400-888-5228

CBA業(yè)務架構師認證是由業(yè)務架構師公會(Business Architecture Guild?)授予的一種專業(yè)認證,也是業(yè)務架構領域的一項重要認證。該認證標志著持有者已經(jīng)掌握了業(yè)務架構的核心技能和知識,可以在實際工作中熟練運用業(yè)務架構技術和框架,與其他架構和學科形成有效的對接。

  • 中文名CBA業(yè)務架構師認證
  • 英文名Certified Business Architect
  • 英文簡稱CBA
  • 頒證機構Business Architecture Guild?(業(yè)務架構師公會)
  • 證書類別業(yè)務架構
  • 同類認證TOGAF

國際業(yè)務需求分析師CCBA認證模擬題

發(fā)布時間:2017.11.17

CCBA認證模擬題

  1.What factor can be assessed through key performance indicators (KPIs) aligned with enterprise measures, goals, and objectives for a project, process performance targets, or tests for a software application?
  a.Non performance.
  b.Performance.
  c.Solution acceptance.
  d.Value.
  2.Policies, budget, time, resource availability are all types of __________________ ?
  a.Capabilities.
  b.Risks.
  c.Resources.
  d.Constraints.
  3.What is the purpose of prioritizing requirements?
  a.To rank requirements in the order of relative importance.
  b.To determine which requirements carry the most risk.
  c.To determine which requirements should be completed first.
  d.To ensure requirements align to one another and manage the effects of any proposed change.
  4.Tony has listed a risk on the BA risk register that states, "The off-the-shelf solution will not interface with the existing accounting system without significant customization." Team members have asked him to remove it from the register. Why?
  a.Because the team has determined a solution.
  b.Because the statement is not a risk.
  c.Because it is a design risk and should be addressed by the solution architect.
  d.Because it is a solution risk that will be addressed by the delivery team.
  5."Atomic" is a characteristic of requirements and/or design quality. What does it mean?
  a.It is small; atom-like.
  b.It contains no extraneous or unnecessary content.
  c.It is self-contained and capable of being understood independently of other requirements or designs.
  d.It is at the level that will guide further work.
  6.Catherine is preparing to analyze requirements. She starts with conducting a thorough stakeholder analysis to identify stakeholders and analyze their characteristics. What technique is Catherine using?
  a.Organizational modeling.
  b.Stakeholder list, map, or personas.
  c.Roles and permissions matrix.
  d.Stakeholder analysis.
  7.You are planning the business analysis approach to use for the current initiative to which you have been assigned. However, engaging stakeholders presents significant challenge - especially when you invite them for meetings. No matter what you do, many don't show up! What would you try next?
  a.Reviews.
  b.Escalation.
  c.Interviews.
  d.Complete the planning alone to avoid falling behind schedule.
  8.Specifying and Modeling Requirements is a task in which of the following knowledge areas?
  a.Strategy Analysis.
  b.Requirements Analysis and Design Definition.
  c.Elicitation and Collaboration.
  d.Solution Evaluation.
  9.Which of the following is NOT an element in item tracking technique?
  a.Item Record.
  b.Item Identifier.
  c.Item Management.
  d.Metrics.
  10.What is the impact of the agile perspective on the planning and execution of elicitation and collaboration tasks?
  a.Minimal to none; elicitation and collaboration tasks are planned and executed similarly in an agile environment.
  b.While requirements are all elicited at the beginning of the project, they are not formally approved during the project.
  c.High level requirements are elicited at the beginning of the project; requirements are detailed right to the appropriate level right before their development begins.
  d.There is less emphasis on collaborative elicitation approaches.
  11.What are all of the core concepts within the context of requirements life cycle management?
  a.Comparison, need analysis.
  b.Change, need, solution, context, validation, solution.
  c.Change, need, solution, context, value, stakeholder.
  d.Context, change, solution.
  12.Which of the following is NOT a listed strength of developing a Roles and Permission Matrix?
  a.Provides procedural checks and balances, as well as data security, by restricting individuals from performing certain actions.
  b.Provides an opportunity for stakeholders to be involved in the planning process.
  c.Provides documented roles and responsibilities for activities.
  d.Promotes improved review of transaction history, in that audit logs can capture details about any assigned authorities at the time.
  13.Which of the following is an input to plan business analysis approach task?
  a.Designs.
  b.Solution scope.
  c.Requirements.
  d.Needs.
  14.Which of the following techniques would best help in visually uncovering interface requirements quickly and early in the analysis process?
  a.Activity diagrams.
  b.Prototyping.
  c.Entity relationship diagrams.
  d.Use cases.
  15.What should NOT be considered when evaluating whether or not a solution should be retired or replaced?
  a.Necessity.
  b.Future investment required.
  c.Sunk cost.
  d.Opportunity cost.
  16.A BA who relies solely on their technical knowledge might be least likely to utilize which of the following tools?
  a.Rational rose.
  b.Service oriented architecture.
  c.Mercury.
  d.Maslow's hierarchy of needs.
  17.Which of the following describe common non-functional requirement categories?
  a.Reliability, compatibility, scalability, dependability.
  b.Reliability, availability, scalability, traceability.
  c.Reliability, compatibility, scalability, localization.
  d.Reliability, readability scalability, localization.
  18.Which of the following guidelines/tools provides results of previous valuation that should be reviewed and incorporated into all planning approaches?
  a.Business policies.
  b.Methodologies and frameworks.
  c.Business analysis performance assessment.
  d.Expert judgment.
  19.What are all the inputs to the Define Requirements Architecture task?
  a.Information Management Approach, Requirements (traced), Solution Scope.
  b.Information Management System, Requirements (any state), Solution Scope.
  c.Information Management Approach, Requirements (any state), Solution Scope.
  d.Information Management System, Requirements (traced), Solution Scope.
  20.Which of the following are outputs of the task Define Future State?
  a.Business goals and objectives, capability analysis, potential value.
  b.Business objectives, future state description, potential value.
  c.Business goals and objectives, future state description, potential value.
  d.Business objectives, capability analysis, potential value.
  21.Which of the following stakeholders are included in the task Verify Requirements?
  a.All stakeholders.
  b.Business analyst; domain subject matter experts; developers; architects.
  c.Business analyst; domain subject matter experts; developers; testers.
  d.Business analyst; domain subject matter experts; architects; testers.
  22.What is the difference between noun and verb concepts in a concept model?
  a.Noun concepts are the most basic concepts in the model and verb concepts make connections between them.
  b.There are no noun and verb concepts in a concept model.
  c.Noun concepts are tangible while verb concepts describe the actions performed by nouns.
  d.Both noun and verb concepts must be present in a concept model.
  23.What is the key reason for maintaining requirements?
  a.To build a database of requirements that will ensure requirements are not missed in development.
  b.To manage the requirements throughout the requirements life cycle and enable re-use of those requirements in other solutions.
  c.To help ensure testing is performed effectively and requirements are traced to test cases.
  d.To ensure organizational assets are updated and managed.
  24.There are several situations in which requirements can be reused. Which of the following statements is accurate regarding requirements reuse?
  a.Requirements at low levels of abstraction may be written with limited reference to specific solutions and therefore are more reusable.
  b.Requirements that are represented in a general manner, without direct ties to a particular tool or organizational structure, tend to be less reusable.
  c.As requirements are expressed in more detail, they become more tightly associated with a specific solution or solution option.
  d.Specific references to applications or departments increase the reuse of requirements and designs across an organization.
  25.Data dictionaries are used to standardize the definitions of data elements within the context of a solution. What data model is oftentimes partnered with a data dictionary?
  a.Swim lane diagram.
  b.Sequence diagram.
  c.Activity diagram.
  d.Entity relationship diagram.
  26.You have just completed your requirements workshop. Who should be involved with capturing the elicitation outcomes from the workshop?
  a.Business analyst and project manager.
  b.Business analyst.
  c.Business analyst, project manager, and scribe.
  d.Business analyst and scribe.
  27.Troy is designing a web form for his online registration project. In order to allow stakeholders to provide input and feedback early, he decides to provide them with a prototype. Which of the following would NOT be a consideration for him?
  a.Prototyping approach.
  b.Prototyping examples.
  c.Stakeholders knowledge of prototypes.
  d.Prototyping methods.
  28.How does the BABOK define a business rule?
  a.A business rule is a specific, testable directive that serves as a criterion for guiding behavior, shaping judgments, or making decisions.
  b.A capability or condition needed on a particular project to solve a problem or achieve an objective.
  c.Expressed as a relationship between one entity/business object and another.
  d.A regulation that an organization must adhere to.
  29.In order to confidently analyze the current state of an enterprise, what must the BA utilize as an input?
  a.Confirmed elicitation results.
  b.Unconfirmed elicitation results.
  c.Elicitation activity plan.
  d.Interview and workshop transcripts.
  30.What are the inputs for the verify requirement task?
  a.Requirements in transition.
  b.Requirements (signed off).
  c.Requirements (validated).
  d.Requirements (specified and modeled).
  31.Which of the following considerations is NOT addressed when assessing the impact of a proposed change?
  a.The business analyst evaluates the impact of any change to the dependencies between requirements.
  b.The business analyst evaluates cost of the change, the cost of any associated work, and opportunity costs.
  c.The business analyst evaluates the impact of the change on customers and business processes.
  d.The business analyst evaluates the benefit that will be gained by accepting the change.
  32.IDEF, BPMN, and IGOE are types of notations utilized in which of the following models?
  a.Data models.
  b.Conceptual models.
  c.State models.
  d.Process models.
  33.Continual prioritization is best described by the following statement:
  a.Initially, prioritization is done at a higher level of abstraction. As the requirements are further refined, prioritization is done at a more granular level and will incorporate additional bases for prioritization as they become appropriate.
  b.Stakeholders may also have difficulty characterizing any requirement as a lower priority, and this may impact the ability to make necessary trade-offs.
  c.Requirements are prioritized is agreed upon by relevant stakeholders as defined in the business analysis planning and monitoring knowledge area.
  d.The chance that the requirement cannot deliver the potential value, or cannot be met at all. This may include many factors such as the difficulty of implementing a requirement, or the chance that stakeholders will not accept a solution component.
  34.The senior business analyst requested that all requirements be self-contained and capable of being understood independently of other requirements or designs. Which characteristic of requirements and design is the senior business analyst requesting?
  a.Unambiguous.
