All Mock Flashcards

1
Q

Which of the following is a KEY concern of a Solution Architect?

A

Application Integration and data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes the function of the Business Vision?

A

Explains why the Enterprise wants to transition to a new state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are NOT considered to be some form of abstraction?

A

Decomposition

Specialisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following skills are essential for an Enterprise Architect?

A

Communication Skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a critical Enterprise Architect skill?

A

Detailed methodology knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Architecture Granularity can be described as “A scale which ranges from coarse-grained or high level to fine-grained or details”. Which of the following correctly describes the Architecture Granularity (from highest level to lowest level) as defined by the BCS?

A

Enterprise, Solution, Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements are correct?

A

An Intermediate Architecture describes the Enterprise at a point in its evolution between Baseline and Target

The term “Baseline Architecture” describes the current state of the parts of the business being examined for possible change

The Business Vision often explains why the Transition Architecture is desirable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which one of the following would be most of interest to an Enterprise Architect?

A

Business strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which one of the following is BEST described as an Architecture Entity?

A

Business Goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements is correct about TOGAF?

A

The columns of the framework represent and flow from generic on the left to specific on the right.

The Business Target Architecture is described before the Baseline Technology Applications Architecture..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT a recognised Architecture State?

A

Equivalent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following standards is often referred to as ANSI 1471?

A

ISO/IEC 42010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discounting Requirements Management; how many phases does TOGAF define as part of its iterative cycle?

A

Eight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An “Application portfolio” is best considered as a ……..?

A

Artefact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your business is implementing an upgrade to its data systems. Which of the following Architects is MOST LIKELY to check that the project is following the strategic principles defined during the development of the Architecture?

A

Enterprise Architect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an Aim?

A

Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which one of the following is MOST LIKELY to be interested in a Use Case entity?

A

Applications Architect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which element sits in the middle of the Architecture Description hierarchy?

A

Artefact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an Artefact?

A

Organisation / Objectives Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the TOGAF Enterprise continuum, where is the III-RM placed?

A

Architecture Continuum - Common systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is true concerning Principles?

A

The highest level in the Directive Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The local caching technique provides which of the following advantages?

A

Data can be assessed more quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The “S” in SMART stands for?

A

Specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following describes a Canonical Data Model?

A

The “one true definition” of data types (e.g. customer address, order value, tax reference number) used by an enterprise.

A logical data model that defines the data types that appear in messages.

