Summer Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Scenario

Please read this scenario prior to answering the question

The ArchiSurance IT Operations (IT Ops) department has five core responsibilities, and continuously executes a core business process for each responsibility. (1) The Batch Ops process makes sure that batch jobs execute completely, successfully, and on time, consistent with their service level agreements (SLAs). (2) The Online Ops process makes sure that all web applications and content delivery services are available and performing according to their SLAs. (3) The Security Ops process protects ArchiSurance IT operations from being damaged by malicious or careless incidents. (4)The User Support process assists users of ArchiSurance systems with problems or requests. (5) The Continuous Improvement process monitors and measures the performance ot each of the other processes and works to solve problems and optimize use of ArchiSurance resources. In order to enable monitoring, each of the other processes generates monitoring data that is read by the Continuous Improvement process.

The processes in the System Ops category, which are Batch Ops, Online Ops and Security Ops, each have a separate sub-process for incident management. These sub-processes are triggered, respectively, by Batch, Online and Security Incidents. One of the first steps in each incident management sub-process, is to pass an Incident Alert to each of the other System Ops processes. This is accomplished by posting the alert to the Alert Buffer.

The Batch Ops process uses a schedule that lists all batch jobs and their dependencies. The schedule is used by two Batch Ops sub-processes. The Batch Planning sub-process updates this schedule for use by the Execution Management sub-process.

The Batch Ops process uses a number of applications that interact with each other. The Batch Scheduler application enables users to manage a database of jobs, job schedules and dependencies, and launches batch jobs according to the database. The Batch Monitor application uses the job schedules as a reference to monitor job execution, and reports all exceptional conditions to the both the Batch Scheduler and the Incident Handler applications via the Alert Buffer described earlier In the scenario. The Incident Handler refers to a set of business rules to determine the systems and individuals that must be notified of each incident. Based on these determinations, the Incident Handler produces appropriate notifications.

Due to their critical ity, the Batch Scheduler, Batch Monitor and Incident Handler applications are hosted redundantly in multiple geographically distributed data centers. In each data center, the three applications are hosted on a fully redundant virtual server cluster. Each cluster is connected to two site local area networks, each of which connects to a separate physical storage array.

Refer to the scenario

As part of an IT service management initiative, you have been asked to show how applications and infrastructure support the Batch Ops process. Model the applications, their functions, the data they access, and the infrastructure that hosts the applications and data, along with the networks that connect the servers. It is only necessary to model a single data center.

Which answer provides the most complete and accurate model?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

Scenario

Please read this scenario prior to answering the Question

ArchiSurance has a partnership with ArchiBank in which the two companies market each other's consumer offerings to their own customers. Each quarter, the chief marketing officers (CMOs) of the two companies work together to plan the next quarter's promotions. First, they review each other's business objectives related to the partnership. Then, they formulate the co-operative marketing plan. The CMOs determine which offerings they will promote, the characteristics of the target customers, and the timing of each promotion. They assemble their findings into a co-operative marketing plan that is reviewed separately by the chief financial officer (CFO) of each organization. If either of the CFOs finds a problem, the CMOs must quickly work together to formulate another version of the plan. The review and reformulation process continues until both CFOs have approved a version of the plan. Then, the CMOs share the plans with their respective operations teams. Each organization's operations team configures the bank's systems to execute the joint promotions.

The cooperative marketing process is enabled by CRM software delivered as a service (SaaS). The two organizations each use separate logical instances of a multi-tenant customer relationship management (CRM) application hosted by a service provider. Each company's CRM instance is a dedicated function of the same CRM application component. The dedicated functions also share the same multi-tenant database. The component's data access layer is designed with safeguards to keep each company's data separate unless it is intentionally shared.

Each CRM instance has targeting, exchange and outreach sub-functions. The targeting sub-functions select customers based on criteria developed by the CMOs and configured by the operations teams. The exchange sub-functions share the selected customer profiles with each other, and the outreach sub-functions generate promotional email. In this way, each company's CRM system generates a list of target customers that the other company's CRM system uses to send promotional email.

The multi-tenant CRM application component is hosted on a large virtual server complex that is connected via a site network to a physical storage array and a commercial wide-area network (WAN) used by both companies. Both companies access their CRM systems via PCs connected to Local Area Networks (LANs) that are in turn connected to the shared commercial WAN.

Refer to the Scenario

In preparation for a presentation to investors, the ArchiSurance chief financial officer has asked you to model the business architecture of the partnership, including the executives and teams involved, the information they exchange, and the activities they perform.

