Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

OGEA-103 Exam Dumps - The Open Group Enterprise Architecture Questions and Answers

Question # 34

Please read this scenario prior to answering the question

You are employed as an Enterprise Architect, reporting to the Chief Enterprise Architect, at a technology company. The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice.

The nature of the business is such that the data and the information stored on the company systems is the company's major asset and is highly confidential. The company employees travel a lot for work and need to communicate over public infrastructure. They use message encryption, secure internet connections using Virtual Private Networks (VPNs), and other standard security measures. The company has provided computer security awareness training for all its staff. However, despite good education and system security, there is still a need to rely on third-party suppliers for infrastructure and software.

The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education, and support, the company could be a victim of a significant attack that could completely lock them out of their important data.

A risk assessment has been completed and the company has looked for cyber insurance that covers ransomware. The price for this insurance is very high. The CTO recently saw a survey that said 1 out of 4 businesses that paid ransoms could not get their data back, and almost the same number were able to recover the data without paying. The CTO has decided not to get cyber insurance to cover ransom payment.

The Chief Technology Officer (CTO) is the sponsor of the EA project. The practice uses an iterative approach for its architecture development. This has enabled the decision makers to gain valuable insights into the different aspects of the business.

Refer to the scenario

You have been asked to describe the steps you would take to strengthen the current architecture to improve data protection.

Based on the TOGAF standard which of the following is the best answer?

Options:

A.

You would ensure that the business value and cost of continuity measures are understood by key stakeholders and would ensure that the company has in place up-to-date processes for managing change to the current Enterprise Architecture. You recommend that mitigation for a ransomware attach be addressed at the infrastructure level with specific technology controls. Changes should be made to the baseline description of the Technology Architect

B.

You would hold an Architecture Compliance Review with the scope to examine the company's ability to respond to ransomware attacks. You would identify the departments involved and have them nominate representatives. You would then tailor checklists to address the requirement for increased business continuity and resilience. You would circulate to the nominated representatives for them to complete. You would then review the completed checklis

C.

You would run an assessment to identify the business continuity requirements and analyze thecurrent Enterprise Architecture for gaps. You would create a change request to start a further cycle of architecture work to address changes to mitigate such an attack. You would arrange a meeting of the Architecture Board to assess and approve the change request. Once approved you would create a new Request for Architecture Work to begin an ADM cycl

D.

You would contact existing suppliers for technology that could enhance the company's capabilities to detect, react, and recover from an incident. You would perform an analysis and assessment of a simulated ransomware attack to evaluate the current Enterprise Architecture's resilience and recovery capabilities. Using the findings, you would prepare a gap analysis of the current Enterprise Architecture. You would prepare change requests to ad

Buy Now
Question # 35

Scenario

You are working as an Enterprise Architect within an Enterprise Architecture (EA) team at a global company that sells consumer products. The company produces many products that buyers use and enjoy.

The company has announced a major change to its products that will occur over a four-year period. This change includes the introduction of digital products and services. An architecture to support this strategy has been finished, along with a roadmap for a set of projects to implement this significant change. This will be a cross-functional effort between the product design and software teams. It is planned to be developed in phases.

The company faces a challenge in presenting and providing access to different services through its products and digital platforms while ensuring compliance with data privacy laws. In some countries and regions, the data residency requirements mean that the company has to store certain data within the region where it is collected. As a result, the company’s application portfolio and infrastructure must connect with various cloud services and data repositories in different countries.

The EA team has inherited the architecture used by the current products, some of which can be carried over to the new products. The EA team has started to define which parts of the architecture to carry forward. Enough of the Business Architecture has been defined so that work can commence on the Information Systems and Technology Architectures. Those architectures need to be defined to support the key digital services that the company plans to provide.

The company uses the TOGAF Standard as the foundation for its Enterprise Architecture framework, and architecture development follows the purpose-based EA Capability model outlined in the TOGAF Series Guide: A Practitioner’s Approach to Developing Enterprise Architecture Following the TOGAF ADM. The EA team reports to the Chief Information Officer (CIO), who oversees the program.

You have been asked how to decide and organize the work to deliver the requested architectures.

Based on the TOGAF standard, which of the following is the best answer?

Options:

A.

