Pular para o conteúdo
Início » P_SECAUTH_21 SAP System Security Architect

P_SECAUTH_21 SAP System Security Architect

P_SECAUTH_21

Questions P_SECAUTH_21 SAP System Security Architect

Why do you use table logging in AS ABAP?
You want to use Configuration Validation functionality in SAP Solution Manager to check the consistency of settings across your SAP environment. What serves as the reference basis for Configuration Validation? Note: There are 2 correct answers to this question.
In your SAP HCM system, you are implementing structural authorizations for your users. What are the characteristics of this authorization type? There are 2 correct answers to this question.
How to combine the 2 worlds (SAP GUI and web)?
You verified the password of the TMSADM user in your SAP landscape to be SAP defaulted. You want to reset this password by using program TMS_UPDATE_PWD_OF_TMSADM. What steps would you take to reset this password? Note: There are 2 correct answers to this question
You are reviewing the authorizations for Core Data Services (CDS) views. How are classic authorizations integrated with CDS authorizations? Please choose the correct answer.
In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction. How do you prevent the access of users to the transaction A from within the program?
User1 grants role 1 to user2. Who can revoke role 1 role from user2?
A system user created a User1 and a schema on the HANA database with some dat a. User2 is developing modelling views and requires access to objects in User1’s schema. What needs to be done?
Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 correct answers to this question
Which transaction or report can be used to audit profile assignments in an SU01 user master record? Note: There are 2 correct answers to this question
A system user created a User1 and a schema on the HANA database with some data. User2 is developing modelling views and requires access to objects in User1’s schema. What needs to be done? Please choose the correct answer.
What is required when you configure the PFCG role for an end-user on the front-end server? Note: There are 2 correct answers to this question.
The activity “Send User Name and Password” is the first step during the password authentication procedure in SAP NetWeaver ABAP based systems; whereas the activity “Authenticate” is the last. What is the correct sequence of the activities between these two steps? Please choose the correct answer.
The SSO authentication using X.509 client certificates is configured. Users complain that they can’t log in to the back-end system. The trace file shows the following error message: “HTTP request [2/5/9] Reject untrusted forwarded certificate”. What is missing in the configuration? Note: There are 2 correct answers to this question.
Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs. What is the valid fi e format where data files are first converted into and then checked by a virus scanner?
You have a load balancer in a DMZ network zone (called natl.mydomain.com) in front of 2 SAP NetWeaver AS systems (hostl.mydomain.com, host2.mydomain.com). What is the recommended common name part of the distinguished name on the SSL Server’s PSE?
In which 4 cases Secure Store and Forward (SSF) provides security for SAP data and documents?
What are the important properties of catalog roles in SAP HANA? Please choose the correct answer.
What is the User Management Engine (UME) property “connect on pooling” used for? Note: There are 2 correct answers to this question.
For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA system? Note: There are 2 correct answers to this question.
To which object type are person assigned to in the organizational plan?
What are the 3 major components of the Role maintenance tool (PFCG)?
Based on your company guidelines you have set the password expiration to 60 days. Unfortunately, there is an RFC user in your SAP system who must not have a password change for 180 days. Which option would you recommend to accomplish such a request?
Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question
What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note: There are 2 correct answers to this question.
Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs. What is the valid file format where data files are first converted into and then checked by a virus scanner? Please choose the correct answer.
Which authorization object defines which table contents may be maintained by which employees?
Which authorization object protects the standard list download?
You want to configure SNC with X.509 certificates using Common CryptoLib as the cryptographic library in a new installed AS ABAP system. Besides running SNCWIZARD, what do you need to set up for this scenario? Note: There are 2 correct answers to this question.
Which tasks would you perform to allow increased security for the SAP Web Dispatcher Web Administration interface? Note: There are 2 correct answers to this question.
You have successfully finished an SAP S/4HANA back-end, SAP Fiori front-end and Web-dispatcher configuration. In the SAP Fiori Launchpad the search for a G/L account fails, but regular app search works fine. What could be the cause of the problem? Please choose the correct answer.
What are the characteristics of HTTP security session management? Note: There are 3 correct answers to this question
6 types of information that can be recorded with the security audit log?
You have configured a Gateway SSO authentication using X.509 client certificates. The configuration of the dual trust relationship between client (browser) and SAP Web Dispatcher as well as the configuration of the SAP Web Dispatcher to accept and forward client certificates were done. Users complain that they can’t log in to the back-end system. How can you check the cause?
The SSO authentication using X.509 client certificates is configured. Users complain that they can’t log in to the back-end system. The trace file shows the following error message: “HTTP request [2/5/9] Reject untrusted forwarded certificate”. What is missing in the configuration? Note: There are 2 correct answers to this question
Why should you create multiple dispatchers in SAP Identity Management? Note: There are 2 correct answers to this question.
Which type of systems can be found in the Identify Provisioning Service landscape? Note: There are 2 correct answers to this question
How to display the results of the security audit log (transaction)?
You have a load balancer in a DMZ network zone (called natl.mydomain.com) in front of 2 SAP NetWeaver AS systems (hostl.mydomain.com, host2.mydomain.com). What is the recommended common name part of the distinguished name on the SSL Server’s PSE?
What are the 2 checks executed after a transaction start to ensure that the user has the appropriate authorization?
How do you check when and by whom profiles were assigned or deleted? Please choose the correct answer.
Which transaction will be used to choose the granularity of log category to Multi Step Multi Process (MSMP) ID while debugging issues with the MSMP workflow? Please choose the correct answer.
What is the transaction for local client copy?
When you connect the Diagnostics Agent to your Solution Manager system, which of the following Outside Discovery jobs are triggered? There are 3 correct answers to this question.

Veja também: