option
Cuestiones
ayuda
daypo
buscar.php

Hooligansdv2

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Hooligansdv2

Descripción:
Seguridad

Fecha de Creación: 2020/12/31

Categoría: Otros

Número Preguntas: 90

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

In which table can you find a list of invalid passwords? Please choose the correct answer. USR05. USR40. USR22. USR01.

Which SAP Access Control component must you use to ensure readiness of "get compliance" (get clean)? Please choose the correct answer. Compliance User Provisioning. Superuser Privilege Management. Enterprise Role Management. Risk Analysis and Remediation.

Which transaction do you use to set distribution parameters for Central User Administration (CUA)? Please choose the correct answer. SCUL. SCUA. SCUM. SCU.

Which of the following are characteristics of system superuser SAP*? There are 2 correct answers to this question. It is programmed in the system kernel. It has the default password PASS. It is created in client 001. It requires a user master record.

For which of the following tasks is a user administrator responsible? There are 3 correct answers to this question. Maintain user master records. Assign users to profiles. Activate profiles. Maintain roles. Assign users to roles.

Which of the following objects are used when you transport roles? There are 2 correct answers to this question. User assignments. Personalization. Profiles. Templates.

Which of the following are benefits of Central User Administration (CUA)? There are 2 correct answers to this question. Reduced user administration costs. Increased security of user administration. Reduced number of user logons through single sign-on. Lower role development costs.

From which role can you transfer data to a derived role? Please choose the correct answer. SAP template role. Reference role. Composite role. IMG role.

Which of the following can you display with the user information system? There are 2 correct answers to this question. User role assignments. Authorization failures. Transactions contained in a role. Executed transactions.

What is the main function of the SAP Web Dispatcher? Please choose the correct answer. To provide message server functions. To act as a load balancer. To act as a firewall. To provide secure network connections.

You want to add a Customizing object to a role. Which options are available in the Profile Generator (see attached screenshot)? There are 2 correct answers to this question. Enterprise IMG. IMG project view. SAP Reference IMG. IMG project.

Which of the following environments are provided by SAP NetWeaver? There are 2 correct answers to this question. An ABAP runtime environment. A client/server environment. A three-tier environment. A Java runtime environment.

How do you delete an existing role in all three SAP systems: development, test, and production? Please choose the correct answer. - Configure Central User Administration (CUA) to delete the role across the three systems. - Log on to the development system. - Delete the role across the three systems with transaction SU10. - Delete the role in the development system. - Create transports without this role. - Release the transport to test and production. - Enter the role into a transport. - Delete the role in the development system. - Release the transport to test and production.

How can you control a user's choice of password? There are 2 correct answers to this question. Enter a list of valid passwords in table USR40. Define the validity period of a password. Set the minimum difference in password characters. Set the authorization group for password length.

Which of the following is a characteristic of composite roles? Please choose the correct answer. Users assigned to composite roles have their own authorization data. They can be assigned to other composite roles. They have their own authorization data. Users assigned to composite roles are automatically assigned to the elementary roles.

Which report from the user information system (transaction SUIM) can you use to find out which user may execute transaction Change Customer (FD02)? There are 2 correct answers to this question. Authorization by Value (S_BCE_68001415). Users by Complex Selection Criteria by user ID (S_BCE_68001394). Change Documents for Authorization (S_BCE_68001441). Profiles by Profile Name or Text (S_BCE_68001767).

What are audit categories of the Audit Information System (AIS)? Please choose the correct answer. System and business audit. Business and process audit. Business and functional audit. System and security audit.

Which of the following steps are required to activate role maintenance after you install an SAP system? There are 2 correct answers to this question. Set the SAP system profile parameter auth/no_check_in_some_cases = N. Set the Changes Allowed field to value E in transaction RZ10. Set the SAP system profile parameter auth/no_check_in_some_cases = Y. Fill the USOBX_C and USOBT_C tables.

Which of the following are benefits of using Security Optimization Self Service? There are 2 correct answers to this question. It requires no license key for configuration. It updates an SAP system against intruders. It automatically implements security recommendations. It allows customized authorization checks.

What data is transferred from a reference role to a derived role? There are 2 correct answers to this question. Report. Profiles. User assignments. Transactions.

Which of the following are reasons to customize role maintenance? There are 2 correct answers to this question. To suppress authorization objects. To create customer-specific authorization objects. To activate customized authorization objects. To correct authorization objects that have unacceptable default values.