Which answer best describes this business architecture?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 6

Scenario

Please read this scenario prior to answering the question

Independent insurance brokers that work with ArchiSurance have complained of difficulty in communicating with salespeople and other personnel at ArchiSurance. They have said that email is too clumsy and slow for working on urgent deals, people do not always answer their mobile phones, and it is difficult to tell whether an individual is available. They have also complained that it is too time-consuming for them to manage their commission payments using an older web application that requires them to print out and mail forms for making some routine changes, and also does not work on many mobile devices. Some brokers have said that it is easier to do business with ArchiSurance competitors that provide easy-to-use mobile applications for both general communication and commission management. In fact, the ArchiSurance Vice President of Sales and Chief Marketing Officer have both expressed concern about reports from the ArchiSurance market research department that the company is gradually losing market share withsome of the same brokers that have been complaining. These executives are also concerned that ArchiSurance may not meet the targets for revenue growth.

Upon hearing about these issues, the ArchiSurance Chief Information Officer (CIO) hired a consultant to design a new mobile infrastructure for broker interaction. This infrastructure is required to enable easier communication with ArchiSurance brokers in order to help the company increase its market share with each of them and consequently attain its targets for revenue growth. In order to ensure that the new infrastructure would meet these goals, the CIO told the consultant that the new infrastructure must make it easy for ArchiSurance to develop and deploy applications and content for its brokers. It must provide federated authentication and an encrypted communication channel as well as instant messaging and presence services.

The new mobile broker interaction infrastructure architecture includes a number of system software components. A secure reverse proxy authenticates users and provides an encrypted channel to communicate with them. The proxy uses a service provided by directory server software to authenticate users. The directory server communicates with the ArchiSurance federation server, which in turn communicates with peer federation servers hosted by trusted brokerage organizations. Once the user is authenticated, the ArchiSurance broker portal uses the ArchiSurance web content management system to assemble authorized and relevant content for each broker. In order to provide presence services, a unified communications (UC) server exchanges information with the directory server and an instant messaging server.

All of these components are hosted on a single physical hardware platform hosting a virtualized server infrastructure. The server infrastructure is connected to a converged local area network (LAN), which is also connected to a commercial wide area network (WAN) over which ArchiSurance communicates with its brokers.

Refer to the Scenario

The solution delivery team for broker interaction would like to get a clearer idea of the motivations behind this solution as they plan a second release. You must model the stakeholders, drivers, assessments and goals that shape this strategic initiative. You must also show the relationships between these motivational elements.

Which answer provides the most complete and accurate model?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

Scenario

Please read this scenario prior to answering the Question

The daily mutual fund trading cycle consists of four key processes: Transaction capture, pricing, trading and reconciliation. Transaction capture consists of two sub-processes: manual exchange and loans and distributions (LSD). For transaction capture, retirement plan participants use an online account management application to enter manual fund exchange transactions. For LSD, plan participants use a separate application to enter requests. The L&D application determines whether the request can be fulfilled based on the mutual fund balances held in each plan balances and a set of business rules. Each day's captured manual exchange transactions accumulate in a transaction database.

ArchiSurance contracts with a third-party information service to receive a file of mutual fund prices at the close of each trading day.

The pricing application uses this file to convert captured transaction into trades, and then validates each trade against the mutual fund balances held in each plan. The pricing generates a trade file with the minimum number of trades necessary. The trading application sends this file to an external trading service. When the trading application receives a confirmation file back from the trading service, it passes it to the reconciliation application, which updates the plan recordkeeping database.

The account management and LSD applications are hosted on separate application server clusters. Each cluster is a physically separate host that runs application server software on a set of virtualized hosts. All of these applications use a database server infrastructure that is hosted on another separate cluster of virtualized servers also on a dedicated physical host. The pricing, consolidation, trading and reconciliation applications, however, are batch applications that run on the ArchiSurance mainframe computer. All application hosts are connected via a converged data center network (DCN), which also connects them to a storage area network (SAN) as well as a wide area network (WAN) that is used to communicate with the external trading service. The SANincludes two physically separate storage arrays, ere of which holds data for all databases, and another that holds data for all files.

Refer to the Scenario

You have been asked by a team of IT auditors to show the applications used for daily trading and the infrastructure that underlies them, including all ArchiSurance servers, storage arrays and networks. It is not necessary to model the WAN or other external infrastructure.

Which answer best describes the applications and infrastructure?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Scenario

Please read this scenario prior to answering the question

ArchiSurance has entered into a legal agreement to acquire ArchiSpecialty, a specialty insurer that has several lines of business, including insuring organizations that conduct high-stakes contests. Prior to entering into this agreement ArchiSurance staff carefully examined the ArchiSpecialty Enterprise Architecture to develop an integration plan with four successive phases. Each phase of the plan provides a stable foundation for ArchiSurance to conduct its newly expanded business while making significant progress toward the targeted integration of ArchiSpecialty operations. The first phase of the plan, Common Ownership, will begin on the acquisition date specified in the legal agreement. The second through fourth phases will begin after their predecessors are complete.

