Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The Open Group Exam OGEA-10B Topic 3 Question 4 Discussion

Actual exam question for The Open Group's OGEA-10B exam
Question #: 4
Topic #: 3
[All OGEA-10B Questions]

Please read this scenario prior to answering the question

You have been appointed as senior architect working for an autonomous driving technology development company. The mission of the company is to build an industry leading unified technology and software platform to support connected cars and autonomous driving.

The company uses the TOGAF Standard as the basis for its Enterprise Architecture (EA) framework. Architecture development within the company follows the purpose-based EA Capability model as described in the TOGAF Series Guide: A Practitioners'Approach to Developing Enterprise Architecture Following the TOGAF ADM.

An architecture to support strategy has been completed defining a long-range Target Architecture with a roadmap spanning five years. This has identified the need for a portfolio of projects over the next two years. The portfolio includes development of travel assistance systems using swarm data from vehicles on the road.

The current phase of architecture development is focused on the Business Architecture which needs to support the core travel assistance services that the company plans to provide. The core services will manage and process the swarm data generated by vehicles, paving the way for autonomous driving in the future.

The presentation and access to different variations of data that the company plans to offer through its platform poses an architecture challenge. The application portfolio needs to interact securely with various third-party cloud services, and V2X (Vehicle-to-Everything) service providers in many countries to be able to manage the data at scale. The security of V2X is a key concern for the stakeholders. Regulators have stated that the user's privacy be always protected, for example, so that the drivers' journey cannot be tracked or reconstructed by compiling data sent or received by the car.

Refer to the scenario

You have been asked to describe the risk and security considerations you would include in the current phase of the architecture development?

Based on the TOGAF standard which of the following is the best answer?

Show Suggested Answer Hide Answer
Suggested Answer: D

A security domain model is a technique that can be used to define the security requirements and policies for the architecture. A security domain is a grouping of assets that share a common level of security and trust. A security policy is a set of rules and procedures that govern the access and protection of the assets within a security domain.A security domain model can help to identify the security domains, the assets within each domain, the security policies for each domain, and the relationships and dependencies between the domains1

Since the data is being shared across partners, a security federation is needed to establish a trust relationship and a common security framework among the different parties. A security federation is a collection of security domains that have agreed to interoperate under a set of shared security policies and standards. A security federation can enable secure data exchange and collaboration across organizational boundaries, while preserving the autonomy and privacy of each party.A security federation requires contractual arrangements, and a definition of the responsibility areas for the data exchanged, as well as security implications2

A risk assessment is a process that identifies, analyzes, and evaluates the risks that may affect the architecture. A risk assessment can help to determine the likelihood and impact of the threats and vulnerabilities that may compromise the security and privacy of the data assets.A risk assessment can also help to prioritize and mitigate the risks, and to monitor and review the risk situation3

Therefore, the best answer is D, because it describes the risk and security considerations that would be included in the current phase of the architecture development, which is focused on the Business Architecture. The answer covers the security domain model, the security federation, and the risk assessment techniques that are relevant to the scenario.


Contribute your Thoughts:

