Vision
D. The Statement of Architecture Work
Complete the sentence. The purpose of Enterprise Architecture is to _________.
A. take major improvement decisions.
B. govern the stakeholders.
C. control the bigger changes.
D. guide effective change.
Which of the following best describes the TOGAF Architecture Development Method?
A. A process for managing architecture requirements
B. A classification mechanism for architectures and solutions
C. A process for managing and controlling change at an enterprise-wide level
D. A method for developing an organization-specific enterprise architecture
Please read this scenario prior to answering the question
You have been appointed as senior architect working for an autonomous driving technology development company. The mission of the company is to build an industry leading unified technology and software platform to support connected cars and autonomous driving.
The company uses the TOGAF Standard as the basis for its Enterprise Architecture (EA) framework. Architecture development within the company follows the purpose-based EA Capability model as described in the TOGAF Series Guide: A Practitioners'Approach to Developing Enterprise Architecture Following The TOGAF ADM. An architecture to support strategy has been completed defining a long-range Target Architecture with a roadmap spanning five years. This has identified the need for a portfolio of projects over the next two years. The portfolio includes development of travel assistance systems using swarm data from vehicles on the road.
The current phase of architecture development is focused on the Business Architecture which needs to support the core travel assistance services that the company plans to provide. The core services will manage and process the swarm data generated by vehicles, paving the way for autonomous driving in the future.
The presentation and access to different variations of data that the company plans to offer through its platform poses an architecture challenge. The application portfolio needs to interact securely with various third-party cloud services, and V2X (Vehicle-to-Everything) service providers in many countries to be able to manage the data at scale. The security of V2X is a key concern for the stakeholders. Regulators have stated that the user's privacy be always protected, for example, so that the drivers' journey cannot be tracked or reconstructed by compiling data sent or received by the car.
Refer to the scenario
You have been asked to describe the risk and security considerations you would include in the current phase of the architecture development?
Based on the TOGAF standard which of the following is the best answer?
A. You will focus on the relationship with the third parties required for the travel assistance systems and define a trust framework. This will describe the relationship with each party. Digital certificates are a key part of the framework and will be used to create trust between parties. You will monitor legal and regulatory changes across all the countries to keep the trust framework in compliance.
B. You will perform a qualitative risk assessment for the data assets exchanged with partners. This will deliver a set of priorities, high to medium to low, based on identified threats, the likelihood of occurrence, and the impact if it did occur. Using the priorities, you would then develop a Business Risk Model which will detail the risk strategy including classifications to determine what mitigation is enough.
C. You will focus on data quality as it is a key factor in risk management. You will identify the datasets that need to be safeguarded. For each dataset, you will assign ownership and responsibility for the quality of data needs. A security classification will be defined and applied to each dataset. The dataset owner will then be able to authorize processes that are trusted for a certain activity on the dataset under certain circumstances.
D. You will create a security domain model so that assets with the same level can be managed under one security policy. Since data is being shared across partners, you will establish a security federation to include them. This would include contractual arrangements, and a definition of the responsibility areas for the data exchanged, as well as security implications. You would undertake a risk assessment determining risks relevant to specific data assets.