During the Common Ownership phase, the two companies' websites will be linked to each other and their Interactive voice response(IVR) system menus will be integrated. During the second phase, known as Integrated Organizations, the corresponding ArchiSurance and ArchiSpecialty departments will be combined and all financial processing will be migrated to the original ArchiSurance systems. In the third Phase, known as Integrated Customer Operations, ArchiSpecialty customer relationship management (CRM) data will be migrated to the corresponding ArchiSurance applications. In the fourth and final phase, known as Integrated Operations, the ArchiSpecialty claims data will be migrated to the corresponding ArchiSurance applications. However, the ArchiSpecialty underwriting solution for high-stakes contests will be retained due to its unique capabilities.

The underwriting solution for high-stakes contests assists underwriters in creating a policy to insure against the possibility of a contestant winning an improbable but expensive award, such as $1 million US for hitting a hole-in-one on a golf course, or a luxury world cruise for a winning spin of a roulette wheel. In return for a single premium payment, the insurer agrees to pay the award if a contestant earns it fairly. When an underwriter receives a request for an insurance quote, either from a promotions company that isplanning the contest or from a company with its own promotions department, he uses the Contest Modeler application to precisely describe the planned contest and the coverage requested, and to store the contest model in a machine-readable format. Then, the underwriter uses the Contest Query application, which reads the contest model and queries a collection of audited contest results to find records of similar contests. Then, the underwriter uses the Contest Estimator application to estimate the premium for the coverage request, and also to produce a report with a recommended set of conditions to provide with the quote. After consulting the report, the underwriter uses the Quoting Tool application to prepare a quote for the customer. Then, the underwriter sends the quote to the customer via secure email. If the customer accepts the quote, the underwriter uses the Contract Generator to prepare t contract for the customer, which he also sends via secure email. In the contract, the customer agrees to employ a contest auditorwho will report the audited results of the contest regardless of whether prizes are awarded. The underwriter uses the Contest Tracker application to add these reports to the collection of audited contest results. Note that all reports are delivered in a standard markup language that can be read by other software programs and either processed in the background or rendered visually.

Refer to the Scenario

The ArchiSurance chief information officer has asked you to explain the unique suite of applications that ArchiSpecialty uses to underwrite high-stakes contest insurance. You must model these applications, the services they provide and the data they access.

Which answer provides the best explanation?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

What is the generic name in the ArchiMate language for the concept of an object on which behavior is performed?

A.

Passive structure element

B.

Data object

C.

Active structure element

D.

Passive data object

Full Access
Question # 10

The following diagram illustrates the relationship between Stakeholders and Views:

According to the ISO/IEC 40210 standard, how should the box in the lower left corner be labeled?

A.

Viewpoint

B.

Concern

C.

Architectural Description

D.

Model

Full Access
Question # 11

Consider the following diagram:

In which phase of the TOGAF Architecture Development Method (ADM) would such a view be most applicable?

A.

Preliminary Phase

B.

Phase B: Business Architecture

C.

Phase C: Information Systems Architectures

D.

Phase D: Technology Architecture

Full Access
Question # 12

The following is an example of an ArchiMate Goal Contribution view:

Which goals negatively influence other goals?

A.

Reduce expense ratio and Improve ski I Is of claim processors

B.

Reduce customer service staff and Conduct trainings during working hours

C.

Reduce claim processing errors and Reduce expense ratio

D.

Improve skills of claim processors and Reduce customer service staff

Full Access
Question # 13

Consider the following diagram:

What does the diagram express about the relationship between the three processes?

A.

Take in Claim passes information to Gather Claim Information, and Gather Claim Information passes information to Adjudicate Claim

B.

Take in Claim triggers Gather Claim Information, and Gather Claim Information triggers Adjudicate Claim

C.

Take in Claim is used by Gather Claim Information, and Gather Claim Information is used by Adjudicate Claim

D.

The three processes may execute in parallel, although they don’t have to

Full Access
Question # 14

The following diagram shows an example of the use of the Migration viewpoint:

Which of the following best describes a reason for using this viewpoint?

A.

To model the management of architecture change

B.

To help determine the priorities of implementation projects

C.

To relate programs and projects to the parts of the architecture that they implement

D.

To help in planning the transition from the current architecture to a desired future architecture

Full Access
Question # 15

Within the Implementation & Migration Extension, which concept is the only one that models behavior?

A.

Deliverable

B.

Plateau

C.

Gap

D.

Work Package

Full Access