All Mock Flashcards
Which of the following is a KEY concern of a Solution Architect?
Application Integration and data integrity
Which of the following best describes the function of the Business Vision?
Explains why the Enterprise wants to transition to a new state
Which of the following are NOT considered to be some form of abstraction?
Decomposition
Specialisation
Which of the following skills are essential for an Enterprise Architect?
Communication Skills
Which of the following is NOT a critical Enterprise Architect skill?
Detailed methodology knowledge
Architecture Granularity can be described as “A scale which ranges from coarse-grained or high level to fine-grained or details”. Which of the following correctly describes the Architecture Granularity (from highest level to lowest level) as defined by the BCS?
Enterprise, Solution, Software
Which of the following statements are correct?
An Intermediate Architecture describes the Enterprise at a point in its evolution between Baseline and Target
The term “Baseline Architecture” describes the current state of the parts of the business being examined for possible change
The Business Vision often explains why the Transition Architecture is desirable
Which one of the following would be most of interest to an Enterprise Architect?
Business strategy
Which one of the following is BEST described as an Architecture Entity?
Business Goal
Which of the following statements is correct about TOGAF?
The columns of the framework represent and flow from generic on the left to specific on the right.
The Business Target Architecture is described before the Baseline Technology Applications Architecture..
Which of the following is NOT a recognised Architecture State?
Equivalent
Which of the following standards is often referred to as ANSI 1471?
ISO/IEC 42010
Discounting Requirements Management; how many phases does TOGAF define as part of its iterative cycle?
Eight
An “Application portfolio” is best considered as a ……..?
Artefact
Your business is implementing an upgrade to its data systems. Which of the following Architects is MOST LIKELY to check that the project is following the strategic principles defined during the development of the Architecture?
Enterprise Architect
Which of the following is an Aim?
Requirements
Which one of the following is MOST LIKELY to be interested in a Use Case entity?
Applications Architect
Which element sits in the middle of the Architecture Description hierarchy?
Artefact
Which of the following is an Artefact?
Organisation / Objectives Matrix
In the TOGAF Enterprise continuum, where is the III-RM placed?
Architecture Continuum - Common systems
Which of the following is true concerning Principles?
The highest level in the Directive Hierarchy
The local caching technique provides which of the following advantages?
Data can be assessed more quickly
The “S” in SMART stands for?
Specific
Which of the following describes a Canonical Data Model?
The “one true definition” of data types (e.g. customer address, order value, tax reference number) used by an enterprise.
A logical data model that defines the data types that appear in messages.
Usually applies to data in data flows as a standard for integration of applications, but could apply to data in data stores as well. .
Which one of the following is NOT a recognised idealised or logical subdivision of an enterprise’s business capability?
Business Vision
What does OPOPOT stand for?
One Person, One Place, One Time
Business managers have several meanings for the phrase “Business Model:”. Which of the following is NOT normally understood by business managers as something converted by the term “Business Model”?
A business architectural catalogue
Which of the following covers IT accountability and procurement regulations?
Government Performance Results act (GPRA) of 1993, P.L. 103-162
Which of the following would you NOT expect to find in a Business Case?
Significant Milestones
You are examining “Meantime Between Failure” statistics for a system. Which of the following are you most likely to be concerned with?
Realiability
An external entity is BEST described as…?
An actor or role that inputs to and/or consumes outputs from a system, or process.
Which of the following is NOT a recognised model of the idealisation hierarchy?
Abstraction
“A definition of the data that must persist for the processes of an application to work” is BEST described by which one of the following?
Logical data model
Which of the following is usually considered as good measures of performance?
Response time and throughput
What effect would dropping indexes from a database have?
Updating would be quicker
“A data structure that is held in persistent memory” is best described as a …………..?
Data Store
Which of the following concerning checksums and digital signatures is most correct?
Digital signatures provide more security overall than checksums
Which of the following is true about a “tightly-coupled” application communication?
Clients use many different names for different services
Authentication of an Actor produces one of …… possible results?
Four
Which of the following is NOT a “component interoperation style”?
MVC (Model-View Controller)
Which of the following statements are true about IP?
