All Mock Flashcards

1
Q

Which of the following is a KEY concern of a Solution Architect?

A

Application Integration and data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes the function of the Business Vision?

A

Explains why the Enterprise wants to transition to a new state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are NOT considered to be some form of abstraction?

A

Decomposition

Specialisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following skills are essential for an Enterprise Architect?

A

Communication Skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a critical Enterprise Architect skill?

A

Detailed methodology knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Architecture Granularity can be described as “A scale which ranges from coarse-grained or high level to fine-grained or details”. Which of the following correctly describes the Architecture Granularity (from highest level to lowest level) as defined by the BCS?

A

Enterprise, Solution, Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements are correct?

A

An Intermediate Architecture describes the Enterprise at a point in its evolution between Baseline and Target

The term “Baseline Architecture” describes the current state of the parts of the business being examined for possible change

The Business Vision often explains why the Transition Architecture is desirable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which one of the following would be most of interest to an Enterprise Architect?

A

Business strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which one of the following is BEST described as an Architecture Entity?

A

Business Goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements is correct about TOGAF?

A

The columns of the framework represent and flow from generic on the left to specific on the right.

The Business Target Architecture is described before the Baseline Technology Applications Architecture..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT a recognised Architecture State?

A

Equivalent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following standards is often referred to as ANSI 1471?

A

ISO/IEC 42010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discounting Requirements Management; how many phases does TOGAF define as part of its iterative cycle?

A

Eight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An “Application portfolio” is best considered as a ……..?

A

Artefact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your business is implementing an upgrade to its data systems. Which of the following Architects is MOST LIKELY to check that the project is following the strategic principles defined during the development of the Architecture?

A

Enterprise Architect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an Aim?

A

Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which one of the following is MOST LIKELY to be interested in a Use Case entity?

A

Applications Architect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which element sits in the middle of the Architecture Description hierarchy?

A

Artefact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an Artefact?

A

Organisation / Objectives Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the TOGAF Enterprise continuum, where is the III-RM placed?

A

Architecture Continuum - Common systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is true concerning Principles?

A

The highest level in the Directive Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The local caching technique provides which of the following advantages?

A

Data can be assessed more quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The “S” in SMART stands for?

A

Specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following describes a Canonical Data Model?

A

The “one true definition” of data types (e.g. customer address, order value, tax reference number) used by an enterprise.

A logical data model that defines the data types that appear in messages.

Usually applies to data in data flows as a standard for integration of applications, but could apply to data in data stores as well. .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which one of the following is NOT a recognised idealised or logical subdivision of an enterprise’s business capability?

A

Business Vision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does OPOPOT stand for?

A

One Person, One Place, One Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Business managers have several meanings for the phrase “Business Model:”. Which of the following is NOT normally understood by business managers as something converted by the term “Business Model”?

A

A business architectural catalogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following covers IT accountability and procurement regulations?

A

Government Performance Results act (GPRA) of 1993, P.L. 103-162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following would you NOT expect to find in a Business Case?

A

Significant Milestones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

You are examining “Meantime Between Failure” statistics for a system. Which of the following are you most likely to be concerned with?

A

Realiability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An external entity is BEST described as…?

A

An actor or role that inputs to and/or consumes outputs from a system, or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is NOT a recognised model of the idealisation hierarchy?

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

“A definition of the data that must persist for the processes of an application to work” is BEST described by which one of the following?

A

Logical data model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is usually considered as good measures of performance?

A

Response time and throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What effect would dropping indexes from a database have?

A

Updating would be quicker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

“A data structure that is held in persistent memory” is best described as a …………..?

A

Data Store

37
Q

Which of the following concerning checksums and digital signatures is most correct?

A

Digital signatures provide more security overall than checksums

38
Q

Which of the following is true about a “tightly-coupled” application communication?

A

Clients use many different names for different services

39
Q

Authentication of an Actor produces one of …… possible results?

A

Four

40
Q

Which of the following is NOT a “component interoperation style”?

A

MVC (Model-View Controller)

41
Q

Which of the following statements are true about IP?

A

IPv6 can be considered a super-set of IPv4

42
Q

Business Managers have three definitions for the term “Business model”, which one of the following is NOT one of these definitions?

A

A diagram showing the business architecture

43
Q

Which of the following are considered elements of Performance?

A

Response time

Throughput

44
Q

“We need to do this as the market has changed” is best regarded as ….. ?

A

A Driver

45
Q

Which of the following standards details requirements for Information Security Management Systems?

