Which one of the following classes of information within the Architecture Repository would typically contain a list of the applications in use within the enterprise?
Complete the sentence. Actions arising from the Business Transformation Readiness Assessment technique should be incorporated in the
Complete the following sentence. In the ADM, documents which are under development and have not undergone any formal review and approval process are called______ Documents which have been reviewed and approved are called ______
Exhibit
Consider the illustration showing an architecture development cycle Which description matches the phase of the ADM labeled as item 1?
When considering the scope of an architecture, what dimension considers to what level of detail the architecting effort should go?
What are the following activities part of?
. Risk classification
. Risk identification
. Initial risk assessment
Scenario
Your role is that of an Enterprise Architect, reporting to the Chief Enterprise Architect, at a technology company.
The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The Chief Technology Officer (CTO) is the sponsor of the activity. The EA practice uses an iterative approach for its architecture development. This has enabled the decision-makers to gain valuable insights into the different aspects of the business.
The nature of the business is such that the data and the information stored on the company systems is the company’s major asset and is highly confidential. The company employees travel a lot for work and need to communicate over public infrastructure. They use message encryption, secure internet connections using Virtual Private Networks (VPNs), and other standard security measures. The company has provided computer security awareness training for all its staff. However, despite good education and system security, there is still a need to rely on third-party suppliers for infrastructure and software.
The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education and support, the company could be a victim of a significant attack that could completely lock them out of their important data.
A risk assessment has been completed, and the company has looked for cyber insurance that covers ransomware. The price for this insurance is very high. The CTO recently saw a survey that said 1 out of 4 businesses that paid ransoms could not get their data back, and almost thesame number were able to recover the data without paying. The CTO has decided not to get cyber insurance to cover ransom payment.
You have been asked to describe the steps you would take to strengthen the current architecture to improve data protection.
Based on the TOGAF standard, which of the following is the best answer?
Please read this scenario prior to answering the question
You are serving as the Lead Architect for an Enterprise Architecture team within a leading multinational biotechnology company. The company works in three major industries, including healthcare, crop production, and agriculture. Your team works within the healthcare division.
The healthcare division is developing a new vaccine, and has to demonstrate its effectiveness and safety in a set of clinical trials that satisfy the regulatory requirements of the relevant health authorities. The clinical trials are undertaken by its research laboratories at multiple facilities worldwide. In addition to internal research and development activities, the healthcare division is also involved in publicly funded collaborative research projects with industrial and academic partners.
The Enterprise Architecture team has been engaged in an architecture project to develop a secure system that will allow the healthcare researchers to share information more easily about their clinical trials, and work more collaboratively across the organization and also with its partners. This system will also connect with external partners.
The Enterprise Architecture team uses the TOGAF ADM with extensions required to support healthcare manufacturing practices and laboratory practices. Due to the highly sensitive nature ofthe information that is managed, special care has been taken to ensure that each architecture domain considers the security and privacy issues that are relevant.
The Vice President for Worldwide Clinical Research is the sponsor of the Enterprise Architecture activity. She has stated that disruptions must be minimized for the clinical trials, and that the rollout must be undertaken incrementally.
Refer to the scenario
You have been asked to recommend the approach to identify the work packages for an incremental rollout meeting the requirements.
Based on the TOGAF standard which of the following is the best answer?
Please read this scenario prior to answering the question
You are working as an Enterprise Architect within a healthcare and life science company. The company is a
leading player in its industry, dedicated to transforming healthcare with new ideas and advancements. The
company has multiple divisions that cover different aspects of the business.
The company's Enterprise Architecture (EA) department has been operating for several years and has
mature, well-developed architecture governance and development processes following the TOGAF
Standard. In addition to the EA program, the company has a number of management frameworks in use.
The Architecture Board includes representatives from each division of the company.
Many of the company's rivals have begun utilizing Artificial Intelligence (Al) in their operations, and the
indications are that this will be transformative for healthcare delivery. This is something the EA department
has been interested in for a while, and they had recently submitted an architecture Change Request which
was approved. As a result, the CIO has approved a Request for Architecture Work to investigate the
implementation of Al in the company.
Areas for evaluation include:
How can staff use Al daily in their current role?
How Al can enhance access to care for patients, and how to make that experience seamless?
How Al can offer new workplace platforms and tools to increase efficiency?
Some of the top managers are worried about a change in the way of working, and if it will achieve the goals.
Many are not confident that the company's risk management processes are adequate for a company-wide
integration of generative Al. There are also questions from staff about whether enough specific guidelines
and polices have been put in place for responsible use of Al.
The Chief Information Officer (CIO) is the sponsor of the Enterprise Architecture program. The CIO has
actively encouraged architecting with agility within the EA department as her preferred approach for projects.
The CIO wants to know how to address these concerns and reduce risks.
Refer to the scenario
You have been tasked with starting the architecture development. How do you begin?
Based on the TOGAF standard which of the following is the best answer?
You are working as an Enterprise Architect within the Enterprise Architecture (EA) team at a healthcare and life sciences company. The EA team is developing a secure system for researchers to share clinical trial information easily across the organization and with external partners.
Due to the highly sensitive nature of the information, each architecture domain must consider privacy and safety concerns. The healthcare division has been directed to minimize disruptions to clinical trials while introducing the new system gradually.
How would you identify the work packages for introducing the new system? Based on the TOGAF standard, which of the following is the best answer?