  b.Consistent.
  c.Complete.
  d.Atomic.
  35.What are the input(s) to the plan business analysis governance task?
  a.Business analysis approach and performance objectives (external).
  b.Needs and business analysis approach.
  c.Business analysis approach and stakeholder engagement approach.
  d.Needs.
  36.What is the purpose of the information management approach in defining requirements architecture?
  a.To trace business rules to requirements that they support.
  b.It defines the level of detail at which information should be captured.
  c.Defines how the business analysis information will be stored and accessed.
  d.Defines the relationships between requirements, designs, and solution components.
  37.A senior business analyst was discussing the reason why she was using an onion diagram to address the concerns of the client regarding resources in the organization who will be involved with the solution. The BA provided which of the following responses?
  a.An onion diagram will help identify stakeholders.
  b.An onion diagram indicates how involved the stakeholders will be with the solution, which stakeholders will directly interact with the solution, which are internal or external to the organization.
  c.An onion diagram will determine impacted stakeholders who are internal and external to the organization.
  d.An onion diagram indicates which stakeholders will directly interact with the solution.
  38.What is the output of the manage stakeholder collaboration task?
  a.Stakeholder engagement.
  b.Stakeholder list, maps, and personas.
  c.Stakeholder collaboration.
  d.Business analysis performance assessment.
  39.Which technique below is used to produce numerous new ideas, and to derive from them themes for further analysis?
  a.Non-functional requirement analysis.
  b.Lessons learned process.
  c.Brainstorming.
  d.Decision Analysis.
  40.Which guideline and tool is NOT leveraged to support assessing solution limitations?
  a.Change strategy.
  b.Future state description.
  c.Risk analysis results.
  d.Solution scope.
  41.Which of the following would NOT be considered a strength of creating a glossary?
  a.A glossary promotes common understanding of the business domain and better communication among all stakeholders.
  b.Capturing the definitions as part of an enterprise's documentation provides a single reference and encourages consistency.
  c.Simplifies the writing and maintenance of other business analysis information including but not limited to requirements, business rules, and change strategy.
  d.It is an essential input into the data dictionary.
  42.Which of the following stakeholders will be more focused on prioritization being consistent with legal and regulatory constraints?
  a.Project manager.
  b.Regulator.
  c.Implementation SME.
  d.Sponsor.
  43.What is the key difference between a state transition and state diagram?
  a.A state diagram describes how the entity changes from one state to another; a state transition shows the life cycle of one entity.
  b.A state transition describes how the entity changes from one state to another; a state diagram shows the life cycle of one entity.
  c.A state diagram is conceptual; a state transition is more detailed and operational.
  d.A state transition is conceptual; a state diagram is more detailed and operational.
  44.What task needs to occur before a change can be assessed?
  a.Determine the cost of the change.
  b.Establish the requirements baseline.
  c.Determine the specific stakeholder who will implement the change.
  d.Analyze the impact(s) of the change.
  45.Jessica is a business analyst planning a meeting to assess the risks associated with achieving the future state of an enterprise. Who are some of the stakeholders she should invite?
  a.Sponsor, domain subject matter experts, suppliers, project manager, end-users.
  b.Sponsor, domain subject matter experts, suppliers, regulators, end-users.
  c.Sponsor, domain subject matter experts, suppliers, project manager, testers.
  d.Sponsor, domain subject matter experts, suppliers, project manager, customers.
  46.When does the requirements life cycle end?
  a.When all requirements have been approved and the solution is deployed.
  b.When the solution is retired and its associated requirements are archived.
  c.When the solution is retired and any eligible requirements are made re-usable.
  d.When the solution and the requirements that represent it are retired.
  47.Which of the following is the best definition of a "need" which is an input to many BA tasks?
  a.A need is synonymous with a requirement.
  b.A need is synonymous with business requirements.
  c.A problem or opportunity to be addressed.
  d.The perceived gap between business goals and the current state environment.
  48.Which techniques might you use during the Assess Risks task?
  a.Brainstorming; functional decomposition; root cause analysis.
  b.Brainstorming; root cause analysis; variance analysis.
  c.Brainstorming; financial analysis; lessons learned.
  d.Brainstorming; benchmarking; lessons learned.
  49.According to the BABOK, which of the following are the valid five tasks task for elicitation and collaboration knowledge area?
  a.Prepare for elicitation, conduct elicitation, confirm elicitation results, communicate business analysis information, and verify the outcomes of the solution.
  b.Prepare for elicitation, conduct elicitation, confirm elicitation results, document elicitation, and communicate business analysis information.
  c.Prepare for elicitation, conduct elicitation, confirm elicitation results, communicate business analysis information, and facilitate stakeholder engagement.
  d.Prepare for elicitation, conduct elicitation, confirm elicitation results, communicate business analysis information, and manage stakeholder collaboration.
  50.The following are guidelines and tools under the Validate Requirements task. Which one is NOT?
  a.Business objectives.
  b.Future state description.
  c.Potential solution.
  d.Solution scope.
 