You refer to the superior architecture for guidance. You review the projects identified, their dependencies, and synergies, then decide the sequence for starting the projects. You develop high-level architecture descriptions. For each project, you determine how much work is needed, identify reference architectures, and candidate building blocks. You identify the resource needs taking into account cost and value. You document the different o

B.

You look outside the company to study how other companies organize their data models and application portfolios. You create just enough architecture description for the Application, Data, and Technology Architectures to identify the different options. For each project, this includes identification of candidate architecture and solution building blocks. You then identify solution providers, perform a readiness assessment, and assess the viab

C.

You research leading data companies, using your findings to help in developing high-level Target Data, Application, and Technology Architectures. You review the Architecture Vision to determine the level of detail, time, and scope of the ADM cycle phases required for each project. You identify and estimate the cost of the main resources. You then prepare an Architecture Roadmap and request the Architecture Board to review the roadmap. You t

D.

You commence an iteration of ADM Phase A, identifying the stakeholders and revising the Architecture Vision. You perform a Stakeholder Analysis and update the Stakeholder Map. You conduct workshops and interviews to reflect the stakeholders who are now the key drivers for the digital products and services. You coordinate with the CIO to ensure alignment with the overall roadmap and update the Implementation and Migration Plan accordingly.

Buy Now
Question # 36

Please read this scenario prior to answering the question

You are the Lead Enterprise Architect at a major agribusiness company. The company's main

annual harvest is lentils, a highly valued food grown worldwide. The lentil parasite, broomrape,

has been an increasing concern for many years and is now becoming resistant to chemical

controls. In addition, changes in climate favor the propagation and growth of the parasite. As a

result, the parasite cannot realistically be exterminated, and it has become pandemic, with lentil

yields falling globally.

The CEO appreciates the seriousness of the situation and has set out a change in direction

that is effectively a new business for the company. There are opportunities for new products,

and new markets. The company will use the fields for another harvest and will cease to process

third-party lentils. Thus, the target market will change, and the end-products will be different

and more varied. This is a major decision and the CEO has stated a desire to repurpose rather

than replace so as to manage the risks and limit the costs.

The company has a mature Enterprise Architecture practice based in its headquarters and uses

the TOGAF standard as the method and guiding framework. The practice has an established

Architecture Capability, and uses iteration for architecture development. The CIO is the sponsor

of the activity.

The CIO has assigned the Enterprise Architecture team to this activity. At this stage there is no

shared vision, or requirements.

Refer to the scenario

You have been asked to propose the best approach for architecture development to realize the

CEO's change in direction for the company.

Based on the TOGAF standard which of the following is the best answer?

Options:

A.

You propose that the team focus on architecture definition, with emphasis on definingthe change parameters to support this new business strategy that the CEO hasidentified. Once understood, the team will be in the best position to identify therequirements, drivers, issues, and constraints for the change. You would ensure that thearchitecture development addresses non-functional requirements to assure that thetarget architecture is robust an

B.

You propose that this engagement define the baseline Technology Architecture first inorder to assess the current infrastructure capacity and capability for the company. Thenthe focus should be on transition planning and incremental architecture deployment.This will identify requirements to ensure that the projects are sequenced in an optimalfashion so as to realize the change.

C.

You propose that the priority is to understand and bring structure to the definition of thechange. The team should focus iteration cycles on a baseline first approach toarchitecture development, and then transition planning. This will identify what needs tochange in order to transition from the baseline to the target, and can be used to work outin detail what the shared vision is for the change.

D.

You propose that the team focus its iteration cycles on architecture development bygoing through the architecture definition phases (B-D) with a baseline first approach.This will support the change in direction as stated by the CEO. It will ensure that thechange can be defined in a structured manner and address the requirements needed torealize the change.

Buy Now
Question # 37

Scenario

Your role is that of an Enterprise Architect, reporting to the Chief Enterprise Architect, at a technology company.

The company uses the TOGAF standard as the method and guiding framework for its Enterprise Architecture (EA) practice. The Chief Technology Officer (CTO) is the sponsor of the activity. The EA practice uses an iterative approach for its architecture development. This has enabled the decision-makers to gain valuable insights into the different aspects of the business.