You have to configure Secure Network Communication (SNC) to secure connections between two SAP NetWeaver AS ABAP servers. Which profile parameters can you set for the trust manager? There are 2 correct answers to this question. sec/libsapsecu. snc/identity/as. snc/data_protection/use. snc/data_protection/max.

Which of the following authorization objects do users need before they can add external commands, using transaction SM69, to a background job? Please choose the correct answer. S_CTS_ADMI. S_ADMI_FCD. S_RZL_ADM. S_LOG_COM.

You have made changes to tables USOBX_C and USOBT_C. You want to transport these tables from the development environment to the testing environment. Which transaction do you use to create this transport? Please choose the correct answer. Maintain table (SM30). User maintenance (SU01). Profile generator: upgrade and first installation (SU25). User information system (SUIM).

Which of the following transactions allows Security Optimization Self Service to add customized authorization checks? Please choose the correct answer. ST13. ST11. ST14. ST01.

Which of the following are capabilities of Information Integration? There are 3 correct answers to this question. SAP Knowledge Management. SAP BusinessObjects Business Intelligence. SAP Application Lifecycle Management. Multichannel Access. SAP Master Data Management.

Which of the following directories contain the logs of the Change and Transport System? There are 2 correct answers to this question. <transport directory>/data. <transport directory>/bin. <transport directory>/sapnames. <transport directory>/cofiles.

Which of the following are valid architectures of an SAP system based on SAP NetWeaver AS 7.10 or higher? There are 2 correct answers to this question. Infrastructure in which ABAP-based applications can be developed and used (AS ABAP system) with primary application server (PAS). Infrastructure for developing and using J2EE-based application with Java dispatcher process (AS Java system). Infrastructure in which ABAP-based applications can be developed and used (AS ABAP system) with Software Deployment Manager (SDM) process. Infrastructure for developing and using J2EE-based application with Internet Communication Manager (ICM) process (AS Java system).

Which of the following can you use to create users in the context of active Central User Administration (CUA)? Please choose the correct answer. Transaction SU01 in the central system. Transaction PFCG in the child system. Transaction PFCG in the central system. Transaction SU01 in the child system.

You run change document RSUSR100 (user and authorization log). Which of the following are selection criteria for changed header data? There are 3 correct answers to this question. Language. Administrator Lock Set. Administrator Lock Number. Accounting Number. User Group.

Which actions do you execute when you validate an authorization concept? There are 3 correct answers to this question. Test the user roles and authorizations. Test the business processes and authorizations. Assign business processes to roles. Generate an overview of the transaction assignments for each role and user. Run test scenarios for all business processes.

Which of the following actions allows you to schedule the execution of a report from transaction SA38 at an off-peak time? Please choose the correct answer. Select Execute with Variant (Shift+F6). Select Execute and Print (CTRL+P). Select Execute (F8). Select Background (Shift+F9).

Which the following tables are used to assign authorization groups to tables and views? There are 2 correct answers to this question. V_DDART. V_DDAT_54. V_BRG. V_BRG_54.

In an SAP Net Weaver AS ABAP system, which security notes have the highest priority? There are 2 correct answers to this question. Notes shown by transaction ABAP Note Assistant (SNOTE). Notes shown in Customer. Notes marked by the Early Watch Alert in red. Notes shown by RSECNOTE.

What user type do you need to create Remote Function Call (RFC) connections in Central User Administration (CUA)? Please choose the correct answer. System. Dialog. Service. Reference.

Which authorization object can you use to specify both roles and activities for authorization control? Please choose the correct answer. S_USER_VAL. S_USER_GRP. S_USER_PRO. S_USER_AGR.

Which of the following features are available by configuring the SAProuter? There are 2 correct answers to this question. Add the HTTP protocol. Allow only encrypted connections from a known partner. Add the function of a firewall. Control and log the connections to an SAP system.

You are unable to determine the cause of an authorization failure using transaction Authorization Error Analysis (SU53). Which transaction allows you to analyze this failure further? Please choose the correct answer. SU01. SU56. ST12. ST01.

Which parameter can lock the SAP* user? Please choose the correct answer. logon/no_automatic_user_sapstar = 1. login/system_client = 1. login/system_client = 0. logon/no_automatic_user_sapstar = 0.

Transaction CPH1 does not have proper default authorization objects. This requires you to manually add the S_PROGRAM authorization object every time you insert the transaction into a role. Which transaction do you use to set default authorization objects on transactionCPH1 to avoid the manual step? Please choose the correct answer. SU25. SU24. SU01. SU21.