國際業(yè)務需求分析師CCBA認證培訓
Certification of Capability in Business Analysis;(CCBA)

艾威簡介:

  艾威學院(Avtech Institute of Technology)為 IIBA 在中國大陸_授權認證教育機構
  (EEP)( Endorsed Education Providers (EEP)機構列表),使用 IIBA 授權之業(yè)務分析師教材(BABOK 3.0);核發(fā)國際業(yè)務需求分析師認證 (CCBA)專業(yè)學分(28CDUs).
 

課程概述:

  CCBA全稱(Certification of Capability in Business Analysis),本課程是依據(jù) BABOK 3.0 講解,除提供 IIBA 原版英文書籍外,并搭配講師精心整理并符合考試重點的課程強化講義與 BA 習題集,大幅節(jié)省學員自行摸索的時間。艾威培訓的商業(yè)分析講師會融入十年豐富的 BA 經(jīng)驗,讓學員將學習到如何規(guī)劃與監(jiān)控商業(yè)分析、需求導出和協(xié)同合作、需求生命周期管理、策略分析、需求分析和設計定義、解決方案評估等六大知識領域與技術,并將之導入商業(yè)分析程序的各個階段,進而將概念雛型轉換成明確的各級需求與解決方案,大幅提高解決方案與交付物的成功率。
 
國際業(yè)務需求分析師CCBA認證模擬題 -- 第1張

課程目標:

國際業(yè)務需求分析師CCBA認證模擬題 -- 第3張

  了解 BA 商業(yè)分析流程與相關工具 & 技術
  促進跨部門同事 BA 經(jīng)驗分享 (Workshop)
  幫助學員通過國際商業(yè)分析 CCBA 認證。

課程對象:

  商業(yè)分析師、需求分析師、欲獲得 CCBA 認證項目經(jīng)理、產(chǎn)品經(jīng)理,需求經(jīng)理、流程經(jīng)理;
  企業(yè)架構師(EA)、系統(tǒng)分析師(SA)、系統(tǒng)架構師(SD) 及持有 PMP 認證、持續(xù)學習者;
  HR、供應鏈、市場管理者、顧問、解決方案參與者及對商業(yè)分析工作有興趣、想學習完整商業(yè)分析方法者

培訓時長:4天

CCBA證書含金量:

  對個人的效益:
  提升業(yè)務需求分析理論和實戰(zhàn)能力;
  CCBA是全球普遍認可的職業(yè)認證;
  CCBA認證獲得同事及領導的普遍認同,帶來更佳職涯發(fā)展?jié)摿Γ?/div>
  不管是BA崗位、還是其他崗位的人員,獲得更好的職業(yè)晉升機會;
  對組織的效益:
  對客戶、競爭對手、供應商、職員和投資者進行有效的業(yè)務需求分析;更可靠的業(yè)務需求分析結果, 獲得更高的解決方案質量。

