The Open Group OGEA-103 Practice Exams
Last updated on Mar 31,2025- Exam Code: OGEA-103
- Exam Name: TOGAF Enterprise Architecture Combined Part 1 and Part 2 Exam
- Certification Provider: The Open Group
- Latest update: Mar 31,2025
Consider the image showing basic architectural concepts.
What are items A and B?
- A . A-Architecture Viewpoint, B-Architecture View
- B . A-Architecture Board, B-Architecture Capability
- C . A-Candidate Architecture, B-Trade-off
- D . A-Requirement. B-Candidate Architecture
Which of the following describes how the Enterprise Continuum is used when developing an enterprise architecture?
- A . To identify and understand business requirements
- B . To coordinate with the other management frameworks in use
- C . To describe how an architecture addresses stakeholder concerns
- D . To classify architecture and solution assets
Please read this scenario prior to answering the question
Your role is that of a senior architect, reporting to the Chief Enterprise Architect, at a medium-sized company with 400 employees. The nature of the business is such that the data and the information stored on the company systems is their major asset and is highly confidential.
The company employees travel extensively for work and must communicate over public infrastructure using message encryption, VPNs, and other standard safeguards. The company has invested in cybersecurity awareness training for all its staff. However, it is recognized that even with good education as well as system security, there is a dependency on third-parly suppliers of infrastructure and software.
The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The CTO is the sponsor of the activity.
The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, it is likely just a matter of time before the company suffers a significant attack that could completely lock them out of their information assets.
A risk assessment has been done and the company has sought cyber insurance that includes ransomware coverage. The quotation for this insurance is hugely expensive. The CTO has recently read a survey that stated that one in four organizations paying ransoms were still unable to recover their data, while nearly as many were able to recover the data without paying a ransom. The CTO has concluded that taking out cyber insurance in case they need to pay a ransom is not an option.
Refer to the scenario
You have been asked to describe the steps you would take to improve the resilience of the current architecture?
Based on the TOGAF standard which of the following is the best answer?
- A . You would determine business continuity requirements, and undertake a gap analysis of the current Enterprise Architecture. You would make recommendations for change requirements to address the situation and create a change request. You would manage a meeting of the Architecture Board to assess and approve the change request. Once approved you would produce a new Request for Architecture Work to activate an ADM cycle to carry out a project to define the change.
- B . You would monitor for technology changes from your existing suppliers that could improve resilience. You would prepare and run a disaster recovery planning exercise for a ransomware attack and analyze the performance of the current Enterprise Architecture. Using the findings, you would prepare a gap analysis of the current Enterprise Architecture. You would prepare change requests to address identified gaps. You would add the changes implemented to the Architecture Repository.
- C . You would ensure that the company has in place up-to-date processes for managing change to the current Enterprise Architecture. Based on the scope of the concerns raised you recommend that this be managed at the infrastructure level. Changes should be made to the baseline description of the Technology Architecture. The changes should be approved by the Architecture Board and implemented by change management techniques.
- D . You would request an Architecture Compliance Review with the scope to examine the company’s resilience to ransomware attacks. You would identify the departments involved and have them nominate representatives. You would then tailor checklists to address the requirement for increased resilience. You would circulate to the nominated representatives for them to complete. You would then review the completed checklists, identifying and resolving issues. You would then determine and present your recommendations.
What are the following activities part of?
. Risk classification
. Risk identification
. Initial risk assessment
- A . Security Architecture
- B . Phase A
- C . Phase G
- D . Risk Management
Consider the following ADM phases objectives.
Which phase does each objective match?
- A . 1C-2B-3A-4C
- B . 1A-2B-3C-4D
- C . 1B-2D-3A-4C
- D . 1C-2D-3B-4A
Consider the following ADM phases objectives.
Which phase does each objective match?
- A . 1C-2B-3A-4C
- B . 1A-2B-3C-4D
- C . 1B-2D-3A-4C
- D . 1C-2D-3B-4A
You are working as an Enterprise Architect within an Enterprise Architecture (EA) team at a large government agency with multiple divisions. The agency has a well-established EA practice and follows the TOGAF standard as its method for architecture development. The government has mandated that the agency prepare for an "AI-first" world.
The agency wants to determine the impact and role of AI in its future services. The CIO has approved a Request for Architecture Work to explore the use of AI in services. Some leaders are concerned about reliance on AI, security, and employees’ need to acquire new skills.
The EA team leader seeks suggestions on managing the risks associated with a new architecture for the AI-first project. Based on the TOGAF standard, which of the following is the best answer?
- A . Conduct an analysis of stakeholders, documenting their concerns and recording them in the Architecture Vision document. Risks should be recorded in the Architecture Requirements Specification and reviewed regularly.
- B . Identify key stakeholders and develop a Communication Plan that addresses their needs. Ensure the architecture addresses risk management and summarizes features of the architecture.
- C . Separate stakeholders into groups and categorize them. Develop models for each group and verify that their concerns are addressed in Phase G, Implementation Governance.
- D . Create an organization map to show the links between different agency parts. Hold a meeting to teach stakeholders to interpret the models. Manage risks as part of Security Architecture development.
Complete the sentence. The four purposes that typically frame the planning horizon, depth and breadth of an Architecture Project, and the contents of the EA Repository are Strategy, Portfolio,
- A . Project, and Solution Delivery.
- B . Subordinate, and Superior Architecture.
- C . Discreet, and Cohesive.
- D . Segment, and End-to-end Target Architecture.
Exhibit
Consider the illustration showing an architecture development cycle.
Which description matches the phase of the ADM labeled as item 2?
- A . Conducts implementation planning for the architecture defined in previous phases
- B . Establishes procedures for managing change to the new architecture
- C . Operates the process of managing architecture requirements
- D . Provides architectural oversight for the implementation
Which of the following best describes a purpose of the Gap Analysis technique?
- A . To validate non-functional requirements
- B . To establish quality metrics for the architecture
- C . To determine service levels for the architecture
- D . To identify missing functions