To work with the Audit Information System (AIS), which of the following steps do you have to execute? There are 2 correct answers to this question. Modify the user group. Set up user master records. Set up security audit log. Modify the AIS role.

You want to administer the following clients from a master client: - 3 clients of a development system - 2 clients of a test system - 2 clients of a production system How many Remote Function Call (RFC) connections are required in Central User Administration (CUA)? Please choose the correct answer. 15. 14. 8. 10.

To provide continuous access management (stay clean), which of the following can you use to establish end-to-end compliance with SAP Access Control? There are 3 correct answers to this question. Enterprise Role Management. Periodic access review and audit. Compliant User Provisioning. AIS reports. Superuser Privilege Management.

By which of the following criteria can administration tasks in decentralized user administration be shared? There are 2 correct answers to this question. Application area. User type. Department. License type.

Which transactions can you use to perform user reconciliation for a role? There are 2 correct answers to this question. PFCG. SU53. SUIM. PFUD.

Which of the following user types is used to set up Central User Administration (CUA)? Please choose the correct answer. Reference (L). Dialog (A). Service (S). System (B).

Which transaction is used by the Profile Generator during a system upgrade? Please choose the correct answer. SU24. SU10. SU01. SU25.

For which of the following is the Secure Socket Layer (SSL) in an SAP Net Weaver AS environment used? There are 2 correct answers to this question. To transmit individual messages securely over the network. To create a secure connection between client and server. To create a secure connection between the database and a client. To secure HTTP communication for users connecting via Web browser.

Which of the following authorization objects must you assign to a user in SAP Solution Manager and in the SAP managed system to make sure that a trusted Remote Function Call connection is established? Please choose the correct answer. S_RFC. S_RFC_TT. S_RFC_SHLP. S_RFCACL.

You have to assign multiple roles to multiple users. Which transaction allows you to do this efficiently? Please choose the correct answer. SU53. SU01. SU10. SU02.

A security manager is asked to gather the average dialog response time over the last 30 minutes. Which of the following transactions can list this information? Please choose the correct answer. RZ03. RZ10. RZ01. RZ20.

Which of the following can you use to connect directory services to Central User Administration (CUA) of an SAP system? Please choose the correct answer. Directory Services Markup Language (DSML). Directory Access Protocol (X.500 DAP). Application Link Enabling (ALE). Lightweight Directory Access Protocol (LDAP).

You have to analyze risk and perform remediation to enable end-to-end compliance. What is the correct sequence of steps? Please choose the correct answer. 1. Identify and select risks to manage. 2. Build and maintain rules. 3. Detect authorization risk. 4. Test and report the risk. 5. Remediate and mitigate risk. 6. Prevent the risk. 1. Identify and select risks to manage. 2. Build and maintain rules. 3. Remediate and mitigate risk. 4. Test and report the risk. 5. Detect authorization risk. 6. Prevent the risk. 1. Identify and select risks to manage. 2. Build and maintain rules. 3. Detect authorization risk. 4. Remediate and mitigate risk. 5. Test and report the risk. 6. Prevent the risk. 1. Identify and select risks to manage. 2. Build and maintain rules. 3. Remediate and mitigate risk. 4. Detect authorization risk. 5. Test and report the risk. 6. Prevent the risk.

What check must you carry out to analyze system data with Security Optimization Self Service? Please choose the correct answer. The SAP Solution Manager system has the latest support plug-ins installed. The system is connected to SAP Solution Manager. SAP Solution Manager is connected to the Security Optimization Service. The system landscape is registered with the Security Optimization Service.

Which of following can you modify in basic maintenance of the Profile Generator (PFCG)? Please choose the correct answer. Users and organizational management. Profiles and authorization. Profiles and workflow. Users and workflow.

When a system auditor logs on to an SAP system, the user menu contains these folders: - Information/Overview - Table Authorization - Table Recordings - Access Statistics - Change Documents Which of the following roles is assigned to this system auditor? Please choose the correct answer. Users and Authorizations Audit: SAP_AUDITOR_SA_CCM_USR. AIS – Administration: SAP_AUDITOR_ADMIN. AIS – System Audit: SAP_AUDITOR_SA. Repository/Tables Audit: SAP_AUDITOR_SA_CUS_TOL.

Which of the following does Security Optimization Self Service check? There are 3 correct answers to this question. System and business user validity. Access to business and user data. System and business document standards. Security-relevant Customizing settings. Authorization concept and change management function.

