Final Answesaanalytics
Final Answesaanalytics
Design an enhancement of
business Leverage on customer data the current enterprise data
intelligence to gain source of analytic
45 warehousing system to
subject matter data which increase support change in business
expert company revenue model
48
C
Recommend best approach to design
D full architecture and present it to the
board D
A
A
C
A
after E steps to prepare final implementation
and migation plan
after E steps to prepare final implementation
and migation plan
D
B
claim
completed a
the researchers have been Business
resisting the change because of Transformation
concerns about Readiness
5 Lead Architict
concerns about Readiness
5 Lead Architict safeguarding individually Assessment in
identifiable information about Phase A
the subjects who were (Architecture
participating in the trials Vision).
A
D
B
advise the Chief Architect on the best
ways to approach to the C
Vision implementation planning activities for
this significant A
business transformation.
C
B
D
You have been asked to recommend
the best approach to adopt to address
G the Chief Engineer's concern.
(COTRACT)
C
B
A
B
You have been asked to recommend
E how this situation be managed in the
implementation planning phases.
You have been asked to recommend
E how this situation be managed in the C
implementation planning phases. D
A
A
You have been asked to recommend an
approach that would enable the B
B development of an architecture that
addresses the needs of all these parties D
C
B-to- F
Architec
ture
Defeniti
on cycle
\
\
claim
1 Preliminary C
implementa CapabilityBased
2 B
tion planning Planning.
Adapting ADM
3 Preliminary A
Security
4 G architicture contract D
5 E Risk mitigation C
Stackholder
6 Vision D
concerns
7 content metamodel B
8 E Techniques C
Architecture
9 G D
complaiance
10 A Scope A
11 E Work packages A
course of action to
12 after Vision complete the B
project
13 preliminary Principles D
14 F F steps B
15 artifacts C
after Stackholder
16 D
preliminary concerns
17 D architicture contract A
Adapting ADM
18 Preliminary C
Security
19 After Vision ADM iteation A
E(prior to
approval of
20 detailed assessing risk C
implentation
plan )
21 Preliminary Principals B
business
transformation
22 Vision C
readiness
assessment
23 Extention of
Priliminary content A
metamodel
tacke stakholder
24 Vsion C
concrns
NOT Stackholder
26 C
determined concerns
27 Prliminary Principles D
28 prilimiinary Principals C
29 Security B
31 E steps of E D
32 Principals D
33 content metamodel A
Befor
development Risk assessement
36 B
of arciticture
project
Compliance review
37 D
steps
38 F F steps B
39 E E steps C
40 G B
41 content metamodel A
Stackholder
42 Vision D
concerns
43 Vision Steps from B TO D C
45 content metamodel A
46 architicture contract A
47 Principals B
48 E E steps D
49 F F steps C
after Stackholder
50 A
priliminary concerns
E(prior to
approval of
51 detailed assessing risk D
implentation
plan )
52 D architicture contract A
53 After Vision ADM iteation B
54 content metamodel C
55 Principals B
Security In
56 D
priliminary
57 EA TEAM SKILLS C
58 Priliminary Content extension A
59
business
transformation
60 Vision C
readiness
assessment
61 E Work packages B
Rational from TOGAF
minimize waste and improve the efficiency of all of its production operations = Maximize benefit to the enterprise
Business continuity = reliability data is secured = data is shared, data is secured centeralized application= common
use applications.
outcome= capability based planning / in the case he needs horizonal green capability
in the case : improving overall customer service within each business unit = in the answe: It is crucial to gain
business unit support and cooperation to achieve the broader business outcomes which will benefit all
The security policy should be examined to find relevant sections, and updated if necessary. Architecture constraints
established in the security policy must be communicated to the other members of the architecture team.
A written security policy for the organization must be in place, and there should be regular notification and
education established for employees. ISO/IEC 17799: 2005 is a good place to start the for mation of a security
policy, and can be used to assess the security readiness of an organization. Without a written and published
security policy, enforcement is difficult
Architecture constraints established in the security policy must be communicated to the other members of the
architecture team.
