A PFCG role can be liked to an SAP Organization Management structure by which object types? (choose three) |
Which CDS-related repository object types are provided with ABAP VDS? (choose three) |
Which is the frequency of SAP Path day? |
Which authorization object is required to modify authorization data of derived roles? |
Which of the following user types are precluded from logging onto the system directly? (choose three) |
In the case of missing OData authorizations, why is not recommended to maintain S_SERVICE manually within an SAP Fiori authorization role? (choose two) |
Where can you enable the Read Access Logging tools? |
The report “Search for Application in Role Menu” can called via which of the following options? (Choose two) |
To recommend SAP Security Notes for evaluation |
What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? (Choose two) |
Which of the following correctly describe the SAP Security Optimization Service (SOS) offerings? (Choose three) |
Which pf the following parameters must be configured to capture log data in the Security Audit Log? |
Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly? |
How can you enforce an additional transaction start authorization check for a custom transaction? |
Which application allows a role developer to perform the mass maintenance e of options from selected SAP Fiori Tile Catalogs? |
What is the purpose of securing sensitive business data? (Choose three) |
Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? (choose two) |
Which of the following objects allows you to restrict which users can distribute a role to another system using an RFC destination? |
Which of the following actions correctly describes the usage of From Channel Single Sign-On based on (SAML) 2.0? |
What is the main purpose of SAP Access Control, as an enterprise software solution? |
Which of the following are system security threats: (choose three.) |
Which of the various protocols can be used to establish secure communication? (choose three) |
Which transaction allows a user to change the authorization values of multiple roles at the same time? |
Which archiving object can you for archiving change documents related to changes with authorizations assigned to a user? |
Which of the following conditions apply when merging authorizations for the same object? ( choose two) |
Which of the following authorization objects would be required to allow back-end server access to a Web Dynpro application using the SAP Fiori Launchpad? |
SAP Cloud Identity and Access Governance consists of which of the following software services? (choose three) |
You are responsible for determining the reason why you need personal data and how this data is processed or stored. What key role do you play under GDPR in relation to personal data? |
Which of the following describes an Authorization Object class? |
What information can be provided by an Audit Class? (choose three) |
Which of the following illustrate the simplification of user and maintenance on SAP Cloud? (choose two) |
Which of the following tables contain transport request objects lists and table entry keys? (choose tow) |
Which of the following accurately describe Solution Manager functionality? (Choose three) |
Where is the application log information (SLG1) saved? |
In SAP s/4Hana Cloud authorization objects are grouped into which item? |
Which of the following allows you to improve the quantity of your enterprise data assets with consistent data validation rues, data profiling and metadata management? |
Which configuration options apply to the usage of VCLIENT in the parameter icm/server_port_<xx>. (choose three) |
Which transaction codes are relevant to enable SNC between ABAP systems? (Choose three) |
Which of the following are used in SAP Enterprise Detection (ETD) architecture? (choose two) |
Which ABAP transaction codes are relevant for SNC Parameter Configuration? (choose two) |
Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0? |
Which of the following are core principles of GDPR? (choose threes) |
Which of the following are prerequisites for using transaction PFCG? (Choose two) |
When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following items should be provide? (choose three) |
You want to adjust check indicator values for certain authorization object delivered by SAP. In which of the following tables should you adjustments be recorded? |
Which feature is available in the CommonCryptoLib scenario provided by SAP Security Library |
Which transaction code allows you to configure the SAP Security Audit Log? |
Which of the following SUIM reports can you use to determine if a user has a segregation of duty violation? (choose two) |
You want to turn off the SAP Menu on the Easy Access Menu screen. What administrative function do you need in Authorization Object S_USER_ADM? |
The DBMS tab in transaction SU01 allows you to manage database privilege assignments for the following scenarios? (choose two) |
Your company uses derived roles. During maintenance of the Plant Manager imparting role, you add a new transaction to the Menu tab which introduces a new organizational level that will be unique for each of your 150 plants. How will the new organization level be maintained in the derived roles? |
Which of the following describe the behavior of a reference user when assigned to a user master record? ( choose two) |
Which of the following items are addresses by configuration validation? (choose three) |
Which TADIR Service Object type includes business functional authorization objects used within the OData execution? |
Which of the following accurately describes the role/profile SAP_NEW? (choose two) |
Which of the following features are provided by the SAP Fiori Launchpad content manager? (Choose three) |
Which of the following transactions allow you to define role assignments for OData Services that are available on multiple back-end systems? (choose two) |
When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles reporting help you determine? (choose two) |
Which of the following app-specific types of entities do users need to use SAP Fiori Apps? (choose two) |
In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the following data sources for storing user data? ( choose three) |
Which of the following are SAPUI5 Fiori application types? (choose two) |
Which of the following describe SAP Fiori tile Target Mapping? (Choose two) |
What is the equivalent of the AS ABAP user type system in the AS Java UME security policy? |
What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.) |
What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? (Choose Three.) |
Which pf the following are example of personal data under the GDPR? (Choose three) |
Which of the following authorization objects are used to secure the execution of External Commands when defining a background job step? (Choose two) |
Which of the following accurately describe a Composite Role? (Choose two) |
You system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation. Which instance profile parameter can you configure to allow a small group of users to bypass the limitation of multiple logins? |
Which of the following functionalities are supported by SAP information Lifecycle Management (ILM)? (Choose three) |
Which of the following transactions allow you to customize or configure SAP Fiori Catalogs and Groups? (choose two) |
How can you protect a system when you do not want the user assignments for a role to be transported? |
Which of the following actions are required to ensure complete logging of table data changes? (choose three) |
You are configuring authorizations to secure access to table data using transaction SM31 and encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be used to secure access? |
Which of the following are phases in the SAP Audit Management auditing process? (Choose three) |
Which values are permitted for the S_BTCH_JOB authorization object? (choose three) |
If the OData back-end service is located on a remote back-end, users need which authorization objects to perform the RFC call on the back-end system? (Choose two) |
Which of the following defines “Phisching”? |
You want to limit an authorization administrator so that they can only assign certain authorizations. Which authorization object should you use? |
During maintenance of a role you notice that the status text for an authorization object indicates status “Changed New”. What does this status text mean? |