Which action is the last step in the setup of Central User Administration (CUA)? Please choose the correct answer. Create the user master (transaction SU01). Check distribution logs (transaction SCUL). Synchronize the company addresses to CUA (transaction SCUG). Set the parameters for field distribution (transaction SCUM).

You have to generate a segregation-of-duties violation report for the following purchasing transactions: ME51N, ME21N, MIGO, and MIRO. Which of the following reports lists users that are assigned to all of these transactions? Please choose the correct answer. User with Critical Authorization (S_BCE_68002111). Roles by User Assignment (S_BCE_680001419). Change Documents for Users (S_BCE_68002311). Executable Transactions Report (S_BCE_68001429).

Which transaction displays the assignment of authorization objects to transaction codes? Please choose the correct answer. SU24. SU25. SU10. SU56.

Which of the following sequences of steps can you use to create a user-defined role? There are 2 correct answers to this question. 1. Enter role name. 2. Maintain authorization data. 3. Generate authorization profile. 4. Save the role. 1. Enter role name. 2. Generate authorization profile. 3. Maintain authorization data. 4. Save the role. 1. Enter role name. 2. Maintain authorization data. 3. Save the role. 4. Generate authorization profile. 1. Enter role name. 2. Save the role. 3. Maintain authorization data. 4. Generate authorization profile.

Which of the following authorization objects control the spool output printer? There are 2 correct answers to this question. S_CTS_ADMI. S_SPO_DEV. S_SPO_PAGE. S_SPO_ACT.

For which of the following does a secure logon using Kerberos support single sign-on and encryption? There are 2 correct answers to this question. SAP GUI for Windows. Browser access to SAP AS Java. SAP GUI for Java for non-Windows clients. Browser access to SAP AS ABAP.

Which components that a derived role inherits from a reference role can you change in the derived role? There are 2 correct answers to this question. Authorizations. Menus. Organizational levels. User assignments.

Which of the single sign-on (SSO) methods for SAP NetWeaver AS-based systems requires configuration of the Secure Login Server, Security Login Client, and the authentication server? Please choose the correct answer. SSO with Java Authentication and Authorization Service (JAAS). SSO with X.509 certificate. SSO with SAP logon tickets. SSO with Kerberos.

You want to post a goods receipt to two plants, 1000 and 1200, using transaction Enter Other Goods Receipts (MB1C). When you post the goods receipt to plant 1200, you receive an authorization error message. How do you analyze the error? There are 2 correct answers to this question. Validate the user group in user master (transaction SU01). Run the user information system (transaction SUIM). Perform authorization error analysis (transaction SU53). Run authorization trace (transaction ST01).

Which of the following are components of SAP NetWeaver Identity Management? There are 3 correct answers to this question. Data Synchronization Engine. Central User Administration. Virtual Directory Server. Identity Services. Identity Center.

Which of the following tab pages are available when you create a composite role? Please choose the correct answer. Description, Menu, Workflow, Authorizations, User, MiniApps, Personalization. Description, Roles, Menu, User, Personalization. Description, Menu, Authorizations, User, MiniApps, Personalization. Description, Menu, User, MiniApps.

Which action does the enqueue work process perform? Please choose the correct answer. It executes programs that run without interacting with the user. It fulfills all requests for the execution of dialog steps triggered by an active user. It passes sequential data flows to printers. It administers the lock table in shared memory.

What data can you edit on the Logon Data tab of the User Maintenance tranasction (SU01)? There are 2 correct answers to this question. User logon language. User parameters. User group for authorization checks. User type.

Which of the following is a characteristic of the physical layer of the OSI model? Please choose the correct answer. It passes data from one node to another and performs error detection. It enables program-to-program communication. It places data on the network media and takes the data off the network. It ensures end-to-end integrity of data transmission.

When you logon to the system with the SAP_AUDITOR_SA role, which of the following reports can be found in the Top 10 Security Reports folder of the Audit Information System (AIS)? There are 2 correct answers to this question. Date Monitoring (S_PH0_48000450). Analysis of Security Audit Log (SM20N). IDoc List (RSEIDOC2). Check Passwords of Standard Users (RSUSR003).

Which of the following must be available before you can perform Security Optimization Service checks for SAP vulnerability risks? Please choose the correct answer. SAP Solution Manager. SAP ERP Central Component. SAP NetWeaver Business Warehouse. SAP NetWeaver Portal.