The nature of the business is such that the data and the information stored on the company systems is the company’s major asset and is highly confidential. The company employees travel a lot for work and need to communicate over public infrastructure. They use message encryption, secure internet connections using Virtual Private Networks (VPNs), and other standard security measures. The company has provided computer security awareness training for all its staff. However, despite good education and system security, there is still a need to rely on third-party suppliers for infrastructure and software.

The Chief Security Officer (CSO) has noted an increase in ransomware (malicious software used in ransom demands) attacks on companies with a similar profile. The CSO recognizes that no matter how much is spent on education and support, the company could be a victim of a significant attack that could completely lock them out of their important data.

A risk assessment has been completed, and the company has looked for cyber insurance that covers ransomware. The price for this insurance is very high. The CTO recently saw a survey that said 1 out of 4 businesses that paid ransoms could not get their data back, and almost thesame number were able to recover the data without paying. The CTO has decided not to get cyber insurance to cover ransom payment.

You have been asked to describe the steps you would take to strengthen the current architecture to improve data protection.

Based on the TOGAF standard, which of the following is the best answer?

Options:

A.

You would ensure that the company has in place up-to-date processes for managing change to the current Enterprise Architecture. Based on the scope of the concerns raised, you recommend that this be managed at the infrastructure level. Changes should be made to the baseline description of the Technology Architecture. The changes should be approved by the Architecture Board and implemented by change management techniques.

B.

You would request an Architecture Compliance Review with the scope to examine the company’s ability to respond to ransomware attacks. You would identify the departments involved and have them nominate representatives. You would then tailor checklists to address the requirement for increased resilience. You would circulate to the nominated representatives for them to complete. You would then review the completed checklists, identifying and r

C.

You would monitor for technology updates from your existing suppliers that could enhance the company’s capabilities to detect, react, and recover from an IT security incident. You would prepare and run a disaster recovery planning exercise for a ransomware attack and analyze the performance of the current Enterprise Architecture. Using the findings, you would prepare a gap analysis of the current Enterprise Architecture. You would prepare c

D.

You would assess business continuity requirements and analyze the current Enterprise Architecture for gaps. You would recommend changes to address the situation and create a change request. You would engage the Architecture Board to assess and approve the change request. Once approved, you would create a new Request for Architecture Work to begin an ADM cycle to implement the changes.

Buy Now
Question # 38

Please read this scenario prior to answering the question

You are serving as the Lead Architect for an Enterprise Architecture team within a leading multinational biotechnology company. The company works in three major industries, including healthcare, crop production, and agriculture. Your team works within the healthcare division.

The healthcare division is developing a new vaccine, and has to demonstrate its effectiveness and safety in a set of clinical trials that satisfy the regulatory requirements of the relevant health authorities. The clinical trials are undertaken by its research laboratories at multiple facilities worldwide. In addition to internal research and development activities, the healthcare division is also involved in publicly funded collaborative research projects with industrial and academic partners.

The Enterprise Architecture team has been engaged in an architecture project to develop a secure system that will allow the healthcare researchers to share information more easily about their clinical trials, and work more collaboratively across the organization and also with its partners. This system will also connect with external partners.

The Enterprise Architecture team uses the TOGAF ADM with extensions required to support healthcare manufacturing practices and laboratory practices. Due to the highly sensitive nature ofthe information that is managed, special care has been taken to ensure that each architecture domain considers the security and privacy issues that are relevant.

The Vice President for Worldwide Clinical Research is the sponsor of the Enterprise Architecture activity. She has stated that disruptions must be minimized for the clinical trials, and that the rollout must be undertaken incrementally.

Refer to the scenario

You have been asked to recommend the approach to identify the work packages for an incremental rollout meeting the requirements.

Based on the TOGAF standard which of the following is the best answer?

Options:

A.

You recommend that the Solution Building Blocks from a Consolidated Gaps, Solutions and Dependencies Matrix be grouped into a set of work packages. Using the matrix as a planning tool, regroup the work packages to account for dependencies. Sequence the work packages into the Capability Increments needed to achieve the Target Architecture, so that the implementation team can schedule the rollout one region at a time to minimize disruption. D

B.

You recommend that a Consolidated Gaps. Solutions and Dependencies Matrix is used as a planning tool for creating work packages. For each gap classify whether the solution is either a new development, purchased solution, or based on an existing product. Group the similar solutions together to define the work packages. Regroup the work packages into a set of Capability Increments to transition to the Target Architecture considering the sched

C.