IPv6 can be considered a super-set of IPv4
Business Managers have three definitions for the term “Business model”, which one of the following is NOT one of these definitions?
A diagram showing the business architecture
Which of the following are considered elements of Performance?
Response time
Throughput
“We need to do this as the market has changed” is best regarded as ….. ?
A Driver
Which of the following standards details requirements for Information Security Management Systems?
ISO/IEC 27001
Which one of the following is a middle layer Aim?
Objective
Which ACID property ensures that simultaneous execution of transactions has the same result as if they had been executed serially?
Isolated
Which of the following are also known as ANSI/IEEE 1471?
ISO 42010
IEC 42010
Which one of the following has it’s input and output defined by a parochial physical data model?
Data Service
Which one of the following is “A business function that is focused on the development, marketing, sales, creation and delivery of business products and services” of an enterprise
Core business functions
Which one of the following combinations would make the least sense to place in a DMZ?
Application Server, Directory Server, database
In security the term CIA stands for ………., Integrity and ………. ?
Confidentiality, Availability
Which of the following BEST describes a firewall?
A router which can examine IP packets and block their passage if rules are breached
In the TCP/IP stack which of the following are in the Internet Layer?
ICMP, IP
What is the best description of the term “Information Architecture”?
A broad domain that covers both structured and unstructured data, that is, content, document & knowledge management.
A schema that groups data items into a data structure and defines the type of each item is known as a ………………?
Data model
Which one of the following is NOT necessarily a Principle?
Should be SMART
Application Integration is best described by which of the following?
The ends or means of connecting one application to another in such a way that they contribute to the same output data flow or store the same data
What does ETL stand for
Extracting, Transforming, Loading
The TOGAF III-RM is best described as … ?
A pattern in TOGAF for a service-oriented architecture
Which one of the following is true of a use case diagram?
Shows how an actor interacts with an IT system
“ giving access to a trusted actor, based on the actor’s known access rights” is referred to as …… ?
Authorisation
Which usually spans the greatest distance?
WAN
Which one of the following combinations would NOT be assigned to DHCP?
DHCP Server and MAC address
Which one of these is a well known port number for FTP?
21
The end result of capability based planning may be that ………..?
A business capability is given a manager and becomes an organisation unit
Which Architecture Repository can be a 6x6 grid
Zachman
Which one of the following is correct concerning ports?
A port is allocated to one service per device
Which can be used as a governance tool?
Policies
Which one of the following is usually displayed as a series of Hexadecimal characters separated by colons
IPv6 address
Which of the following statements is correct about the “false positive”?
Unauthorised access occurred
A “high-level outline of a target system, produced after a first pass architecture definition, enough to pass risk assurance” is known as which of the following?
Solution Outline
You are planning to transfer data between two database systems using ETL. The data files are large. What should you do to the target database before loading new data?
Drop the indexes
Which of the following are considered ways of providing Data Integrity?
Use ACID transactions
Use a Data Warehouse
Why would you trust a public key certificate
Because the certificate is signed by a Certificate Authority
Which of the following is NOT an artefact?
Request for Work
Referring to Caching, which of the following are correct?
Can improve cycle time
Can cause issues with data integrity
Can raise concerns about data security
Which of the following models would best help identify where time is lost between application processing steps?
Applications Architecture behavioural model
“A statement of need with which compliance must be demonstrated” is known as a ………..?
Requirement statement
Which of the following is used for internet communication?
SOA (Service Orientated Architecture)
REST (Representational state Transfer)
Which of the following is true about the Zachman Framework?
The rows are NOT interpreted as levels of decomposition
A business function which differentiates one business from another is called a …………?
Core Competency
Which one of the following component communication styles does NOT use a broker in some way?
Point to Point
Which of the following are Data Link protocols
WiMax
802.11
Which one of the following is MOST LIKELY to be concerned with document and knowledge management?
Information Architecture
Which of the following are considered to be dimensions for the scope of the architectural work?
Focus
Breadth
Constraints (on the work)
Depth
Which of the following use hexadecimal (HEX) notation?
MAC address
IPv6
Which one of the following is NOT a modelling language?
IDL
What usually follows Identification?
Authentication