Buy The Open Group OG0-092 Dumps With 3 Month Free Updates By Realexamdumps


Vicky114

Uploaded on Nov 15, 2019

Category Education

Don’t get worried if you are not having a suitable study material because now you can download OG0-092 dumps pdf from Realexamdumps. This study guide has been designed by experts especially for the preparation of OG0-092 exam. You need to put your full attention on the questions and answers in this guide and make your sincere effort. Even if you are not having background knowledge of the field you will get your best possible result. One more benefit of using OG0-092 study material is that you will get experts’ supervision which will lead you to a definite success. You don’t need to worry for the payment because that will be secured through money back guarantee. For More Info:https://www.realexamdumps.com/the-open-group/og0-092-practice-test.html

Category Education

Comments

                     

Buy The Open Group OG0-092 Dumps With 3 Month Free Updates By Realexamdumps

The Open Group OG0-092 Dumps PDF TOGAF 9 Part 2 For More Info: https://www.realexamdumps.com/the-open-group/og0-092-practice-test.html Question No : 1 Scenario: Raxlon Inc. Case Study Title (Case Study): Raxlon Inc. is a Fortune 500 Company dealing in high value drugs and pharma products. Its annual turnover is over 120 billion $. It has more than 100,000 employees all over the globe in its R&D, Manufacturing and Marketing Units. Raxlon’s CEO, Dr Peter Fowles, is a pharmacology expert and has over 72 patents on various types of drugs mainly used for treating patients with genetic disorders. Raxlon is now moving into a suite of high end critical drug products used for Genetic Repair of congenital Diseases like Alzhmeir’s disease and Epilepsy. Rexlon has a well developed EA practice and in 2009 the EA practice has adopted TOGAF 9 as the primary Framework for Enterprise Architectural Change Agent. Dr Fowles’ main concerns are: Security of the critical data which they have gained over the years after painstaking research. Although Rexlon had an adequate security system Dr Fowles feels it may not be adequate to deal with the new order of things, especially with data which is highly confidential and if leaked would have major financial impact on the Company. Dr Fowles calls his CIO and explains his position to him and entrusts whim with the responsibly of evaluating the current security system, operation and governance and determine which are the gaps which need to be addressed during the fresh architectural work. Assume that a new Security Framework would be used in the ADM life cycle. To protect Rexlon’s valuable IP. The CIO apprises the Lead Architect of the sensitive nature of the work he has to complete within the next 2 months. Identify which of the following processes would be most appropriate for the Lead Architect to adopt in this situation. A. Identify the sources of threat, review the relevant security statutes, see how disaster recovery can be achieved, find who are the actors vis vis the system and design suitable access control mechanisms, identify critical data and applications and ensure that they are given the highest level of security B. First revisit the Preliminary Phase to determine the tailoring of ADM vis a vis Security. Identify any change in the Principles or additions to be carried out. Engage with all Stakeholders to finalize the Vision. Then in Business, Information systems and Technology Architectures ensure the Security Frame work adopted to the ADM addresses all critical security issues. Finally conduct an overall review to assess how effective the security 2 ecosystem designed is and whether it meets the security level desired C. Invoke Preliminary Phase and Vision Phase Identify Sources of threat, review and determine revised regulatory, security and assumptions, document them get management buy in , develop business continuity plans especially for critical data operations, assure data, application and technological component security. D. Determine who are the people who are hacking into similar organizations, ensure that highly secure measures are taken when external people enter the R&D and manufacturing locations, ensure that there is a very strong firewall so that people cannot get illicit entry into the system, periodically check the effectiveness of the security measures Answer: A Question No : 2 Worldwide Mobile is a mobile telecommunications company formed through a series of mergers and acquisitions. They are yet to fully integrate the customer service systems for the most recent acquisitions, and as result, customer service has been a major concern for the Chief Technology Officer. Results for the last two quarters have shown that Average Revenue Per User (ARPU) and the customer retention (Churn) rate have fallen below the industry average. The Corporate Marketing group has published some new finding about customer satisfaction. The customers appear to be switching to Air Light, a competitor, because of superior customer service. WorldwideMobile actually has better coverage in nearly all markets than Air Light, and good roaming agreement that keep rates low for business travellers. But customer satisfaction has remained low. The Business Strategy group and the Enterprise Architecture group have conducted a high-level project to develop the enterprise-wide strategic plan. They have developed a business scenario which contains a good conceptual model of what needs to be done and also identifies the key requirements. This was used in preparing the proposal presented to the Executive Council and the Corporate Board. The planning for the program has been underway for several months. WorldwideMobile has selected TOGAF 9 as the basis for its Enterprise Architecture. The Corporate Board has approved funding for a multi-million Euro conversion to transition to a packaged Customer Service System. It is anticipated that the overall program will take five years