Desiree
4 months ago
Forget the exam, let's just skip straight to building the self-driving cars. What could possibly go wrong with a few lines of code and some duct tape?
upvoted 0 times
Robt
3 months ago
D) You will create a security domain model so that assets with the same level can be managed under one security policy. Since data is being shared across partners, you will establish a security federation to include them. This would include contractual arrangements, and a definition of the responsibility areas for the data exchanged, as well as security implications. You would undertake a risk assessment determining risks relevant to specific data assets.
upvoted 0 times
...
Caitlin
3 months ago
C) You will focus on data quality as it is a key factor in risk management. You will identify the datasets that need to be safeguarded. For each dataset, you will assign ownership and responsibility for the quality of data needs. A security classification will be defined and applied to each dataset. The dataset owner will then be able to authorize processes that are trusted for a certain activity on the dataset under certain circumstances.
upvoted 0 times
...
Mona
3 months ago
B) You will perform a qualitative risk assessment for the data assets exchanged with partners. This will deliver a set of priorities, high to medium to low, based on identified threats, the likelihood of occurrence, and the impact if it did occur. Using the priorities, you would then develop a Business Risk Model which will detail the risk strategy including classifications to determine what mitigation is enough.
upvoted 0 times
...
Stefan
3 months ago
A) You will focus on the relationship with the third parties required for the travel assistance systems and define a trust framework. This will describe the relationship with each party. Digital certificates are a key part of the framework and will be used to create trust between parties. You will monitor legal and regulatory changes across all the countries to keep the trust framework in compliance.
upvoted 0 times
...
...
Matthew
4 months ago
With so many options, I feel like I'm trying to pick the best flavor of ice cream. They all sound delicious, but I'll have to go with the one that makes my taste buds tingle the most.
upvoted 0 times
...
Lashandra
4 months ago
The security domain model and federation approach looks comprehensive. Defining responsibilities and assessing risks for specific data assets is the way to go.
upvoted 0 times
...
Shanice
4 months ago
Data quality and security classification are key. Empowering dataset owners to manage access and authorization is a smart way to handle this.
upvoted 0 times
...
Alease
4 months ago
The risk assessment and Business Risk Model make a lot of sense. Prioritizing threats and impacts will help us focus on the most critical areas.
upvoted 0 times
Felix
3 months ago
D) You will create a security domain model so that assets with the same level can be managed under one security policy. Since data is being shared across partners, you will establish a security federation to include them. This would include contractual arrangements, and a definition of the responsibility areas for the data exchanged, as well as security implications. You would undertake a risk assessment determining risks relevant to specific data assets.
upvoted 0 times
...
Ivette
4 months ago
B) You will perform a qualitative risk assessment for the data assets exchanged with partners. This will deliver a set of priorities, high to medium to low, based on identified threats, the likelihood of occurrence, and the impact if it did occur. Using the priorities, you would then develop a Business Risk Model which will detail the risk strategy including classifications to determine what mitigation is enough.
upvoted 0 times
...
Wayne
4 months ago
A) You will focus on the relationship with the third parties required for the travel assistance systems and define a trust framework. This will describe the relationship with each party. Digital certificates are a key part of the framework and will be used to create trust between parties. You will monitor legal and regulatory changes across all the countries to keep the trust framework in compliance.
upvoted 0 times
...
...
Marvel
5 months ago
That's a good point, Leigha. Option D does seem comprehensive in addressing the security implications of data sharing.
upvoted 0 times
...
Leigha
5 months ago
I see your point, Alaine. However, I think option D is also a strong contender as it involves creating a security domain model and establishing a security federation with partners.
upvoted 0 times
...
Tonja
5 months ago
The trust framework and digital certificates seem like a solid approach to address the security concerns with third-party partners. Monitoring legal and regulatory changes is crucial too.
upvoted 0 times
Geoffrey
4 months ago
B) You will perform a qualitative risk assessment for the data assets exchanged with partners. This will deliver a set of priorities, high to medium to low, based on identified threats, the likelihood of occurrence, and the impact if it did occur. Using the priorities, you would then develop a Business Risk Model which will detail the risk strategy including classifications to determine what mitigation is enough.
upvoted 0 times
...
Geoffrey
5 months ago
A) You will focus on the relationship with the third parties required for the travel assistance systems and define a trust framework. This will describe the relationship with each party. Digital certificates are a key part of the framework and will be used to create trust between parties. You will monitor legal and regulatory changes across all the countries to keep the trust framework in compliance.
upvoted 0 times
...
...
Alaine
5 months ago
I disagree, I believe option B is the most suitable choice as it involves performing a qualitative risk assessment for data assets exchanged with partners.
upvoted 0 times
...
Marvel
5 months ago
I think option A is the best answer because it focuses on defining a trust framework with third parties and using digital certificates for trust.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77