New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The Open Group OG0-093 Exam - Topic 1 Question 40 Discussion

Actual exam question for The Open Group's OG0-093 exam
Question #: 40
Topic #: 1
[All OG0-093 Questions]

Scenario

Please read this scenario prior to answering the Question

You have been appointed as a consultant to the Chief Enterprise Architect of a multinational corporation. The corporation has over 100,000 employees and is organized into 10 divisions with operation in over 60 countries and products sold in over 125 countries. It has major research sites at 8 locations worldwide.

The operations of the corporation are subject to legal and regulatory requirements for each country where they operate. The production of its products has governmental controls that are strictly enforced and compliance is critical. Recently a competitor was heavily fined for violating the regulations in a country where it was conducting a trial for a new product.

The Enterprise Architecture group within the company has been engaged in an architecture development system that will allow researchers at its product development laboratories worldwide to share information about their clinical trials. This system will also connect with external partners.

The Enterprise Architecture group is a mature organization. They use the TOGAF ADM with extensions required to support the manufacturing practices and laboratory practices of their target markets. Due to the highly sensitive nature of the information that is managed, special care was taken to ensure that each architecture domain included an examination of the security, regulatory and privacy issues that are relevant.

The Executive Vice President for Clinical Research is the sponsor of the Enterprise Architecture activity. She has stated that the changes to the Enterprise Architecture for the new system will need to be rolled out on a geographic basis that will minimize disruptions to ongoing clinical trials. The work will need to be done in stages and rolled out in geographical regions.

Refer to the Scenario

You have been asked to recommend the approach to identify the work packages that will be included in the Transition Architecture (s)

Based on the TOGAF standard, which of the following is the best answer?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Nickolas
4 months ago
Definitely need to prioritize regulatory compliance in any approach!
upvoted 0 times
...
Holley
4 months ago
Surprised that D suggests a state evolution table, is that really necessary?
upvoted 0 times
...
Devon
4 months ago
C seems comprehensive, but is it too complex for a rollout?
upvoted 0 times
...
Carmela
4 months ago
I think B is better, focusing on cost-effectiveness is key!
upvoted 0 times
...
Alfreda
4 months ago
A Consolidated Gaps, Solutions and Dependencies Matrix sounds solid for planning.
upvoted 0 times
...
Deeann
5 months ago
I recall that sequencing the work packages is crucial, but I wonder if using a state evolution table is really necessary for this scenario.
upvoted 0 times
...
Gilbert
5 months ago
I feel like option C makes sense because it emphasizes documenting factors impacting the implementation, but I'm a bit confused about how to prioritize the gaps.
upvoted 0 times
...
Katy
5 months ago
I think we practiced a similar question where we had to identify work packages, and I remember that using a CRUD matrix was mentioned as a good strategy.
upvoted 0 times
...
Bev
5 months ago
I remember discussing the importance of the Consolidated Gaps, Solutions and Dependencies Matrix in class, but I'm not sure if it's the best approach here.
upvoted 0 times
...
Devorah
5 months ago
Okay, let's think this through. The question says the client is IPv6, so it makes sense that the DNS request would be for an AAAA record to get the IPv6 address for the server. I'm pretty confident that's the right answer.
upvoted 0 times
...
Bette
5 months ago
I'm a bit confused by the wording of this question. I'll need to re-read it a few times to make sure I understand what it's asking before I select an answer.
upvoted 0 times
...
Chau
5 months ago
I'm pretty sure this is about authentication - verifying someone's identity. That's the key security management term here.
upvoted 0 times
...

Save Cancel