New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The Open Group OGEA-103 Exam - Topic 13 Question 58 Discussion

Actual exam question for The Open Group's OGEA-103 exam
Question #: 58
Topic #: 13
[All OGEA-103 Questions]

Please read this scenario prior to answering the question

Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential.

The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software.

The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity.

The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets.

A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option.

Refer to the scenario

You have been asked to describe the steps you would take to improve the resilience of the current architecture?

Based on the TOGAF standard which of the following is the best answer?

Show Suggested Answer Hide Answer
Suggested Answer: A

Business continuity is the ability of an organization to maintain essential functions during and after a disaster or disruption. Business continuity requirements are the specifications and criteria that define the acceptable level of performance and availability of the business processes and services in the event of a disaster or disruption. A gap analysis is a technique that compares the current state of the architecture with the desired state, and identifies the gaps or differences that need to be addressed. A change request is a formal proposal for an amendment to some product or system, such as the architecture.A Request for Architecture Work is a document that describes the scope, approach, and expected outcomes of an architecture project123

The best answer is A, because it describes the steps that would improve the resilience of the current architecture, which is the ability to withstand and recover from a ransomware attack or any other disruption. The steps are:

Determine the business continuity requirements, which specify the minimum acceptable level of performance and availability of the business processes and services in case of a ransomware attack. This would involve identifying the critical business functions, the recovery time objectives, the recovery point objectives, and the dependencies and resources needed for recovery.

Undertake a gap analysis of the current Enterprise Architecture, which compares the current state of the architecture with the desired state based on the business continuity requirements. This would involve assessing the strengths and weaknesses of the current architecture, the risks and opportunities for improvement, and the gaps or differences that need to be addressed.

Make recommendations for change requirements to address the situation and create a change request. This would involve proposing solutions and alternatives to close the gaps, enhance the resilience, and mitigate the risks of the current architecture. The change request would document the rationale, scope, impact, and benefits of the proposed changes, and seek approval from the relevant stakeholders.

Manage a meeting of the Architecture Board to assess and approve the change request. The Architecture Board is a governance body that oversees the architecture work and ensures compliance with the architecture principles, standards, and goals. The meeting would involvepresenting the change request, discussing the pros and cons, resolving any issues or conflicts, and obtaining the approval or rejection of the change request.

Once approved, produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change. The Request for Architecture Work would describe the scope, approach, and expected outcomes of the architecture project that would implement the approved change request. The Request for Architecture Work would initiate a new cycle of the Architecture Development Method (ADM), which is the core process of the TOGAF standard that guides the development and management of the enterprise architecture.

1: The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 33: Business Scenarios2: The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 30: Gap Analysis3: The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 31: Architecture Change Management : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 7: Request for Architecture Work : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 34: Business Transformation Readiness Assessment : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 30: Gap Analysis : The TOGAF Standard, Version 9.2, Part III: ADM Guidelines and Techniques, Chapter 31: Architecture Change Management : The TOGAF Standard, Version 9.2, Part VI: Architecture Capability Framework, Chapter 50: Architecture Governance : The TOGAF Standard, Version 9.2, Part II: Architecture Development Method (ADM), Chapter 7: Request for Architecture Work


Contribute your Thoughts:

0/2000 characters
Audry
5 days ago
I'm a bit unsure about the specific steps to enhance resilience. I think it involves both technical and organizational measures, but I can't recall the exact TOGAF phases we should focus on.
upvoted 0 times
...
Raina
10 days ago
I remember we discussed the importance of risk management in TOGAF, especially in the context of identifying vulnerabilities in the architecture.
upvoted 0 times
...
Chanel
15 days ago
I'm feeling a bit overwhelmed by this one, to be honest. There's a lot to consider, from the sensitive data to the ransomware threat. I know the TOGAF framework is important, but I'm not sure exactly how to apply it in this scenario. I'll need to do some more research and maybe even consult with the security team to make sure I'm on the right track.
upvoted 0 times
...
Zona
20 days ago
This is right up my alley! As a senior architect, I'd start by conducting a comprehensive risk assessment to understand the company's vulnerabilities. From there, I'd develop a multi-layered security strategy that combines technical controls, incident response planning, and employee education. The TOGAF standard will be my guide every step of the way.
upvoted 0 times
...
Elvera
25 days ago
Okay, I've got some ideas here. First, I'd want to review the current security controls and identify any gaps or weaknesses. Then I'd look at ways to improve backup and recovery capabilities, so the company can bounce back quickly from an attack. And of course, ongoing security awareness training for all employees is crucial.
upvoted 0 times
...
Mi
1 month ago
Hmm, this is a tricky one. We need to be really thorough in our approach, given the sensitive nature of the data and the increasing ransomware threat. I'm not sure exactly where to start, but I'll need to carefully review the TOGAF framework and see what guidance it provides for this type of scenario.
upvoted 0 times
...
Deeann
1 month ago
I think the key here is to focus on improving the overall resilience of the architecture, as the scenario suggests. The TOGAF standard would likely guide us to assess the current state, identify vulnerabilities, and develop a plan to enhance security and recoverability.
upvoted 0 times
...

Save Cancel