SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Zakia Bouachraoui, Roger Strukhoff, David Linthicum

Related Topics: Microservices Expo

Microservices Expo: Article

TOGAF – Preparation Aid for Part 2

The questions for the Part 2 Examination consist of eight complex scenario questions

The questions for the Part 2 Examination consist of eight complex scenario questions. You need to read a scenario describing a situation where TOGAF is being applied. The question will then ask how TOGAF would be used to address a particular point. Four possible answers are provided. There is one correct answer, two partially correct answers and one incorrect answer for the situation. The correct answer scores five points, the second best answer three points, and the third best answer one point. The incorrect answer scores zero points. The pass mark is 60%. The eight scenarios are drawn from the following major topic areas:

  1. Phases Preliminary, A, Requirements Management
  2. Architecture Definition (Phases B, C, D)
  3. Transition Planning (Phases E and F)
  4. Governance (Phases G and H)
  5. Adapting the ADM
  6. Architecture Content Framework
  7. TOGAF Reference Models
  8. Architecture Capability Framework

How to prepare for Part 2?
The key to success in the part 2 exam is to recognize the most “TOGAFish” answer! Let me give you two example answers without telling you the question – just try to guess which of them are more “TOGAFish”.

  • You recommend that risk management techniques be used throughout the program. This will enable you to assess the risks associated with the proposed business transformation and ensure suitable business continuity plans are in place. You then ensure that in the Implementation Governance phase, a residual risk assessment is conducted to determine the best way to manage risks that cannot be mitigated.
  • You propose to utilize a risk management framework in the Implementation Governance phase. This will enable you to assess the risks associated with the proposed business transformation. You then ensure that the initial level of risk is well understood before issuing the Architecture Contracts.

I suppose you have guessed it – the first one is the right answer because it talks about “residual risk” which is one of the important TOGAF concepts for risk management. However, there is another class of questions which cannot be answered like this. These are related to the use of viewpoints.

Viewpoints
Unfortunately, the Open Group study guide for the part 2 does not provide enough explanation of the different viewpoints. You need to fall back on the “TOGAF version 9″ documentation and read chapter 35.

Please note that in TOGAF 9.1 some of the viewpoints have been renamed.

Here are 9 multiple choice questions to help you test your understanding:

1. You need to make an impactful presentation of the high-level view of the interaction with the outside world to quickly on-board and align stakeholders for a particular change initiative, so that all participants understand the high-level functional and organizational context of the architecture engagement. Which viewpoint will you choose?

A. Value Chain Diagram

B. Solution Concept Diagram

C Business Interaction Matrix

D. Functional Decomposition Diagram

2. You want to present a ”pencil sketch” of the expected solution at the outset of the engagement. It should embody key objectives, requirements, and constraints for the engagement and also highlight work areas to be investigated in more detail with formal architecture modeling. You need to make all participants understand what the architecture engagement is seeking to achieve and how it is expected that a particular solution approach will meet the needs of the enterprise. Which viewpoint will you choose?

A. Value Chain Diagram

B. Solution Concept Diagram

C. Driver/Goal/Objective Catalog

D. Business Footprint Diagram

3. You want to present to the senior-level (CxO) stakeholders a view which depicts the links between business goals, organizational units, business functions, and services, and maps these functions to the technical components delivering the required capability. The view should provide a clear traceability between a technical component and the business goal that it satisfies, whilst also demonstrating ownership of the services identified. Which viewpoint will you choose?

A. Solution Concept Diagram

B. Business Footprint Diagram

C. Driver/Goal/Objective Catalog

D. Goal/Objective/Service Diagram

4. As a part of defining the Data Architecture you need to clearly assign ownership of data entities, understand the data and information exchange requirements and determine whether any data entities are missing and need to be created. You expect this view to help enable development of data governance programs across the enterprise. Which viewpoint will you choose?

A. Data Entity/Data Component Catalog

B. Data Entity/Business Function Matrix

C. Data Dissemination Diagram

D. Application/Data Matrix

5. As a part of defining the Data Architecture you need to support the gap analysis and determine whether any of the applications are missing and as a result need to be created. You also need to identify the degree of data duplication within different applications, and the scale of the data lifecycle and understand where the same data is updated by different applications. Which viewpoint will you choose?

A. Data Entity/Data Component Catalog

B. Data Entity/Business Function Matrix

C. Data Dissemination Diagram

D. Application/Data Matrix

6. As a part of defining the Information System Architecture you need to come up with an indication of the business criticality of application components by assigning business value to data it manages. In the process you also need to show how the logical entities are to be physically realized by application components. Which viewpoint will you choose?

A. Data Entity/Business Function Matrix

B. Data Dissemination Diagram

C. Application/Data Matrix

D. Data Lifecycle diagram

7. As a part of defining the Information System Architecture you need to understand the degree of interaction between applications, identifying those that are central in terms of their dependencies on other systems. You also need to scope the overall dependencies between applications. Which viewpoint you will NOT choose?

A. Interface Catalog

B. Application Interaction Matrix

C. Application Communication Diagram

D. Application/Function Matrix

8. You need to understand the application support requirements of the business services and processes carried out by an organization unit and determine whether any of the applications are missing and as a result need to be created. Which viewpoint will you choose?

A. Software Distribution Diagram

B. Application Use-Case Diagram

C. Application/Function Matrix

D. Application/Organization Matrix

9. Which of the following viewpoint you will NOT use to understand the security requirements?

A. Role Catalog, Actor/Role Matrix and Role/System Matrix

B. Data Security Diagram

C. Networked Computing/Hardware Diagram

D. Application/Technology Matrix

Answers

  1. A – Value Chain Diagram
  2. B – Solution Concept Diagram
  3. B – Business Footprint Diagram
  4. B – Data Entity/Business Function Matrix
  5. D – Application/Data Matrix
  6. B – Data Dissemination Diagram
  7. D – Application/Function Matrix
  8. D – Application/Organization Matrix
  9. D – Application/Technology Matrix

More materials and tests for TOGAF preparation:

More Stories By Udayan Banerjee

Udayan Banerjee is CTO at NIIT Technologies Ltd, an IT industry veteran with more than 30 years' experience. He blogs at http://setandbma.wordpress.com.
The blog focuses on emerging technologies like cloud computing, mobile computing, social media aka web 2.0 etc. It also contains stuff about agile methodology and trends in architecture. It is a world view seen through the lens of a software service provider based out of Bangalore and serving clients across the world. The focus is mostly on...

  • Keep the hype out and project a realistic picture
  • Uncover trends not very apparent
  • Draw conclusion from real life experience
  • Point out fallacy & discrepancy when I see them
  • Talk about trends which I find interesting
Google

Latest Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Platform9, the leader in SaaS-managed hybrid cloud, has announced it will present five sessions at four upcoming industry conferences in June: BCS in London, DevOpsCon in Berlin, HPE Discover and Cloud Computing Expo 2019.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.