授課方式:

傳統(tǒng)的面對面授課方式。

課程大綱:

1 概論
? IIBA 簡介
? 什么是商業(yè)分析
? 誰是商業(yè)分析師
? 商業(yè)分析知識體系(BABOK)的目的與架構
? 知識領域、技巧、任務、基本能力、觀點
? IIBA認證架構介紹(CCBA/CBAP/ECBA)
2 重要概念
? 商業(yè)分析核心概念模型
? 重要詞匯
? 需求分類概要
? 利害關系人
? 需求和設計
3 規(guī)劃與監(jiān)控商業(yè)分析
? 規(guī)劃商業(yè)分析的方法
? 規(guī)劃利害關系人參與
? 規(guī)劃商業(yè)分析治理
? 規(guī)劃商業(yè)分析信息管理
? 找出商業(yè)分析績效改善
4 需求導出和協(xié)同合作
? 準備需求導出
? 進行需求導出
? 確認需求導出結果
? 溝通商業(yè)分析信息
? 管理關系人協(xié)同合作
5 需求生命周期管理
? 追蹤需求
? 維護需求
? 需求排優(yōu)先序
? 評估需求改變
? 核準需求
6 策略分析
? 分析目前狀態(tài)
? 定義未來狀態(tài)
? 評估風險
? 定義改變策略
7 需求分析和設計定義
? 明確說明和模塊化需求
? 厘清需求
? 驗證需求
? 定義需求結構
? 定義設計選項
? 分析潛在價值及推薦解決方案
8 解決方案評估與確認
? 測量解決方案績效
? 分析績效測量結果
? 評估解決方案的限制
? 評估企業(yè)的限制
? 推薦行動以增加解決方案的價值
9 商業(yè)分析必備的能力
? 分析性思考和解決問題
? 行為特質
? 商業(yè)知識
? 溝通技巧
? 互動技巧
? 工具和科技
10 觀點 Perspective
? 敏捷觀點
? 商業(yè)智慧觀點
? 信息科技觀點
? 商業(yè)架構觀點
? 商業(yè)流程管理觀點
11  案例與演練
? 課程回顧與評量
? 案例實作與分組討論 (Workshop)
?

發(fā)表回復

您的電子郵箱地址不會被公開。 必填項已用*標注

  • 2024-11-28 20:00
    智能財務運營的未來視角:RPA與AI技術的融合應用
  • 2024-11-29 14:00
    周五課堂:如何帶團隊?靠什么服眾?那些無處不在的“軟技能”
  • 2024-12-04 20:00
    職場故事:PMP與BA的協(xié)同與本地化策略
  • 2024-12-05 20:00
    職場故事:策劃崗如何快速學習新領域新知識?Get新技能√
  • 2024-12-10 20:00
    數(shù)字化轉型與TOGAF:不謀全局者,不足謀一隅,數(shù)字化轉型的“頂層設計”
  • 2024-12-12 20:00
    神秘莫測:密碼學和加密解密
  • 2024-12-17 20:00
    財務運營智能化與數(shù)據(jù)驅動:商業(yè)智能(BI)系統(tǒng)的實施與運用
  • 2024-12-19 20:00
    職場故事:項目管理的藝術與日常
  • 2024-12-25 20:00
    案例分析:深入探討商業(yè)分析工具的實際應用
  • 2024-12-26 20:00
    存量數(shù)據(jù)“由亂到治”:如何解決已有數(shù)據(jù)的數(shù)據(jù)質量問題?
  • 更多直播講座
    小艾老師還在安排中…
查看全部 >

掃碼一鍵預約全部

查看更多 > 查看更多 >

數(shù)字化轉型8大核心認證

  1. PMP項目管理認證

    艾威最近一期班: 針對2025年03月考試
  2. CBAP業(yè)務分析認證

    艾威最近一期班·開課時間: 2025-01-18
  3. CBPP流程管理認證

    艾威最近一期班·開課時間: 2025-03-15
  4. ITIL4 IT管理認證

    艾威最近一期班·開課時間: 2025-01-18
  5. TOGAF企業(yè)架構認證

    艾威最近一期班·開課時間: 2025-01-18
  6. CDMP數(shù)據(jù)管理認證

    艾威最近一期班·開課時間: 2025-02-22
  7. CISA信息安全審計師認證

    艾威最近一期班·開課時間: 2025-03-02
  8. CISSP信息安全專家認證

    艾威最近一期班·開課時間: 2025-02-15
近期課程安排