You recommend that an Implementation Factor Catalog is drawn up to indicate actions and constraints. A Consolidated Gaps. Solutions and Dependencies Matrix should also be created. For each gap. identify a proposed solution and classify it as new development, purchased solution, or based on an existing product. Group similar activities together to form work packages. Identify dependencies between work packages factoring in the clinical trial

D.

You recommend that the set of required Solution Building Blocks be determined by identifying those which need to be developed and which need to be procured. Eliminate any duplicates. Group the remaining Solution Building Blocks together to create the work packages using a CRUD (create, read, update, delete) matrix. Rank the work packages and select the most cost-effective options for inclusion in a series of Transition Architectures. Schedu

Buy Now
Question # 39

Scenario:

You are working as an Enterprise Architect at a large company. The company runs a chain of home improvement stores, as well as a website for selling products. The website lets many brands work with the company.

The stores open seven days a week and use a standard method to track sales and inventory. This involves sending accurate and timely sales data to a central inventory management system that can predict demand, adjust stock levels, and automate reordering. The website is supported by regional fulfillment centers and also uses the central inventory management system. The central inventory management system is housed at the company’s central data center.

The company has agreed to merge with a major competitor. The leadership teams of both organizations have said they are committed to a smooth transition for customers. All stores will keep their own brand names. They will combine the systems of the organizations, which includes merging retail operations and systems. Duplicated systems will be replaced with one standard retail management system. Additionally, they will reduce the number of applications being used. The CIO expects that these changes will lead to substantial cost savings for the newly merged company.

An enterprise plan for both organizations has been created. The aim is to set priorities for the transition, especially in terms of information management and application development. It is crucial to make decisions that will create long-term value.

The company has a mature Enterprise Architecture (EA) practice and uses the TOGAF standard for its architecture development method. The EA program is sponsored by the Chief Information Officer (CIO).

The Request for Architecture Work to oversee the transition has been approved. The project has been scoped, and you have been assigned to work on it.

You have been asked to confirm the most relevant architecture principles for the transition.

Based on the TOGAF Standard, which of the following is the best answer?

Options:

A.

Control Technical Diversity, Interoperability, Data is an Asset, Data is Shared, Business Continuity

B.

Service Orientation, Compliance with the Law, Requirements Based Change, Responsive Change Management, Data Security

C.

Common Use Applications, Data is an Asset, Common Vocabulary and Data Definitions, Maximize Benefit to the Enterprise, Business Continuity

D.

Ease of Use, Common Use Applications, Data is an Asset, Technology Independence, Business Continuity

Buy Now
Question # 40

Full Scenario (Complete and Unmodified):

You are employed as an Enterprise Architect at a healthcare company. The company operates over 250 hospitals and is dedicated to transforming healthcare with new ideas and advancements. The company has multiple divisions including surgery centers, freestanding emergency departments, urgent care clinics, and physician practices. They also develop and supply a range of products and services, many with specialized systems and clinical needs.

The company's Enterprise Architecture (EA) department has been operating for several years and has mature, well-developed architecture governance and development processes following the TOGAF standard. The Chief Information Officer (CIO) is the sponsor of the Enterprise Architecture program.

Healthcare is a highly controlled sector, and the company must maintain robust security practices to keep patient information private and prevent data breaches. The company shares electronic health records with multiple providers and has standardized its medical coding for billing and reporting.

Many of the company’s rivals have begun using Artificial Intelligence (AI) in their operations, and the indications are that this will be transformative for healthcare delivery. This is something the EA department has been interested in for a while, and they had recently submitted an architecture Change Request which was approved. As a result, the CIO has approved a Request for Architecture Work to implement AI-based solutions in the company.

The project has been established and you have been assigned to work on it. Stakeholders, concerns, and business requirements have been identified. The stakeholders have made it clear that timely implementation of changes can be life-critical, and that changes should be focused on improving patient outcomes. They also have a concern about disruption due to the changes and require the systems to preserve clinical data access and maintain critical life-support systems during any outages.

The scope of what is inside and what is outside the architecture efforts has now been confirmed. Your task is to revisit and review the Architecture Principles, as they form part of the constraints on architecture work.

Question:

The EA team leader has asked you to explain which Architecture Principles are most relevant for this project.

