Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The Open Group Exam OGEA-103 Topic 1 Question 26 Discussion

Actual exam question for The Open Group's OGEA-103 exam
Question #: 26
Topic #: 1
[All OGEA-103 Questions]

Please read this scenario prior to answering the question

You have been appointed as senior architect working for an autonomous driving technology development company. The mission of the company is to build an industry leading unified technology and software platform to support connected cars and autonomous driving.

The company uses the TOGAF Standard as the basis for its Enterprise Architecture (EA) framework. Architecture development within the company follows the purpose-based EA Capability model as described in the TOGAF Series Guide: A Practitioners'Approach to Developing Enterprise Architecture Following the TOGAF ADM.

An architecture to support strategy has been completed defining a long-range Target Architecture with a roadmap spanning five years. This has identified the need for a portfolio of projects over the next two years. The portfolio includes development of travel assistance systems using swarm data from vehicles on the road.

The current phase of architecture development is focused on the Business Architecture which needs to support the core travel assistance services that the company plans to provide. The core services will manage and process the swarm data generated by vehicles, paving the way for autonomous driving in the future.

The presentation and access to different variations of data that the company plans to offer through its platform poses an architecture challenge. The application portfolio needs to interact securely with various third-party cloud services, and V2X (Vehicle-to-Everything) service providers in many countries to be able to manage the data at scale. The security of V2X is a key concern for the stakeholders. Regulators have stated that the user's privacy be always protected, for example, so that the drivers' journey cannot be tracked or reconstructed by compiling data sent or received by the car.

Refer to the scenario

You have been asked to describe the risk and security considerations you would include in the current phase of the architecture development?

Based on the TOGAF standard which of the following is the best answer?

Show Suggested Answer Hide Answer
Suggested Answer: D

A security domain model is a technique that can be used to define the security requirements and policies for the architecture. A security domain is a grouping of assets that share a common level of security and trust. A security policy is a set of rules and procedures that govern the access and protection of the assets within a security domain.A security domain model can help to identify the security domains, the assets within each domain, the security policies for each domain, and the relationships and dependencies between the domains1

Since the data is being shared across partners, a security federation is needed to establish a trust relationship and a common security framework among the different parties. A security federation is a collection of security domains that have agreed to interoperate under a set of shared security policies and standards. A security federation can enable secure data exchange and collaboration across organizational boundaries, while preserving the autonomy and privacy of each party.A security federation requires contractual arrangements, and a definition of the responsibility areas for the data exchanged, as well as security implications2

A risk assessment is a process that identifies, analyzes, and evaluates the risks that may affect the architecture. A risk assessment can help to determine the likelihood and impact of the threats and vulnerabilities that may compromise the security and privacy of the data assets.A risk assessment can also help to prioritize and mitigate the risks, and to monitor and review the risk situation3

Therefore, the best answer is D, because it describes the risk and security considerations that would be included in the current phase of the architecture development, which is focused on the Business Architecture. The answer covers the security domain model, the security federation, and the risk assessment techniques that are relevant to the scenario.


Contribute your Thoughts:

Lawana
6 months ago
Ooh, option D sounds like it's got all the bases covered. Security federation, risk assessment, the whole nine yards. That's my pick!
upvoted 0 times
Arletta
5 months ago
Hildegarde: It's important to have clear responsibilities and security implications defined when sharing data with partners. Option D seems to address that well.
upvoted 0 times
...
Hildegarde
5 months ago
Definitely, having a security domain model and a security federation in place seems like a comprehensive approach.
upvoted 0 times
...
Brett
5 months ago
Option D sounds like it covers everything we need for security. I agree with you.
upvoted 0 times
...
...
Noel
6 months ago
Ha! I bet the developers are cringing at the thought of all this security stuff. But hey, gotta do what ya gotta do, right?
upvoted 0 times
Stevie
5 months ago
D) You will create a security domain model so that assets with the same level can be managed under one security policy. Since data is being shared across partners, you will establish a security federation to include them. This would include contractual arrangements, and a definition of the responsibility areas for the data exchanged, as well as security implications. You would undertake a risk assessment determining risks relevant to specific data assets.
upvoted 0 times
...
Johnetta
5 months ago
B) You will perform a qualitative risk assessment for the data assets exchanged with partners. This will deliver a set of priorities, high to medium to low, based on identified threats, the likelihood of occurrence, and the impact if it did occur. Using the priorities, you would then develop a Business Risk Model which will detail the risk strategy including classifications to determine what mitigation is enough.
upvoted 0 times
...
Eric
5 months ago
A) You will focus on the relationship with the third parties required for the travel assistance systems and define a trust framework. This will describe the relationship with each party. Digital certificates are a key part of the framework and will be used to create trust between parties. You will monitor legal and regulatory changes across all the countries to keep the trust framework in compliance.
upvoted 0 times
...
...
Colette
6 months ago
I disagree, I believe option D is more comprehensive in addressing the security considerations.
upvoted 0 times
...
Dorsey
6 months ago
Option C with the data quality and security classification seems like a good way to keep things organized and under control. Definitelyworthconsidering.
upvoted 0 times
...
Willow
6 months ago
Hmm, I don't know, the security federation in option D sounds pretty solid too. Gotta make sure that data's locked down tight, you know?
upvoted 0 times
...
Rhea
6 months ago
This looks like a tricky one. I think I'd go with option B - the risk assessment seems like the way to go, gotta cover those potential threats and impacts.
upvoted 0 times
Camellia
5 months ago
D) You will create a security domain model so that assets with the same level can be managed under one security policy. Since data is being shared across partners, you will establish a security federation to include them. This would include contractual arrangements, and a definition of the responsibility areas for the data exchanged, as well as security implications. You would undertake a risk assessment determining risks relevant to specific data assets.
upvoted 0 times
...
Coral
6 months ago
Yeah, definitely. It's important to have a clear understanding of the potential threats and their impacts.
upvoted 0 times
...
Sherita
6 months ago
I agree, option B seems like a solid choice. Identifying and prioritizing risks is crucial.
upvoted 0 times
...
Cassie
6 months ago
A) You will focus on the relationship with the third parties required for the travel assistance systems and define a trust framework. This will describe the relationship with each party. Digital certificates are a key part of the framework and will be used to create trust between parties. You will monitor legal and regulatory changes across all the countries to keep the trust framework in compliance.
upvoted 0 times
...
Jeanice
6 months ago
B) You will perform a qualitative risk assessment for the data assets exchanged with partners. This will deliver a set of priorities, high to medium to low, based on identified threats, the likelihood of occurrence, and the impact if it did occur. Using the priorities, you would then develop a Business Risk Model which will detail the risk strategy including classifications to determine what mitigation is enough.
upvoted 0 times
...
...
Kate
6 months ago
I think option A is the best choice.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77