to complete, but there are some tactical projects that can commence immediately to address the situation. The Executive Council has stated that the program should define specific initiatives to enable each regional business units to create an implementation of the Customer Service System. The implementation must meet the needs of the business unit and still provide the information needed to enable major improvements 3 to the customer. Refer to WorldwideMobile-2 Scenario You are serving as the Lead Architect for the Performance and Integrity project of the Customer Service System program. The project has been chartered to address the architecture(s) required to support the Customer Service System from an infrastructure perspective. At present time, the project team is conducting an architecture development project that is focused on the customer self service capability, which was defined as part of the earlier strategic planning activities. This capability will enable customers to access their accounts, pay bills, request account reviews, and provision services from any web-enabled device. The project team has gathered information about the self-service capability, developed a business scenario, and used the results to define an Architecture Vision for achieving the capability. You have been asked to recommend the course of action to complete the project. Based on TOGAF 9, which of the following is best answer? A. In the remaining architecture definition phases, the project team should map out the capability in the Technology domain. In the Phases E and F, the capability should be broken down into a set of Solution Building Blocks that define the Target Architecture. Where possible, the Solution Building Blocks should be drawn from the Architecture Repository. The completed Architecture Definition Document and the Implementation and Migration Plan will be submitted for approval. Upon approval, the architecture team will conduct Compliance Assessments to ensure that the Target Architecture is properly implemented. B. In the remaining architecture definition phases, the project team should map out the capability across the Business, Information System and Technology domains. In the Phases E and F, the capability should be broken down into a set of increments that are sequenced into Transition Architectures that will lead to the realization of the Target Architecture. The resulting Solution Building Blocks will then provide the basis for the capability increment solutions. The complete Architecture Definition Document and the Implementation and Migration Plan will be submitted for approval. Upon approval, the architecture team will oversee the implementation process through monitoring Architecture Contracts and by conduction Compliance Assessments. C. In the remaining architecture definition phases, the project team should map out the capability across the Business, Information System and Technology domains. In the Phases E and F, the capability should be broken down into a set of increments that defines the Target Architecture. The Solution Building Blocks will provide the basis for the capability increment solutions. The complete Architecture Definition Document and the Implementation and Migration Plan will be submitted for approval. Upon approval, the architecture team will oversee the implementation process through monitoring Architecture 4 Contracts and by conducting Compliance Assessments. D. The remaining architecture definition work should be focused on mapping out the technology and infrastructure capability in the Technology domain. In Phases E and F, the capability should be broken down into a set of Solution Building Blocks that will be implemented to realize the Target Architecture. The Solution Building Blocks will provide the basis for the completed Architecture Definition Document that will be submitted for approval. Upon approval, the implementation team will conduct Compliance Assessments to ensure that the self-service capability is compliant with the overall Enterprise Architecture. Answer: B Question No : 3 Carter Woods, a global furniture firm, wants to improve the efficiency of its sales force by replacing their legacy configuration and ordering systems based on manual and paper based processes with an online ordering platform. Carter Woods uses the Architecture Delivery Method from TOGAF 9. The CIO sponsored this activity and the Baseline Architecture was defined on the initial iteration defining: approach, scope and architectural vision including a set of architecture principles related to the Data domain: Data is an asset. Data is shared. Data is accessible. A set of aspects to clarify arose from the business analysis from the assumption to replace the legacy systems with an online centralized one. These main concerns are: · To identify the changes to existing business processes. · To identify the data entities that can be shared among the sales agents. · To clarify how to keep the data secured. · To identify the list of non-sales application to be integrated with the sales applications Refer to the scenario above You, as Lead Enterprise Architect, need to identify the most appropriate architecture viewpoints to address the concerns above mentioned. Choose one of the following answers 5 A. Depict the Business Architecture using a Role catalog and a Process/Event/Control/Product catalog. Depict the Data Architecture using a System/Data matrix, a Data Entity/Data Component catalog and Data Security diagram. Depict the Application Architecture using an Interface catalog. Define the Technology Architecture via a Network Computing/Hardware diagram. B. Depict the Business Architecture using a Business Interaction matrix and a Location catalog. Depict the Data Architecture using a Data Lifecycle diagram and a Data Migration diagram. Depict the Application Architecture using a Software Engineering diagram. Depict the Technology Architecture using a Communications Engineering