New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The Open Group OG0-092 Exam - Topic 2 Question 19 Discussion

Actual exam question for The Open Group's OG0-092 exam
Question #: 19
Topic #: 2
[All OG0-092 Questions]

Carter Woods, a global furniture firm, wants to improve the efficiency of its sales force by replacing their legacy configuration and ordering systems based on manual and paper based processes with an online ordering platform.

Carter Woods uses the Architecture Delivery Method from TOGAF 9. The CIO sponsored this activity and the Baseline Architecture was defined on the initial iteration defining: approach, scope and architectural vision including a set of architecture principles related to the Data domain:

Data is an asset.

Data is shared.

Data is accessible.

A set of aspects to clarify arose from the business analysis from the assumption to replace the legacy systems with an online centralized one. These main concerns are:

* To identify the changes to existing business processes.

* To identify the data entities that can be shared among the sales agents.

* To clarify how to keep the data secured.

* To identify the list of non-sales application to be integrated with the sales applications

Refer to the scenario above

You, as Lead Enterprise Architect, need to identify the most appropriate architecture viewpoints to address the concerns above mentioned.

Choose one of the following answers

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Buck
4 months ago
Surprised that no one mentioned integration challenges with non-sales apps!
upvoted 0 times
...
Devora
4 months ago
Really? A Data Migration diagram? That seems off for this scenario.
upvoted 0 times
...
Janna
4 months ago
I agree with A, it covers everything we need!
upvoted 0 times
...
Dona
4 months ago
I think D is better for focusing on security aspects.
upvoted 0 times
...
Venita
4 months ago
Option A seems the most comprehensive for addressing all concerns.
upvoted 0 times
...
Quentin
5 months ago
I’m leaning towards option D because it combines both the Role catalog and the Data Security diagram, which seems to address the concerns well.
upvoted 0 times
...
Jules
5 months ago
I think the System/Data matrix is crucial for identifying shared data entities, but I can't recall if we covered how to secure that data effectively.
upvoted 0 times
...
Val
5 months ago
I remember we discussed the importance of using a Role catalog in Business Architecture, but I'm not sure if that's enough for this scenario.
upvoted 0 times
...
Angella
5 months ago
The Application Interaction matrix sounds familiar, but I feel like we practiced more with the Interface catalog. I wonder which one is more relevant here.
upvoted 0 times
...
Lawrence
5 months ago
The shared-tenant model is probably the most likely choice for cost savings, as it allows the administrator to spread the costs across multiple tenants.
upvoted 0 times
...
Evan
5 months ago
I have a vague recollection of something about Federated Authentication Services… maybe it was the user's certificate involved in that process?
upvoted 0 times
...
Blondell
5 months ago
I recall the 'contract last' approach from our studies, but isn't that risky if issues arise after deployment? It feels like it just delays the conflicts.
upvoted 0 times
...
Lavonne
5 months ago
Wait, what's the difference between a system utility program and generalized audit software? I'm a bit confused on those two choices.
upvoted 0 times
...

Save Cancel