New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The Open Group OG0-061 Exam - Topic 1 Question 13 Discussion

Actual exam question for The Open Group's OG0-061 exam
Question #: 13
Topic #: 1
[All OG0-061 Questions]

Which functional component within the Requirement to Deploy value stream produces the Logical Service Blueprint?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Toi
4 months ago
Pretty sure Build Package is not the right answer here.
upvoted 0 times
...
Amos
4 months ago
Surprised to see so many different opinions on this!
upvoted 0 times
...
Wendell
4 months ago
I always thought it was the Service Portfolio.
upvoted 0 times
...
Wenona
4 months ago
No way, it's Enterprise Architecture for sure!
upvoted 0 times
...
Susana
4 months ago
I think it's definitely Service Design.
upvoted 0 times
...
Ammie
5 months ago
I feel like the Service Portfolio might be involved, but I can't recall the specifics.
upvoted 0 times
...
Georgeanna
5 months ago
I remember a practice question about the Requirement to Deploy value stream, and I think Enterprise Architecture was mentioned there.
upvoted 0 times
...
Ben
5 months ago
I think the Logical Service Blueprint is related to Service Design, but I'm not entirely sure.
upvoted 0 times
...
Clarence
5 months ago
I’m leaning towards Build Package, but I remember some confusion about how it connects to the blueprint.
upvoted 0 times
...
Arlette
5 months ago
Okay, let me see. I remember from the DSDM training that the roles are meant to be flexible and shared, not rigidly assigned. So I think the best answer here is B - one role doesn't equal one person.
upvoted 0 times
...
Maile
5 months ago
I'm pretty sure the answer is B. PUT is used to modify configuration settings on the Cisco Meeting Server.
upvoted 0 times
...
Leontine
5 months ago
Wait, is TFTP really the best way to collect logs remotely? I feel like there might be more secure options. And hashing them - is that necessary or just extra work? I'm a bit confused on the best approach here.
upvoted 0 times
...
Margurite
5 months ago
I'm a bit confused by the wording of the question. Does the "but only if dst-addr is specified" part in option A mean something specific? I'll have to think about that one.
upvoted 0 times
...
Glendora
5 months ago
I remember practicing a similar question where missing the ipv4-unicast command changed the behavior, so I might lean towards option B.
upvoted 0 times
...

Save Cancel