diagram. C. Depict the Business Architecture using a Business Footprint diagram and a Location catalog. Depict the Data Architecture using a Data Migration diagram, System/Data matrix and Data Lifecycle diagram. Depict the Application Architecture using an Application Communication diagram. Depict the Technology Architecture using a Network Computing/Hardware diagram. D. Depict the Business Architecture using a Role catalog and Location catalog. Depict the Data Architecture using a System/Data matrix, Data Entity/Business Function matrix and Data Security diagram. Depict the Application Architecture using an Application Interaction matrix. Define the Technology Architecture via a Network Computing/Hardware diagram. Answer: A Question No : 4 Scenario: Vittronics Ltd. Please read this scenario prior to answering the question Vittronics Ltd. is a leading medical device manufacturer in the highly competitive market for Migraine Headache Pain Management (MHPM) devices. These tiny wireless devices are implanted in the brain and can deliver a precise electric shock when the wearable Pain Control Unit (PCU) detects an increase in stress induced by the onset of a migraine headache. This technology will be a breakthrough in the treatment of this condition, and several competitors are striving to be the first to introduce a product into the market. However, all of them must demonstrate the effectiveness and safety of their products in a set of clinical trials that will satisfy the regulatory requirements of the countries in the target markets. The Enterprise Architecture group at Vittronics has been engaged in an architecture development project to create a Secure Private Immersive Collaborative Environment (SPICE) that will allow researchers at its product development laboratories worldwide to 6 share information about their independent clinical trials. The Vittronics Enterprise Architecture group is a mature organization that has been utilizing TOGAF for several years. They have recently upgraded to TOGAF 9. The Vittronics Architecture Development Method (VADM) is strictly based on the TOGAF 9 Architecture Development Method (ADM) with extensions required to support current good manufacturing practices and good laboratory practices in their target markets. The SPICE project team has now completed the Business, Information Systems, and Technology Architecture phases and has produced a complete set of deliverables for each phase. Due to the highly sensitive nature of the information that is managed in SPICE, special care was taken to ensure that each architecture domain included an examination of the security and privacy issues that are relevant for each domain. A corresponding SPICE Security Architecture has been defined. The Executive Vice President for Clinical Research is the sponsor of the Enterprise Architecture activity. Refer to the Vittronics Ltd Scenario: You are serving as the Lead Architect for the SPICE project team. As required by TOGAF, the SPICE project team res completed a Business Transformation Readiness Assessment in Phase A (Architecture Vision). In that assessment, it was determined that there are risks associated with the adoption of the Immersive Collaborative Environment. Despite a clear expression of the vision and the business need for utilizing SPICE to accelerate the clinical trials, the researchers have been resisting the change because of concerns about safeguarding individually identifiable information about the subjects who were participating in the trials. You have been asked to recommend how this situation be managed in the implementation planning phases. Based on TOGAF 9, which of the following is the best answer? A. You decide that in Phase E, the team creates an overall solutions strategy that can guide the Target Architecture implementation and structure the Transition Architectures. You check that there is consensus before proceeding. B. You decide to return to Phase A, where the team should brainstorm a technical solution that mitigates the residual risks presented by the privacy issue. Then, during Phase D, you will direct the team to develop an Architecture Building Block to manage the security risks. 7 After that, the team should select Solution Building Blocks that mitigate all of the identified risks and revise the Requirements Impact Statement to reflect the changes to the high-level solutions strategy and migration plan. C. You decide that in Phase E, the team review the Business Transformation Readiness Assessment and identify, classify, and mitigate the risks associated with the identified readiness factors. If the risks can be satisfactorily mitigated, then you would continue to define a high-level solutions strategy that includes the Transition Architectures needed to make the change culturally and technically feasible. D. You decide that in Phase E, the team determines an approach to implementing an overall strategic direction that will address and mitigate the risks identified. Answer: B Question No : 5 Chiamin Metals is a leading world-wide manufacturer for continuous casting and bottom pouring powders. In addition to mould powders, the company also produces cored wire for secondary metallurgy. Chiamin Metals offers a variety of products and uses a paper-based catalog to sponsor them. A new CIO has joint the enterprise and has set up a team of Enterprise Architects following the TOGAF 9 practice. The main challenge is now to offer to Chiamin Metals customers a centralized and reliable entry point for their request via the implementation of a global online portal. This will allow the management of new marketing activities and will enable the new Chiamin Metals' ecommerce service. Refer to the scenario above You are the Chief Architect and the CIO asked you to present an Architecture Vision to address the above business problem. Identify the best answer accordingly to the TOGAF 9. Choose one of the following answers A. You identify key