Based on the TOGAF standard, which of the following is the best answer?

(Assume the company follows the example Architecture Principles from the TOGAF ADM Techniques – Architecture Principles chapter.)

Options:

A.

Compliance with the Law, Interoperability, Control Technical Diversity

B.

Responsive Change Management, Primacy of Principles, Maximize Benefit to the Enterprise

C.

Common Vocabulary and Data Definitions, Data Security, Requirements-Based Change

D.

Common Use Applications, Information Management Is Everybody’s Business, Data Is Accessible

Buy Now
Question # 41

You are working as an Enterprise Architect at a large company. The company runs many retail stores as well as an online marketplace that allows hundreds of brands to partner with the company. The company has a mature Enterprise Architecture (EA) practice and uses the TOGAF standard for its architecture development method. The EA practice is involved in all aspects of the business, with oversight provided by an Architecture Board with representatives from different parts of the business. The EA program is sponsored by the Chief Information Officer (CIO).

Many of the stores remain open all day and night. Each store uses a standard method to track sales and inventory, which involves sending accurate, timely sales data to a central AI-based inventory management system that can predict demand, adjust stock levels, and automate reordering. The central inventory management system is housed at the company’s central data center.

The company has acquired a major rival. The Chief Executive Officer (CEO) believes that the merger will enable growth through combined offerings and cost savings. The decision has been made to fully integrate the two organizations, including merging retail operations and systems. Duplicated systems will be replaced with one standard retail management system. The CIO expects significant savings from these changes across the newly merged company.

The rival company has successfully implemented the use of hand-held devices within stores for both customers and staff, which has increased satisfaction due to time savings. The CIO has approved the rollout of these devices to all stores but has stated that training should be brief, as there are many part-time employees.

You have been asked to confirm the most relevant architecture principles for this transformation. Based on the TOGAF Standard, which of the following is the best answer?

Options:

A.

Common Vocabulary and Data Definitions, Compliance with the Law, Requirements Based Change, Responsive Change Management, Data Security

B.

Control Technical Diversity, Interoperability, Data is an Asset, Data is Shared, Business Continuity

C.

Common Use Applications, Data is an Asset, Data is Accessible, Ease of Use, Business Continuity

D.

Maximize Benefit to the Enterprise, Common Use Applications, Data is an Asset, Responsive Change Management, Technology Independence

Buy Now
Question # 42

Please read this scenario prior to answering the question

You are employed as an Enterprise Architect at a technology company, reporting directly

to the Chief Enterprise Architect. The company supplies personnel and delivers cloud-

based solutions to numerous government agencies.

The nature of the business is such that the data and the information stored on the

company systems is the company's major asset and is highly confidential. The company

employees work remotely and need constant access to the company systems, which is

done by the public infrastructure. They use message encryption, secure internet

connections using Virtual Private Networks (VPNs), and other standard security

measures. The company provides computer security awareness training for all its staff.

The Chief Security Officer (CSO) has noted an increase in distributed denial of service

(DDoS) attacks on companies with a similar profile. The CSO understands that even

with thorough preparation, a major attack could stop employees from being able to do

their jobs. This could lead to a large financial loss, damage to the company's reputation

with customers, and employees being unable to work.

A risk assessment has been completed and the company has looked for cyber insurance

that covers such attacks. The price for this insurance is very high. The CTO has decided

not to get cyber insurance to cover such attacks.

The company follows the TOGAF standard as the method and guiding framework for its

Enterprise Architecture (EA) practice. The Chief Technology Officer (CTO) is the sponsor

of the activity. The practice uses an iterative approach for its architecture development.

This has enabled the decision makers to gain valuable insights into the different aspects

of the business

Please read this scenario prior to answering the question

You have been asked to describe the steps you would take to strengthen the current

architecture to improve data protection.

Based on the TOGAF standard which of the following is the best answer?

Options:

A.

You would request technology updates from existing suppliers that improve thecompany's capabilities to detect, react, and recover from an incident. Youwould run a simulated ransomware attack to evaluate the current EnterpriseArchitecture's resilience and recovery capabilities. Using the findings, youwould perform a gap analysis of the current Enterprise Architecture, andprepare change requests to address identified gaps. You would document

B.

You would run a planning exercise to assess the business continuityrequirements and analyze the current Enterprise Architecture for gaps. Youcreate a formal change request related to business resilience and maintainingcritical business functions. You would arrange a meeting of the ArchitectureBoard to assess and approve the change request. Once approved you wouldcreate a new Request for Architecture Work to begin an ADM cycle toimplement th

C.

You would ensure that business value and cost of continuity measures areunderstood by key stakeholders, and that the company has in place up-to-dateprocesses for managing change to the current Enterprise Architecture. Yourecommend that DDoS mitigation be addressed at the infrastructure level toensure effective, scalable protection. Changes should be made to the baselinedescription of the Technology Architecture. The changes should be approv

D.

You would hold an Architecture Compliance Review with the scope to examinethe company's ability to respond to such attacks. You would identify thedepartments involved and have them nominate representatives. You wouldthen tailor checklists to address the requirement for increased businesscontinuity and resilience. You would circulate the checklists to the nominatedrepresentatives for them to complete. You would review the completedchecklists

Buy Now
Question # 43

Scenario

You are working as an Enterprise Architect within a large manufacturing company. The company has multiple divisions located worldwide.

After a recent study, senior management is concerned about the impact of the company’s multiple data centers and duplication of applications on business efficiency. To address this concern, a strategic architecture has been defined; it will help improve the ability to meet customer demand and improve the efficiency of operations. The strategic architecture involves the consolidation of multiple application programs that are currently used in different divisions and putting them all onto a cloud-based solution instead.

Each division has completed the Architecture Definition documentation to meet its own specific operational requirements. The enterprise architects have analyzed the corporate changes and implementation constraints. A consolidated gap analysis has been completed. Based on its results, the architects have reviewed the requirements, dependencies, and interoperability requirements needed to integrate the cloud-based solution. The architects have completed the Business Transformation Readiness Assessment. Based on all these factors, they have produced a risk assessment. They have also completed the draft Implementation and Migration Plan, the draft Architecture Roadmap, and the Capability Assessment deliverables.

Due to the risks of changing from the current environment, the decision has been taken that a gradual approach is needed to implement the target architecture. It will likely take a few years to complete the whole implementation process.

The company has a mature Enterprise Architecture (EA) practice and uses the TOGAF standard for its architecture development method. The EA practice is engaged throughout all the divisions, with implementation governance assigned to a business line. In addition to providing guidance on using architecture frameworks, including business planning, project/portfolio management, and operations management, the EA program is sponsored by the Chief Information Officer (CIO).

You have been asked to decide on the next steps for the migration planning.

Based on the TOGAF standard, which of the following is the best answer?

Options:

A.

You update the Architecture Definition Document, which includes setting project objectives and documenting the final requirements. This will ensure that the architecture remains relevant and responsive to the needs of the enterprise. You then produce an Implementation Governance Model to manage the lessons learned prior to finalizing the Implementation and Migration Plan. You recommend that lessons learned be applied as changes to the archi

B.

You conduct a series of Compliance Assessments to ensure that the architecture is being implemented according to the contract. The Compliance Assessment verifies that the implementation team is using the proper development methodology. It should include deployment of monitoring tools and ensure that performance targets are being met. If they are not met, then you would identify changes to performance requirements and update those in the Imp

C.

You examine how the Implementation and Migration Plan affects the other frameworks being used in the organization. You coordinate the planning with the business planning, project/portfolio management, and operations management frameworks. You assign a business value to each project, considering the available resources and how well they align with the strategy. You then update the architecture roadmap and the Implementation and Migration Pla

D.

You assess the business value for each project by applying the Business Value Assessment Technique. The assessment should focus on return on investment and performance evaluation criteria to prioritize the most progress of the architecture transformation. You confirm and plan a series of Transition Architecture phases using an Architecture Definition Increments Table. You document the lessons learned and generate the final Implementation an

Buy Now
Exam Code: OGEA-103
Exam Name: TOGAF Enterprise Architecture Combined Part 1 and Part 2 Exam
Last Update: Mar 30, 2026
Questions: 180
OGEA-103 pdf

OGEA-103 PDF

$25.5  $84.99
OGEA-103 Engine

OGEA-103 Testing Engine

$28.5  $94.99
OGEA-103 PDF + Engine

OGEA-103 PDF + Testing Engine

$40.5  $134.99