A

ISO/IEC 27001

46
Q

Which one of the following is a middle layer Aim?

A

Objective

47
Q

Which ACID property ensures that simultaneous execution of transactions has the same result as if they had been executed serially?

A

Isolated

48
Q

Which of the following are also known as ANSI/IEEE 1471?

A

ISO 42010

IEC 42010

49
Q

Which one of the following has it’s input and output defined by a parochial physical data model?

A

Data Service

50
Q

Which one of the following is “A business function that is focused on the development, marketing, sales, creation and delivery of business products and services” of an enterprise

A

Core business functions

51
Q

Which one of the following combinations would make the least sense to place in a DMZ?

A

Application Server, Directory Server, database

52
Q

In security the term CIA stands for ………., Integrity and ………. ?

A

Confidentiality, Availability

53
Q

Which of the following BEST describes a firewall?

A

A router which can examine IP packets and block their passage if rules are breached

54
Q

In the TCP/IP stack which of the following are in the Internet Layer?

A

ICMP, IP

55
Q

What is the best description of the term “Information Architecture”?

A

A broad domain that covers both structured and unstructured data, that is, content, document & knowledge management.

56
Q

A schema that groups data items into a data structure and defines the type of each item is known as a ………………?

A

Data model

57
Q

Which one of the following is NOT necessarily a Principle?

A

Should be SMART

58
Q

Application Integration is best described by which of the following?

A

The ends or means of connecting one application to another in such a way that they contribute to the same output data flow or store the same data

59
Q

What does ETL stand for

A

Extracting, Transforming, Loading

60
Q

The TOGAF III-RM is best described as … ?

A

A pattern in TOGAF for a service-oriented architecture

61
Q

Which one of the following is true of a use case diagram?

A

Shows how an actor interacts with an IT system

62
Q

“ giving access to a trusted actor, based on the actor’s known access rights” is referred to as …… ?

A

Authorisation

63
Q

Which usually spans the greatest distance?

A

WAN

64
Q

Which one of the following combinations would NOT be assigned to DHCP?

A

DHCP Server and MAC address

65
Q

Which one of these is a well known port number for FTP?

A

21

66
Q

The end result of capability based planning may be that ………..?

A

A business capability is given a manager and becomes an organisation unit

67
Q

Which Architecture Repository can be a 6x6 grid

A

Zachman

68
Q

Which one of the following is correct concerning ports?

A

A port is allocated to one service per device

69
Q

Which can be used as a governance tool?

A

Policies

70
Q

Which one of the following is usually displayed as a series of Hexadecimal characters separated by colons

A

IPv6 address

71
Q

Which of the following statements is correct about the “false positive”?

A

Unauthorised access occurred

72
Q

A “high-level outline of a target system, produced after a first pass architecture definition, enough to pass risk assurance” is known as which of the following?

A

Solution Outline

73
Q

You are planning to transfer data between two database systems using ETL. The data files are large. What should you do to the target database before loading new data?

A

Drop the indexes

74
Q

Which of the following are considered ways of providing Data Integrity?

A

Use ACID transactions

Use a Data Warehouse

75
Q

Why would you trust a public key certificate

A

Because the certificate is signed by a Certificate Authority

76
Q

Which of the following is NOT an artefact?

A

Request for Work

77
Q

Referring to Caching, which of the following are correct?

A

Can improve cycle time
Can cause issues with data integrity
Can raise concerns about data security

78
Q

Which of the following models would best help identify where time is lost between application processing steps?

A

Applications Architecture behavioural model

79
Q

“A statement of need with which compliance must be demonstrated” is known as a ………..?

A

Requirement statement

80
Q

Which of the following is used for internet communication?

A

SOA (Service Orientated Architecture)

REST (Representational state Transfer)

81
Q

Which of the following is true about the Zachman Framework?

A

The rows are NOT interpreted as levels of decomposition

82
Q

A business function which differentiates one business from another is called a …………?

A

Core Competency

83
Q

Which one of the following component communication styles does NOT use a broker in some way?

A

Point to Point

84
Q

Which of the following are Data Link protocols

A

WiMax

802.11

85
Q

Which one of the following is MOST LIKELY to be concerned with document and knowledge management?

A

Information Architecture

86
Q

Which of the following are considered to be dimensions for the scope of the architectural work?

A

Focus
Breadth
Constraints (on the work)
Depth

87
Q

Which of the following use hexadecimal (HEX) notation?

A

MAC address

IPv6

88
Q

Which one of the following is NOT a modelling language?

A

IDL

89
Q

What usually follows Identification?

A

Authentication