stakeholders, their concerns, and define the key business requirements to be addressed in the architecture engagement and generate a Stakeholder Map. You Evaluate business capabilities and execute a Business Transformation Readiness Assessment. You apply the Business Scenarios technique to create a high-level view of the Baseline and Target Architectures also based on the stakeholder concerns, business capability requirements, scope, constraints, and principles. B. As requested by the CIO you focus on the Architecture Vision documentation and apply the Business Scenarios technique to create a high-level view of the Baseline and Target Architectures also based on the stakeholder concerns, business capability requirements, scope, constraints, and principles. C. You create a high-level view of the Target Architectures and then present them to the CIO. 8 D. As requested by the CIO you focus on the Architecture Vision and create a detailed view of the Baseline Architectures. This is done for Business, Data, Application and Technology domains and then presented to the CIO using the Architecture Definition Document. Answer: A Question No : 6 Scenario: AGEX Inc. Please read this scenario prior to answering the question AGEX is a large, global commodities trading company which has been growing rapidly through a series of acquisitions. Each new business is performing well in its markets. However, the lack of integration between headquarters and the business units has increasingly caused problems in the handling of customer and financial information. The inability to share information across businesses has resulted in lost opportunities to "leverage the synergies" that had been intended when the businesses were acquired. At present, each business unit maintains its own applications. Despite an earlier initiative to install a common application to manage customer, products, supplier, and inventory information, each business unit has different ways of defining each of these core elements and has customized the common application to the point where the ability to exchange information is difficult, costly, and error-prone. As a result, AGEX has begun implementing a single Enterprise Resource Planning (ERP) system to consolidate information from several applications that exist across the lines of business. The Corporate Board is concerned that the new ERP system must be able to manage and safeguard customer information in a manner that meets or exceeds the legal requirements of the countries in which the company operates. This will be an increasingly important capability as the company expands its online services offered to clients and trading partners. The CIO has formed an Enterprise Architecture department, and one of the primary goals in its charter is to coordinate efforts between the ERP implementation team and the business unit personnel who will be involved in the migration process. The CIO has also formed a cross-functional Architecture Review Board to oversee and govern the architecture. After reviewing the available alternatives, and based on recommendations from the ERP 9 vendor, AGEX has selected TOGAF 9 as the basis for its Enterprise Architecture program. The CIO has endorsed this choice with the full support of top management. Refer to the AGEX Inc. Scenario You are serving as the Chief Architect. You have been asked to recommend the approach to take in the Preliminary Phase to ensure that the Corporate Board's concern is addressed. Based en TOGAF 9, which of the following is the best answer? A. You evaluate the implications of the Board's concern in terms of regulatory and security policy requirements. You then update the AGEX security policy to reflect the concern, ensuring that this policy is communicated across the organization. You allocate a security architecture team to ensure that security considerations are included in ongoing architecture planning. You then assess the security implications and agreements within the AGEX businesses and their suppliers. B. You evaluate the implications of the Board's concern in terms of regulatory requirements and their impact on business goals and objectives. Based on this understanding, you then issue a Request for Architecture Work to commence an architecture development project to develop a solution that will address the Board's concern. You allocate a security architect to oversee the implementation of the solution in the ERP system that is being developed. C. You start by clarifying the intent that the Board has for raising this concern. This enables you to understand the implications of the concern in terms of regulatory requirements and the potential impact on current business goals and objectives. You propose that a security architect or security architecture team be allocated to develop comprehensive security architecture. D. You evaluate the implications of the Board's concern by examining the potential impacts on business goals and objectives. Based on your understanding, you then update the current AGEX security policy to include an emphasis on the Board's concern. In addition, you allocate a security architect to ensure that security considerations are included in the architecture planning for all domains. Answer: A Question No : 7 10 Scenario: Rollins Manufacturing Please read this scenario prior to answering the question Rollins Manufacturing is a major supplier in the automotive industry, headquartered in Cleveland, Ohio with manufacturing plants in Chicago, Sao Paulo, Stuttgart, Yokohama, and Seoul. Each of these plants has been operating its own Manufacturing Requirements Planning (MRPII) system, production scheduling, and custom developed applications that drive the automated production equipment at each plant. Rollins is implementing lean manufacturing principles to minimize waste and improve the efficiency of all of its production operations. During a recent exercise held for internal quality improvement, it was determined that a