Science I need to analyse stackholders with their concerns I begin with stackholder map
1. What groups of people should be involved in procurement-related business processes? = Business
Service/Function catalog
2. What current applications do those groups use? App Organization matrix
3. Which procurement-related business processes are supported by zero, one, or many existing applications?
4. What are the overall lifetimes of the Request for Proposal and Purchase Order business objects? = Product
Lifecycle diagrams
5. What non-procurement applications will need to be integrated with any new procurement applications?
Application Communication diagrams and an Application Interaction matrix
6. What data will need to be shared? = Data Entity/Business Function matrix
lists the steps (techniques) to construct initial implementation and migration plan
The steps in Phase E are as follows:
n Deter mine/confirm m key cor porate change attributes
n Deter mine business constraints for implementation
n Review and consolidate gap analysis results from Phases B to D
n Review consolidated requirements across related business functions
n Consolidate and reconcile interoperability requirements
n Refine and validate dependencies)
n Confirm readiness and risk for business transform mation
n Formulate Implementation and Migration Strategy
n Identify and group major wor k packages
n Identify Transition Architectures
n Create the Architecture Roadmap & Implementation and Migration Plan
Non-conformant: Any of the above in which some features in the architecture specification are implemented not in
accordance with the specification
appropriate and useful technique to discover and document business requirements, and to
ar ticulate an Architecture Vision that responds to those requirements
Pr inciples are general rules and guidelines, intended to be enduring and seldom amended, that infor m and
support the way in which an organization sets about fulfilling its mission. Architecture principles are typically
developed by the enterpr ise architects, in conjunction with the key stakeholders, and are approved by the
Architecture Board.
Confirm management framework interactions for Implementation and Migration Plan
n Assign a business value to each work package
n Estimate resource requirements, project timings, and availability/delivery vehicle
n Prioritize the migration projects through the conduct of a cost/benefit assessment and risk
validation
n Confirm Architecture Roadmap and update Architecture Definition Document
n Complete the Implementation and Migration Plan
n Complete the architecture development cycle and document lessons learned
science there is no architictue exists we neglect points that begins with baseline / concern 1 relationship between
business process and applications which exists in data entity/business function matrix and application data matrix
dtat will be shared it needs a baseline artifact for data which is data entity/data component entity
The purpose of the Stakeholder Map matrix is to identify the stakeholders for the architecture
engagement, their influence over the engagement, and their key questions, issues, or concer ns
that must be addressed by the architecture framework.
Review the findings of the Business Transfor mation Readiness Assessment previously
conducted in Phase A and determine their impact on the Architecture Roadmap and the
Implementation and Migration Strategy. It is impor tant to identify, classify, and mitigate risks
associated with the transfor mation efor t. Risks should be documented in the Consolidated
Gaps, Solutions, and Dependencies matrix.
Bussiness contiunty = relability /Data is shared +Secured = Security/ Maximize benefit to the organization = impove
efficiency of applications (from the case)
A Business Transfor mation Readiness Assessment can be used to evaluate and quantify the organization’s
readiness to undergo a change. This assessment is based upon the determination and analysis/rating of a series of
readiness factors, as descr ibed in Chapter 30. The results of the readiness assessment should be added to the
Capability Assessment (see Part IV, Section 36.2.10). These results are then used to shape the scope of the
architecture, to
identify activities required within the architecture project, and to identify risk areas to be addressed.
The purpose of the Stakeholder Map matrix is to identify the stakeholders for the architecture
engagement, their influence over the engagement, and their key questions, issues, or concer ns
that must be addressed by the architecture framework.
Architecture principles are typically developed by the enterpr ise architects, in conjunction with
the key stakeholders, and are approved by the Architecture Board.
Architecture principles will be infor med by principles at the enterpr ise level, if they exist.
Architecture principles must be clearly traceable and clearly articulated to guide decisionmaking.
They are chosen so as to ensure alignment of the architecture and implementation of
the Target Architecture with business strategies and visions.
Specifically, the development of architecture principles is typically influenced by the following:
n Enterprise mission and plans: the mission, plans, and organizational infrastr ucture of the
enter prise.
n Enterprise strategic initiatives: the character istics of the enterpr ise — its strengths,
weaknesses, oppor tunities, and threats — and its current enterpr ise-wide initiatives (such
as process improvement and quality management).
n External constraints: mar ket factors (time-to-market imperatives, customer expectations,
etc.); existing and potential legislation.
n Current systems and technology: the set of infor mation resources deployed within the
enter prise, including systems documentation, equipment inventor ies, networ k configuration
diagrams, policies, and procedures.
n Emerging industry trends: predictions about economic, political, technical, and market
factors that influence the enterpr ise environment.
Bussiness contiunty = relability /Data is shared +Secured = Security/ Maximize benefit to the organization = impove
efficiency of applications (from the case)
Secur ity concer ns are pervasive throughout the architecture domains and in all phases of the architecture
development. Security is called out separately because it is infrastr ucture that is rarely visible to the business
function.
All groups of stakeholders in the enterpr ise will have secur ity concer ns and it is desirable to
br ing a secur ity architect into the project as early as possible. Throughout the phases of the
ADM, guidance will be ofered on security-specific infor mation which should be gathered, steps
which should be taken, and artifacts which should be created. Architecture decisions related to
secur ity should be traceable to business and policy decisions and their risk management.
1- They want to analyze the roles of the top management for each revenue earning service = means role and
business service =Actor/Role Matrix
2-many of the HR related critical Search application component have become extremely slow. This needs to be
diagnosed and rectified. = System/Functions Matrix
3- there is no proper tracking of revenue from retail store component products over time. = Data Entity/Business
Function Matrix
4- There has also been a lot of unauthorized or unwanted access to many of the critical information. Hence the
mode of access needs to be strengthened and made much more secure. = Data Security Diagram
5- the new launches and the progress of each of the launches over time. = Technology Portfolio Catalog
#VALUE!
There will always be risk with any architecture/business transfor mation efor t. It is important to identify, classify,
and mitigate these risks before starting so that they can be tracked throughout the transfor mation efor t.
Mitigation is an ongoing efor t and often the risk triggers may be outside the scope of the transfor mation planners
(e.g., merger, acquisition) so planners must monitor the transfor mation context constantly.
It is also important to note that the enterpr ise architect may identify the risks and mitigate certain ones, but it is
within the governance framework that risks have to be first accepted and then managed.
The risk identification and mitigation assessment wor ksheets are maintained as governance
ar tifacts and are kept up-to-date in Phase G (Implementation Governance) where risk monitoring
is conducted.
1-Request architecture review,2-Identify responsible part of Architecture Review ,3-Identify Lead Enterpr ise
Architecture , 4 Deter mine scope of review,5- Tailor checklists.,6shedule Architecture Review Meeting
7 Inter view project principals,8 Analyze completed checklists,9 Prepare Architecture Compliance review repor t
10 Present review findings 11 Accept review and sign of 12 Send assessment Lead Enter prise Architect
repor t/summar
most TOGAFSH
· To identify the changes to existing business processes.=Process/Event/Control/Product Catalog : identify the full
chain of impacts resulting from changing a high-level process.
· To identify the data entities that can be shared among the sales agents.= Data Entity/Data Component Catalog
· To clarify how to keep the data secured.= Data Security diagram,System/Data matrix,
· To identify the list of non-sales application to be integrated with the sales applications= interface catalog
You first list the data used across the enterprise using a Data Entity/Data Component Catalog, including data entities
and also the data components where data entities are stored. You then classify what the data source are and the
relationship with the data entities via a System/Data Matrix. You finally identify common data requirements using a
Data Lifecycle Diagram.
Review the findings of the Business Transfor mation Readiness Assessment previously
conducted in Phase A and determine their impact on the Architecture Roadmap and the
Implementation and Migration Strategy. It is impor tant to identify, classify, and mitigate risks
associated with the transfor mation efor t. Risks should be documented in the Consolidated
Gaps, Solutions, and Dependencies matrix.
What groups of people should be involved in procurement-related business processes? = business interaction
matrix
What are the overall lifetimes of the Request for Proposal and Purchase Order business objects? = Data life cycle
Diagram
What non-procurement applications will need to be integrated with any new procurement applications?
=Application communication diagram , Application interaction matrix
Define and document applicable regulatory and security policy requirements The framework and principles rarely
change, and so the security implications called out in the objectives of this phase should be fair ly straightforward.
A written security policy for the organization must be in place, and there should be regular notification and
education established for employees.
Skills frameworks provide a view of the competency levels required for specific roles. They
define:
n The roles within a wor k area
n The skills required by each role
n The depth of knowledge required to fulfil the role successfully
problem from the case :
1- upgrade reliability and performanc e for its secure communication service .
2- the upgraded system must be able to provide assurance and verifications of specific performance measures on
the key services .
3- focusing on these service level details and specific mesasures allow more strong strong requirements to be
inforced in service contract .
4- review processes, content , governeance of th EA cabability to ensure higher target performance and service
levels required by the upgraded system .
5- the artifact don't have explicit provision for defing the in-depth measurement requirements regarding specific
services
from TOGAF
34.4.1 Governance Extensions
The scope of this extension is as follows:
n The ability to apply measures to objectives and then link those measures to services
Changes to the metamodel entities and relationships are as follows:
n Measure is added as a new entity that links objective and business service.
n Ser vice Quality is added as a new entity that provides a generic service profile template to
be applied to business services or contracts.
Changes to the metamodel attributes are as follows:
n Attr ibutes are added for the new metamodel entities of Measure, Ser vice Quality, and
Ser vice Contract
34.4.6 Motivation Extensions
Purpose
The motivation extension is intended to allow additional structured modeling of the drivers, goals,
and objectives that influence an organization to provide business services to its customers. This
in turn allows more efective definition of service contracts and better measurement of business
perfor mance.
A Business Transfor mation Readiness Assessment can be used to evaluate and quantify the organization’s
readiness to undergo a change. This assessment is based upon the determination and analysis/rating of a series of
readiness factors, as descr ibed in Chapter 30. The results of the readiness assessment should be added to the
Capability Assessment (see Part IV, Section 36.2.10). These results are then used to shape the scope of the
architecture, to
identify activities required within the architecture project, and to identify risk areas to be addressed.
Question 17
tamam
same as 61
same as 27
same as 7
Question 4
tamam
discussed well in
answers we hoa
megawb wrong same
as,25 , 53
same as 51
same as 29 tamam
tamam same as 60
discussed well in
answers we hoa
megawb wrong same
as,19 , 53
same as 21
hoa mgawb wrong
tamam
tamam
tamam
reconsider
confusing
tamam
tamam
tamam
tamam
same as 20
tamam
subset of 7
tamam we hoa
megawb wrong
same as 18
hoa mgawb wrong
tamam same as 22 we
hoa mwgawb wrong
I would identify the key stakeholders and engage with them to understand and
document their concerns and high-level requirements. This would result in a
stakeholder map used to support other deliverables such as the Architecture
Vision, a Communications plan and a Statement of Architecture Work.
would define the business case for the architecture project, assess the business
risks and produce a risk mitigation plan.
I would then define a plan of enterprise architecture work to meet the scope in
the desired time line and the resources required and secure the support of
stakeholders.
C
then confirm and elaborate the business goals, business drivers and
constraints I would then evaluate the business capabilities and readiness
for business transformation and define the scope.
, define the target architecture value proposition, KPIs and identify and
mitigate all risks associated with the transformation efort.