Pular para o conteúdo
Início » C_GRCAC_12 SAP Access Control 12.0

C_GRCAC_12 SAP Access Control 12.0

C_GRCAC_12

Questions C_GRCAC_12 SAP Access Control 12.0

Which BRFplus object is used as a container for all other BRFplus objects?
What does an agent rule determine?
Which of the following actions in Business Role Management require a connection to a target system? (Choose three.)
Which transaction can you use to customize notification templates?
Which task is mandatory for the successful generation of a workflow?
What do you mitigate using Access Control?
Which auto-provisioning options are available in the global provisioning configuration? (Choose three.)
Which connection type do you use for the RFC destination to establish a connection between GRC and an SAP ERP back-end system?
You want to create an Initiator rule in BRFplus for the standard access request. Which structures providethe attributes that you can use to define your rule? Note: There are 2 correct answers to this question.
How are lines and columns linked in a BRFplus initiator decision table?
You want to maintain roles using Business Role Management. How do you import the roles from the back-end system?
You have added a new stage to an existing path and set the approval type to “Any One Approver” (A in the attached screenshot). Now you set the approval type to “All Approvers” in the default stage details of the new stage (B in the attachedscreenshot). Which approval type will become effective?
You are implementing Access Request Management. Which integration scenarios should you assign tothe target connector? Choose the correct answer.
Which of the following reviewer options does User Access Review support? Choose the correct answer
You have identified some risks that need to be defined as cross-system risks. How do you configure your system to enablecross-system risk analysis?
For which of the following scenarios would you activate the end-user logon function?
Which process steps should you perform when you define a workflow-related MSMP rule? (Choose two.)
You have created an agent rule in BRFplus. Which additional configurations do you have to perform to use this agent rule in a workflow? (Choose two.)
Which combination of rule kind and rule type determines the path upon submission of a request?
You need to create an access request workflow for a role assignment that will have two or three approval steps, dependingon the role critically level. Which type of rule do you use?
You want to synchronize the Access Control repository with data from various clients. In which sequence do you executethe synchronization jobs?
Your customer wants a manager to fulfill both MSMP workflow agent purposes. How do you configure this?
You are building a BRFplus Flat rule decision table for use with role provisioning and you want your result set to be derivedusing the role line item data. You must therefore configure the results column value for the LINE _ITEM_KEY key field. Which field from the context query do you select to achieve this?
You have created a new end-user personalization (EUP) form. Where can you make use of this EUP form? (Choose two.)
Which Access Control master data is shared with Process Control and Risk Management?
SAP Governance, Risk and Compliance solutions are organized along 4 key themes. Which of the following are key themes? Note: There are 3 correct answers to this question.
Which reviewers can you select using the Access Control configuration parameter 2006 (Who are the reviewers) for useraccess review (UAR)? (Choose two.)
You want approver authentication when approving an access request. Which MSMP Workflow stage configuration option can you use? Choose the correct answer.
You define a background job using transaction SM36. Which of the following options are start conditions you can use to schedule the background job to run periodically? (Choosetwo.)
Your customer wants to adapt their rule set to include custom programs from their SAP ERP production system.How do you ensure that the custom programs can be maintained properly in the rule set? (Choose three.)
Which indirect provisioning types are supported in user provisioning? (Choose three.)
Who approves the review of the periodic segregation of duties?
You want to assign an owner when creating a mitigating control. However, you cannot find the user you want to assign as anowner in the list of available users. What could be the reason?
Which of the following IMG activities are common component settings shared across GRC? (Choose three.)
Which of the following owner types must be assigned to a user to receive the notification that a log report has beengenerated as the result of a Firefighter session?
Which of the following SAP functionalities can you use to calculate rule results when configuring MSMPWorkflow? Note: There are 2 correct answers to this question.
It is mandatory for a Firefighter ID to be assigned to which of the following? Choose the correct answer
For which purpose can you use organizational value mapping?
Which of the following attributes are mandatory when creating business role definition details in Business RoleManagement? (Choose three.)
What does assigning the Logical Group (SOD-LOG) type to a connector group allow you to do?
Which of the following objects can you customize for MSMP workflows? (Choose two.)
Which of the following are rule types used in MSMP workflow? (Choose three.)
You have set up your Firefighter IDs in the target system. Which of the following jobs do you have to run to synchronize these IDs and their role assignments with the Access Controlsystem?