significant reduction in process waste could be achieved by replacing the current MRPII and scheduling systems with a common Enterprise Resource Planning (ERP) system located in the Cleveland data center. This central system would provide support to each of the plants replacing the functionality in the existing systems. It would also eliminate the need for full data centers at each of the plant facilities. A reduced number of IT staff could support the remaining applications. In some cases, a third-party contractor could provide those staff. The Rollins Enterprise Architecture department has been operating for several years and has mature, well-developed architecture governance and development processes that are strongly based on TOGAF 9.At a recent meeting, the Architecture Review Board approved a Request for Architecture Work from the Chief Engineer of Global Manufacturing Operations who is the project sponsor. The request covered the initial architectural investigations and the development of a comprehensive architecture to plan the transformation. The Common ERP Deployment architecture project team has now been formed, and the project team has been asked to develop an Architecture Vision that will achieve the desired outcomes and benefits. Some of the plant managers have expressed concern about the security and reliability of driving their MRPII and production scheduling from a central system located in Cleveland. The Chief Engineer wants to know how these concerns can be addressed. Refer to the Rollins Manufacturing Scenario You are serving as the Lead Enterprise Architect of the newly-formed Common ERP Deployment architecture project team. As the Common ERP Deployment architecture project team assembles for its initial meeting, many of the participants have voiced concerns about the sweeping scope of the 11 initiative. Others are confident that they know a solution that will work. During the meeting, a number of alternative recommendations for how to proceed are put forward by members of the team. You have been asked to select the most appropriate recommendation to ensure that the team evaluates different approaches to the problem and clarifies the requirements for the architecture. Based on TOGAF 9, which of the following is the best answer? A. The team should hold a series of interviews at each of the manufacturing plants using the business scenario technique. This will then enable them to identify and document the characteristics of the architecture from the business requirements. B. The team should exercise due diligence and carefully research vendor literature and conduct a series of briefings with vendors that are on the current approved supplier list. Based on the findings from the research, the team should define a preliminary target Architecture Vision. The team should then use that model to build consensus among the key stakeholders. C. The team should create Baseline and Target Architectures for each of the manufacturing plants. A gap analysis between the architectures will then validate the approach, and determine the Transition Architecture needed to achieve the target state. D. The team should conduct a pilot project that will enable vendors on the short list to demonstrate potential solutions that will access the concerns of the stakeholders. Based on the findings of that pilot project, a complete set of requirements can be developed that will arrive the evolution of the architecture. Answer: A Question No : 8 ARTI Dimensioning is a multinational that operates production facilities in 29 countries and sells its products in over 120 countries. A consultancy firm has recommended a realignment that will enhance sharing of product information across business units. The implementation of this strategic realignment will require the development of integrated customer information systems and product information systems. ARTI has a mature enterprise architecture practice and uses TOGAF 9 for the basis of the ARTI Architecture Framework (method and deliverables). The CIO is sponsoring an architecture development program that is going to start. The CIO is concerned about a potential disruptive result to the business of this activity and before proceeding with the architecture development he asked to evaluate the impacts on the company business. 12 Refer to the scenario above You are the Lead Architect and you have been asked to recommend an approach to address the concerns raised. Based on TOGAF 9 recommend which of the following is the best answer. Choose one of the following answers. A. Risk Aversion Assessment should be conducted during the Implementation Governance phase to determine the degree of risk aversion of the proposed business transformation. After sharing the residual level of risk with the company chairman and the residual risk is not accepted, a set of parallel systems will be implemented to mitigate the risks. B. Your recommendation is to use risk management techniques to assess the risks associated with the proposed business transformation and ensure the existence of business continuity plans. During the Implementation Governance phase you conduct a residual risk assessment to manage risks that cannot be mitigated. C. During the Architecture Vision phase a risk assessment is conducted to mitigate initial risks and address those in the Architecture Contract signed in the Implementation Governance phase. D. Your proposal is to utilize a risk management framework during the Implementation Governance phase to verify the risks associated with the proposed transformation of the business. You then share with the concerned stakeholders the residual level on risk before the Architecture Contracts are released. Answer: B Question No : 9 Scenario: MegaMart Case Study Title (Case Study): MegaMart is a Retail Chain which has expanded throughout India and the Far East. The CEO and CIO decide that there is a crying need to put an Enterprise Architecture in place to realize MegaMart’s strategy to expand its revenue and diversify. The CIO has evaluated and decided to go in for TOGAF9 and adapt it to his enterprise requirements. The Preliminary and Vision Phase have been completed. As such very few architectural artifacts exist and the target architecture as of now is not very clear. As the Lead Architect how would you guide your team of architects for the Business Architecture definition? 