SECAUTH 2.0
![]() |
![]() |
![]() |
Título del Test:![]() SECAUTH 2.0 Descripción: SECAUTH 2.0 |




Comentarios |
---|
NO HAY REGISTROS |
How can you protect a system when you do not want the user assignments for a role to be transported?. Restrict import of users in table PRGN_CUST in the target system. Restrict import of users in table PRGN_CUST in the development system. Restrict access to the user assignment tab in PFCG in the target system. Restrict access to the user assignment tab in PFCG in the development system. Which of the following SUIM reports can you use to determine if a user has a segregation of duty violation? (Choose two.). User Comparison. User Level Access Risk Analysis. Users by Complex Search. Users With Critical Authorizations. Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? (Choose three.). Data Destruction. Data Archiving. Data Retention. Data Logging. Alert Notification. Which of the following authorization objects are used to secure the execution of External Commands when defining a background job step? (Choose two). S_RZL_ADM. S_BTCH_EXT. S_LOG_COM. S_PROGRAM. Which of the following features are provided by the SAP Fiori Launchpad content manager? (Choose three.). Display role assignments for Catalogs Activate OData Services. Create and configure Groups. Display the issues with SAP Fiori Launchpad content. Create and configure Catalogs. Which of the following correctly describe the SAP Security Optimization Service (SOS) offerings? (Choose three.). Self Service: performed by experienced service engineers. Onsite Service: performed by specialists. Onsite Service: available with additional cos. Remote Service: part of CQC service offering. Self Service: all completely automated checks in all SAP systems. Which configuration options apply to the usage of VCLIENT in the parameter icm/server_port_<xx> (Choose three.). VCLIENT value must be specified if SSL configuration is defined by SSLCONFIG. VCLIENT=1, the server asks the client to transfer a certificate. VCLIENT=0, which notifies the SSL server that no SSL client verification is needed. VCLIENT default value is 1. VCLIENT default value is 0. Which of the following authorization objects would be required to allow back-end server access to a Web Dynpro application using the SAP Fiori Launchpad?. S_TCODE. S_START. S_SERVICE. S_PERSONAS. Which application allows a role developer to perform the mass maintenance of menu options from selected SAP Fiori Tile Catalogs?. PRGN_COMPARE_ROLE_MENU. PRGN_CREATE_FIORI_BACKENDROLES. PRGN_PRINT_AGR_MENU. PRGN_CREATE_FIORI_FRONTENDROLE. What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.). Monitoring of GDPR compliance. Segregation of Duty analysis. Forensic investigations. Realtime alerts. Monitoring of security events. Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? (Choose two.). Static and Dynamic Application Security Testing. Capture of manual and automated check executions. Deprovisioning of problematic ABAP code. Direct integration with Root Cause Analysis. Which ABAP transaction codes are relevant for SNC Parameter Configuration? (Choose two.). SNCO. SNCWIZARD. SNCCONFIG. STRUST. Which of the following illustrate the simplification of user and role maintenance on SAP Cloud? (Choose two). Read and write access can be restricted. Business users have business roles. Templates are provided for role derivation. Business roles are automatically provisioned. Which of the following are examples of personal data under the GDPR? (Choose three.). IP address. Aggregated statistics on the use of a product. GPS data from a cellular phone. Age group. E-mail address. What information can be provided by an Audit Class? (Choose three.). User Authorizations. Dialog Logon. RFC/CPIC Logon. User Roles. Transaction Start. Which of the following defines "Phishing"?. Pretending to be another user. Acquiring sensitive information by masquerading as a trustworthy entity. Overloading an application with requests. Modifying an IP address of the source of the TCP/IP packet. Which of the following tables contain transport request object lists and table entry keys? (Choose two.). E071K. E070. E070L. E071. Which of the following describe SAP Fiori Tile Target Mapping? (Choose two.). It defines the target application which is launched. It is part of the SAP Fiori Launchpad configuration. It represents the visual part of a tile. It is defined within an SAP Tile Group. Which of the following describes an Authorization Object class?. It defines a group of 1 to 10 authorization fields together. It defines the smallest unit against which an authorization check can be run. It defines a logical grouping of authorization objects. It defines authorizations for different authorization objects. Which of the following parameters must be configured to capture log data in the Security Audit Log?. rec/client. dir_logging. rsau/enable. rdisp/TRACE. |