Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam OG0-092 All Questions

View all questions & answers for the OG0-092 exam

Exam OG0-092 topic 1 question 29 discussion

Actual exam question from The Open Group's OG0-092
Question #: 29
Topic #: 1
[All OG0-092 Questions]

Scenario: Raxlon Inc.
Case Study Title (Case Study):
Raxlon Inc. is a Fortune 500 Company dealing in high value drugs and pharma products. Its annual turnover is over 120 billion $. It has more than 100,000 employees all over the globe in its R&D, Manufacturing and Marketing Units.
Raxlon's CEO, Dr Peter Fowles, is a pharmacology expert and has over 72 patents on various types of drugs mainly used for treating patients with genetic disorders. Raxlon is now moving into a suite of high end critical drug products used for Genetic Repair of congenital Diseases like Alzhmeir's disease and
Epilepsy. Rexlon has a well developed EA practice and in 2009 the EA practice has adopted TOGAF 9 as the primary Framework for Enterprise Architectural
Change Agent.
Dr Fowles' main concerns are:
Security of the critical data which they have gained over the years after painstaking research. Although Rexlon had an adequate security system Dr Fowles feels it may not be adequate to deal with the new order of things, especially with data which is highly confidential and if leaked would have major financial impact on the
Company.
Dr Fowles calls his CIO and explains his position to him and entrusts whim with the responsibly of evaluating the current security system, operation and governance and determine which are the gaps which need to be addressed during the fresh architectural work. Assume that a new Security Framework would be used in the ADM life cycle. To protect Rexlon's valuable IP.
The CIO apprises the Lead Architect of the sensitive nature of the work he has to complete within the next 2 months.
Identify which of the following processes would be most appropriate for the Lead Architect to adopt in this situation.

  • A. Identify the sources of threat, review the relevant security statutes, see how disaster recovery can be achieved, find who are the actors vis vis the system and design suitable access control mechanisms, identify critical data and applications and ensure that they are given the highest level of security
  • B. First revisit the Preliminary Phase to determine the tailoring of ADM vis a vis Security. Identify any change in the Principles or additions to be carried out. Engage with all Stakeholders to finalize the Vision. Then in Business, Information systems and Technology Architectures ensure the Security Frame work adopted to the ADM addresses all critical security issues. Finally conduct an overall review to assess how effective the security ecosystem designed is and whether it meets the security level desired
  • C. Invoke Preliminary Phase and Vision Phase Identify Sources of threat, review and determine revised regulatory, security and assumptions, document them get management buy in , develop business continuity plans especially for critical data operations, assure data, application and technological component security.
  • D. Determine who are the people who are hacking into similar organizations, ensure that highly secure measures are taken when external people enter the R&D and manufacturing locations, ensure that there is a very strong firewall so that people cannot get illicit entry into the system, periodically check the effectiveness of the security measures
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sanjepau
Highly Voted 3 years, 4 months ago
The answer is B, as it talks about the tailoring of the Architecture framework and incorporates the Security framework to make use of Enterprise Security Architecture in order to address security and risk properly. Moreover, it is clearly mentioned that a new Security framework should be used, and also there is no mention of time, so revisiting the Preliminary phase is not an issue.
upvoted 12 times
...
aaa111222
Highly Voted 4 years, 1 month ago
Answer A : This is Phase H, They already have an architecture with security component in place. CEO thinks they already have sufficient architecture. Here we have a new stakeholder (the Dr) he is the trigger to evaluate whether his concerns will kick off a new ADM cycle. So here we are evaluating his concerns. B and C are proceeding into new cycle without evaluating the new threat model..
upvoted 12 times
...
fanchvn
Most Recent 1 year, 8 months ago
Selected Answer: B
answer B
upvoted 1 times
...
Watad
1 year, 8 months ago
Selected Answer: B
I would go with B, since it's the most suitable TOGAF standard answer, but the worrying thing here is the 2 months period, hope it's only a distractor and not a factor in the answer
upvoted 2 times
...
panterarosa
2 years, 2 months ago
It says "Assume that a new Security Framework would be used in the ADM lifecycle to protect Rexlon's valuable IP." I do not see any answer other than B seeking to properly incorporate a new Security Framework in the existing ADM. The 2 months deadline worries me, though.
upvoted 2 times
...
mericov
2 years, 3 months ago
Selected Answer: B
Security Architecture and the ADM is TOGAF 9.1 chapter 21. Obsolete for 9.2
upvoted 2 times
...
scuzzy2010
3 years ago
A and D are out, neither of them are related to ADM or TOGAF. Answer is B.
upvoted 3 times
...
qinghe
3 years, 2 months ago
Should be B, how is disaster recovery or business continuity relevant for concerns of data leak?
upvoted 5 times
...
RoryGates
3 years, 4 months ago
Answer = B.
upvoted 2 times
...
sameersoftyhcl
3 years, 5 months ago
Answer A : Principle 9 : Protection of Intellectual Property
upvoted 2 times
...
tomvik
4 years, 4 months ago
Concerns : Security of data Needs to be completed in next 2 months
upvoted 2 times
tomvik
4 years, 4 months ago
Revisiting preliminary phase again will not be right approach as it needs more time.
upvoted 2 times
Victor6510
4 years, 2 months ago
However the requirement is "Assume that a new Security Framework would be used in the ADM life cycle" and CEO wants "evaluating the current security system, operation and governance and determine which are the gaps" A and D neither address these requirements nor follow ADM practice. The security framework is served as an add-on to existing tailored TOGAF instead of from scratch, and a Fortune 500 company at the scale is capable of leveraging external EA consulting capabilities to speed up the development.
upvoted 6 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...