13 A. In the first iteration start with the definition of the Target Business Architecture using a Top down Approach. Then keep on iterating in Phase B till the Target Business Architecture is refined before going to Phase C and Phase D. After Phase C and Phase D are over, iterate again to Phase B and define the baseline Business Architecture, analyze the gaps finalize the Architecture Definitions documents and proceed to Phase C and Phase D. B. In the first iteration start with the definition of the Baseline Business Architecture using a Top Down approach. Define the Architecture Definition document after analyzing the impacts and reviewing with the stakeholders. Then proceed to Phase C and Phase D. In the next iteration finalize the Target Business Architecture and proceed to Phase C and Phase D. C. In the first iteration start with the definition of the Baseline Business Architecture using a Bottom Up approach. Define the Architecture Definition document after analyzing the impacts and reviewing with the stakeholders’. Proceed to Phase C and Phase D. In the next iteration finalize the Target Business Architecture, determine the gaps and the roadmap, and the impact and update the Architecture Definition document. after analyzing the impacts and reviewing with the stakeholders. Then proceed with the iteration. D. In the first iteration start with the definition of the Target Business Architecture using a Top Down approach. Define the Architecture Definition document after analyzing the impacts and reviewing with the stakeholders proceed to Phase C and Phase D. In the next iteration finalize the Baseline Business Architecture, determine the gaps and the roadmap, and the impact and update the Architecture Definition document. After analyzing the impacts and reviewing with the stakeholders. Then proceed with the iteration. Answer: C Question No : 10 Scenario: Please read this scenario prior to answering the Question You have been assigned the role of Chief Enterprise Architect within a leading North American information technology services company. The company has a number of service portfolios including infrastructure, applications, business process outsourcing, accounting, and financial services. With numerous practice areas and a multitude of diverse engagements underway at any given time, overall engagement management within the company has become challenging. The company does not want to risk its outstanding reputation or its international certifications and CMM ratings. 14 The Chief Executive Officer and Chief Information Officer have co-sponsored the creation of an Enterprise Architecture prog-am based on TOGAF 9. An Architecture Board has been formed comprised of IT staff executives and executives from the major practice areas. The Enterprise Architecture team has been working with the Strategic Planning team to create a strategic enterprise architecture to address these issues. The team has defined a framework and held workshops with key stakeholders to define a set of architecture principles to govern the architecture work. They have completed an Architecture Vision at a strategic level and laid out Architecture Definitions for the four domains. They have set out an ambitious vision of the future of the company over a five-year period. This includes a solution architecture including three distinct transformations. The CIO has made it clear that prior to the approval of the detailed Implementation and Migration plan, the EA team will need to assess the risks associated with the proposed architecture. He has received concerns from some of the senior partners that the proposed architecture may be too ambitious and they are not sure it can produce sufficient value to warrant the attendant risks. Refer to the Scenario You have been asked to recommend an approach to satisfy these concerns. Based on TOGAF 9, which of the following is the best answer? A. You recommend that before preparing the detailed Implementation and Migration plan, the EA team should review and consolidate the gap analysis results from Phases B to D to understand the transformations that are required to achieve the proposed Target Architecture. The EA team should assess the readiness of the organization to undergo change. Once the Solution Architecture has been assembled, it should be analyzed using a state evolution table to determine the Transition Architectures. B. You recommend that the EA team apply an interoperability analysis to evaluate any potential issues across the Solution Architecture. This should include the development of a matrix showing the interoperability retirements. Once all of the concerns have been resolved, the EA team should finalize the Architecture Roadmap and the Implementation and Migration Plan. C. You recommend that the EA team apply the Business Transformation Readiness Assessment technique which will allow the risks associated with the transformations to be identified and mitigated for, it will also identify improvement actions to be worked into the Implementation and Migration Plan. A Business Value Assessment should be used to determine the business value and associated risks for the transformation. D. You recommend that the EA team should gather information about potential solutions from the appropriate sources. Once the Solution Architecture has been assembled, it should be analyzed using a state evolution table to determine the Transition Architectures. A value realization process should then be established to ensure that the concerns raised 15 are addressed. Answer: C 16