Usually applies to data in data flows as a standard for integration of applications, but could apply to data in data stores as well. .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which one of the following is NOT a recognised idealised or logical subdivision of an enterprise's business capability?
Business Vision
26
What does OPOPOT stand for?
One Person, One Place, One Time
27
Business managers have several meanings for the phrase “Business Model:”. Which of the following is NOT normally understood by business managers as something converted by the term “Business Model”?
A business architectural catalogue
28
Which of the following covers IT accountability and procurement regulations?
Government Performance Results act (GPRA) of 1993, P.L. 103-162
29
Which of the following would you NOT expect to find in a Business Case?
Significant Milestones
30
You are examining “Meantime Between Failure” statistics for a system. Which of the following are you most likely to be concerned with?
Realiability
31
An external entity is BEST described as…?
An actor or role that inputs to and/or consumes outputs from a system, or process.
32
Which of the following is NOT a recognised model of the idealisation hierarchy?
Abstraction
33
“A definition of the data that must persist for the processes of an application to work” is BEST described by which one of the following?
Logical data model
34
Which of the following is usually considered as good measures of performance?
Response time and throughput
35
What effect would dropping indexes from a database have?
Updating would be quicker
36
“A data structure that is held in persistent memory” is best described as a …………..?
Data Store
37
Which of the following concerning checksums and digital signatures is most correct?
Digital signatures provide more security overall than checksums
38
Which of the following is true about a “tightly-coupled” application communication?
Clients use many different names for different services
39
Authentication of an Actor produces one of …… possible results?
Four
40
Which of the following is NOT a “component interoperation style”?
MVC (Model-View Controller)
41
Which of the following statements are true about IP?
IPv6 can be considered a super-set of IPv4
42
Business Managers have three definitions for the term “Business model”, which one of the following is NOT one of these definitions?
A diagram showing the business architecture
43
Which of the following are considered elements of Performance?
Response time | Throughput
44
“We need to do this as the market has changed” is best regarded as ….. ?
A Driver
45
Which of the following standards details requirements for Information Security Management Systems?
ISO/IEC 27001
46
Which one of the following is a middle layer Aim?
Objective
47
Which ACID property ensures that simultaneous execution of transactions has the same result as if they had been executed serially?
Isolated
48
Which of the following are also known as ANSI/IEEE 1471?
ISO 42010 | IEC 42010
49
Which one of the following has it’s input and output defined by a parochial physical data model?
Data Service
50
Which one of the following is “A business function that is focused on the development, marketing, sales, creation and delivery of business products and services” of an enterprise
Core business functions
51
Which one of the following combinations would make the least sense to place in a DMZ?
Application Server, Directory Server, database
52
In security the term CIA stands for …...…., Integrity and …...…. ?
Confidentiality, Availability
53
Which of the following BEST describes a firewall?
A router which can examine IP packets and block their passage if rules are breached
54
In the TCP/IP stack which of the following are in the Internet Layer?
ICMP, IP
55
What is the best description of the term “Information Architecture”?
A broad domain that covers both structured and unstructured data, that is, content, document & knowledge management.
56
A schema that groups data items into a data structure and defines the type of each item is known as a ………………?
Data model
57
Which one of the following is NOT necessarily a Principle?
Should be SMART
58
Application Integration is best described by which of the following?
The ends or means of connecting one application to another in such a way that they contribute to the same output data flow or store the same data
59
What does ETL stand for
Extracting, Transforming, Loading
60
The TOGAF III-RM is best described as ... ?
A pattern in TOGAF for a service-oriented architecture
61
Which one of the following is true of a use case diagram?
Shows how an actor interacts with an IT system
62
“ giving access to a trusted actor, based on the actor’s known access rights” is referred to as …... ?
Authorisation
63
Which usually spans the greatest distance?
WAN
64
Which one of the following combinations would NOT be assigned to DHCP?
DHCP Server and MAC address
65
Which one of these is a well known port number for FTP?
21
66
The end result of capability based planning may be that ………..?
A business capability is given a manager and becomes an organisation unit
67
Which Architecture Repository can be a 6x6 grid
Zachman
68
Which one of the following is correct concerning ports?
A port is allocated to one service per device
69
Which can be used as a governance tool?
Policies
70
Which one of the following is usually displayed as a series of Hexadecimal characters separated by colons
IPv6 address
71
Which of the following statements is correct about the “false positive”?
Unauthorised access occurred
72
A “high-level outline of a target system, produced after a first pass architecture definition, enough to pass risk assurance” is known as which of the following?
Solution Outline
73
You are planning to transfer data between two database systems using ETL. The data files are large. What should you do to the target database before loading new data?
Drop the indexes
74
Which of the following are considered ways of providing Data Integrity?
Use ACID transactions | Use a Data Warehouse
75
Why would you trust a public key certificate
Because the certificate is signed by a Certificate Authority
76
Which of the following is NOT an artefact?
Request for Work
77
Referring to Caching, which of the following are correct?
Can improve cycle time Can cause issues with data integrity Can raise concerns about data security
78
Which of the following models would best help identify where time is lost between application processing steps?
Applications Architecture behavioural model
79
“A statement of need with which compliance must be demonstrated” is known as a ………..?
Requirement statement
80
Which of the following is used for internet communication?
SOA (Service Orientated Architecture) | REST (Representational state Transfer)
81
Which of the following is true about the Zachman Framework?
The rows are NOT interpreted as levels of decomposition
82
A business function which differentiates one business from another is called a …………?
Core Competency
83
Which one of the following component communication styles does NOT use a broker in some way?
Point to Point
84
Which of the following are Data Link protocols
WiMax | 802.11
85
Which one of the following is MOST LIKELY to be concerned with document and knowledge management?
Information Architecture
86
Which of the following are considered to be dimensions for the scope of the architectural work?
Focus Breadth Constraints (on the work) Depth
87
Which of the following use hexadecimal (HEX) notation?
MAC address | IPv6
88
Which one of the following is NOT a modelling language?
IDL
89
What usually follows Identification?
Authentication