After roles were transported from an SAP development system to a test system, a technical manager reported a problem with a user role assignment in the test system. What do you have to configure to prevent the transport of user assignments? Please choose the correct answer. Set SET_IMP_LOCK_ROLE = YES in PRGN_CUST of the test system. Set PROFILE_TRANSPORT = NO in table PRGN_CUST of the development system. Set ASSIGN_ROLE_AUTH = CHANGE in table PRGN_CUST of the development system. Set USER_REL_IMPORT = NO in table PRGN_CUST of the test system.

Which of the following are reasons to use SAP Business Workflow? There are 2 correct answers to this question. To automate the control and processing of cross-application processes. To change existing functions of an SAP system. To record the progress of the execution of an application. To respond to errors and exceptions in existing business processes.

You have to maintain authorizations for a new role in the Profile Generator (transaction PFCG). What does the yellow triangle indicate (see attached screenshot)? Please choose the correct answer. You must not give full authorization in this area. The profile for the role has not been generated yet. The maintenance of the authorizations is not done yet; additional work is needed. You do not have the necessary authorization to maintain the authorizations below this level.

Which of the following does the Security Optimization Service check? There are 2 correct answers to this question. Standard users. SAP HR data. SAP system component validity. Settings from the SAP Security Guide.

Which of the following is a function of user type System? Please choose the correct answer. It allows multiple logons. It checks whether the password has expired. It checks whether the password is initial. It allows dialog logon.

You are configuring an SAP NetWeaver AS ABAP system to allow authentication with x.509 client certificates issued by SAP NetWeaver single sign-on (SSO). When you test the connection with the standard SAP GUI, the system unexpectedly asks you for a password. How can you avoid the additional logon in the standard SAP GUI? Please choose the correct answer. Create a new SAP logon entry using the SNC name. Set the parameter icm/server_port_2 with string VCLIENT = 2. Map the client certificate of the user ID to the SAP NetWeaver AS ABAP user master record. Import the User CA root certificate from the Secure Login Server.

Why would you add project views of the Implementation Guide (IMG) to an existing role? There are 2 correct answers to this question. To display the transactions of the project views in the Session Manager. To duplicate the menu of the project views from another Customizing role. To assign the project views to users. To generate the authorizations for the project views.

Which of the following communication paths can be protected by Secure Network Communication (SNC)? There are 2 correct answers to this question. SAP system application server to a database. SAP system application server to an external Remote Function Call. SAProuter to an external Remote Function Call. SAP GUI for Windows to an SAP system application server.

Which of the following activities are part of SAP roles design? There are 2 correct answers to this question. Determine the role naming convention. Identify SAP and custom transactions and reports. Analyze the data migration requirements. Design the SAP transports schedule.

Which of the following status texts indicates that the proposed value for at least one field in the subordinate levels of the hierarchy has been changed from the SAP default value? Please choose the correct answer. Maintained. Manual. Standard. Changed.

Which transaction can you use to perform role maintenance? Please choose the correct answer. PFCG. SUIM. SUPC. PFUD.

You have changed the default password of user SAP*. What else can you do to secure SAP* from misuse? There are 2 correct answers to this question. Create a user master record for SAP* in all new clients with no roles. Lock user SAP*. Set the logon/no_automatic_user_sapstar parameter to a value greater than zero. Set the logon/no_automatic_user_sapstar parameter to zero.

Which of the following can the security audit log record? There are 3 correct answers to this question. Successful and unsuccessful transaction starts. System performance statistics. Remote Function Calls (RFCs) to function modules. User license type usages. Changes to user master records.

You are to configure a compliant identity management process flow. Which of the following components from SAP Access Control and SAP NetWeaver Identity Management (SAP NetWeaver ID Management) are required? There are 2 correct answers to this question. SAP NetWeaver ID Management - Identity Center (IC) and Virtual Directory Server (VDS). SAP BusinessObjects - Enterprise Role Management (ERM) and Superuser Privilege Management (SPM). SAP NetWeaver ID Management - Dispatcher Runtime Engine and Event Agent Service. SAP BusinessObjects - Risk Analysis and Remediation (RAR) and Compliant User Provisioning (CUP) components.

Which transaction can you use to create background jobs? Please choose the correct answer. SM36. SA38. SU10. PFCG.

When you use the edit function to insert authorizations manually to an existing profile, which options are available? There are 2 correct answers to this question. Selection criteria. Maintain authorization. Copy authorization. Full authorization.

Which of the following users investigate the application log to analyze business data? There are 2 correct answers to this question. Security administrator. Business owner. System auditor. Developer.

Denunciar Test