What information is available in the audit trail log for access rules? (Choose two.)
Which of the following role provisioning types does Access Control user provisioning support? (Choose three.)
Your customer wants to eliminate false positives from their risk analysis results. How must you configure Access Control to include organizational value checks when performing a risk analysis? (Choosetwo.)
You have maintained an end-user personalization (EUP) form and set a particular field as mandatory.Which additional field attribute settings are required? (Choose two.)
What is a mandatory prerequisite for creating business roles in Business Role Management?
Which of the following objects can you maintain in the “Maintain Paths” work area of MSMP workflow configuration? (Choose three.)
You create a BRFplus initiator rule for the Access Request approval workflow. Which standard request attribute that is listed as a header data object, as well as a line item data object, can you insert into acondition column?
You want to create a connector to an SAP ERP client. You must therefore define the technical parameters for the RemoteFunction Call (RFC) destination. What does SAP recommend regarding the name of the RFC destination?
You have updated authorization data for your roles in the target system using PFCG. You now want to synchronize the authorization data in Business Role Management without changing the existing role attributes. How do you accomplish this?
Your customer has created a custom transaction code ZFB10N by copying transaction FB10 and implementing a user exit.How can you incorporate the customer enhancement into the global rule set so that it will be available for Risk Analysis?
For which IMG object can you activate the password self-service (PSS) in Access Control?
What are Business Configuration (BC) Sets for Access Control? (Choose two.)
Which agent purposes are available in MSMP workflow? (Choose two.)
For what purpose can you use the Display Revw Screen setting in MSMP Stage Details?
Which of the following is a feature of centralized Emergency Access Management?
You wish to synchronize data from transaction SU24 in the SAP S/4HANA production system into SAP Access Control for use in building a rule set. What is the correct synchronization job schedule for completing this task? Choose the correct answer.
Which configuration parameters determine the content of the log generated by the SPM Log Synch job? (Choose three.)
How do you enable the Access Control audit trail function for access rules?
You want to update two authorizations that are shared across multiple roles. How do you accomplish this most efficiently?
What is the purpose of a mitigating control?
You want to make Risk Analysis mandatory before an approver submits a request. How do you enable this in Access Control?
Which periodic review process allows a role owner to remove roles from the users?
Which of the following tasks must you perform if you want to enable a user to log on to a Firefighter ID?
Where can you define a mitigating control? (Choose three.)
What is the purpose of role mining?
You want to use Access Request Management to provision access in a target system. Which of the following actions are required before access can be provisioned using an access request? Note: Thereare 2 correct answers to this question.
For what purpose can you use the Role Status attribute in Business Role Management?
Which transaction do you use to access the general Customizing activities for Access Control?
Which tasks must you perform to enable a user to begin a central Firefighter session? (Choose three.)
Which report types require the execution of batch risk analysis? (Choose two.)
What information must you specify first when you copy a user access request?
Which prerequisites must be fulfilled if you want to create a technical role using Business Role Management? (Choose two.)
What must you define in order to analyze user access for a critical transaction?
You have activated the MSMP workflow Business Configuration (BC) Sets delivered by SAP. However, your customer requires a four-stage workflow for the Access Request process to include an approval by the system owner. How do you achieve this?
Which type of user account does an emergency access user need to log on to a Firefighter session using transaction GRAC_SPM?
Which transaction do you use to monitor background jobs in Access Control repository synchronization?
Which of the following jobs do you have to schedule to collect Firefighter session information?
How does SAP deliver updates to the standard rule set for Access Control?
Which of the following represent valid Agent Types within MSMP Workflow configuration? Note: Thereare 2 correct answers to this question.
How do you manually replicate initiators from a previous version of Access Control so they can be used in BRFplus and aMSMP workflow?
What data is synchronized when you run the GRAC_REPOSITORY_OBJECT_SYNC report? (Choose three.)
How do you enable stage configuration changes to become effective after a workflow has been initiated?
You maintain rules in the BRFplus framework. For which rule kind can you activate the “Return all matches found” option for the decision table?
Which objects must you activate when you create a BRFplus Routing rule? (Choose three.)
Which of the following is a feature of centralized Emergency Access Management?
Which integration scenarios are specific to Access Control? (Choose three.)
Why would you generate a new MSMP workflow version?
Which activity can you perform when you use the Test and Generate options in transaction MSMP Rule Generation/Testing(GRFNMW_DEV_RULES)?

Veja também: