option
Cuestiones
ayuda
daypo
buscar.php

SECAUTH 3.0

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
SECAUTH 3.0

Descripción:
SECAUTH 3.0

Fecha de Creación: 2023/05/17

Categoría: Otros

Número Preguntas: 20

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?. SAP Data Services. SAP Information Steward. SAP Information Lifecycle Management. SAP Process Control.

Which authorization object is required to modify authorization data of derived roles?. S_USER_SYS. S_USER_AUT. S_USER_VAL. S_USER_AGR.

Which of the following actions are required to ensure complete logging of table data changes? (Choose three.). Log data changes must be enabled at the table level in transaction SE13. Parameter RECCLIENT must be maintained in transaction STMS. Client change options must be set to Automatic Recording of Changes. The security audit log must be activated using transaction SM19. Instance profile parameter rec/client must be maintained for client.

Where is the application log information (SLG1) saved?. In the location specified by the rsau/loc al/file parameter. In the directory specified by DIR_TRANS parameter. In the database. In the directory specified by DIR_LOGGING parameter.

Which of the following checks are performed for SAProuter by the SAP Security Optimization Service? (Choose three.). SAProuttab Check. Password Check. Secure Network Communication Check. User Management Check. Operating System Access Check.

Which transaction code allows you to configure the SAP Security Audit Log?. SM19. SM20. SM18. SUIM.

You want to turn off the SAP Menu on the Easy Access Menu screen. What administrative function do you need in Authorization Object S_USER_ADM?. SSM_CUST. PRGN_CUST. USR_CUST. USR_CUST_S.

Which of the following transactions allow you to customize or configure SAP Fiori Catalogs and Groups? (Choose two.). /U12/FLPD_CONF. /U12/FLPCM_CONF. U12/FLPD_CUST. /U12/FLPCM_CUST.

Which of the following conditions apply when merging authorizations for the same object? (Choose two). Changed authorization can be merged with manual authorizations, as long as the activation status is the same. Changed authorization can be merged with manual authorizations, even if the activation status is different. Both the activation status and the maintenance status of the authorizations do not match. Both the activation status and the maintenance status of the authorizations match.

What is the equivalent of the AS ABAP user type System in the AS Java UME security policy?. Default user. J2EE user. Technical user. Internal service user.

In the case of missing OData authorizations, why is it not recommended to maintain S_SERVICE manually within an SAP Fiori authorization role? (Choose two.). Both front-end and back-end entries are generating the same S_SERVICE authorization object with different authorization values. Both front-end and back-end entries are generating the same S_SERVICE authorization object with the same authorization values. The SRV_NAME value of the S_SERVICE authorization object is the name of an OData service. The SRV_NAME value of the S_SERVICE authorization object is the hash value of an OData service.

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation. Which instance profile parameter can you configure to allow a small group of users to bypass the limitation of multiple logins?. login/server_logon_restriction. login/multi_login_users. login/disable_multi_gui_login. login/disable_multi_rfc_login.

Which feature is available in the CommonCryptoLib scenario provided by SAP Security Library?. SSUTLS SPNEGO / ABAP. Secure Store and Forward (SSF). Hardware Security Module (HSM). SPNEGO / ABAP.

Which of the following items are addressed by Configuration Validation? (Choose three.). Database parameters. Critical roles. Software packages. Failed transports. RFC logins.

Which of the various protocols can be used to establish secure communication? (Choose three.). From Secure Login Client to Secure Login Server: DIAG/RFC (SNC), HTTPS, RADIUS. From Business Explorer to SAP Netweaver: DIAG/RFC (SNC), HTTPS (SSL). From SAP GUI to SAP Netweaver: DIAG/RFC (SNC). From Secure Login Server to SAP Netweaver: RFC (SNC). From Secure Login Server to LDAP Server: HTTPS (SSL).

Which transaction allows a user to change the authorization values of multiple roles at the same time?. PFCGROLEDIST. SUPC. PFCG. PFCGMASSVAL.

Which of the following are core principles of GDPR? (Choose three.). Data Archiving. Lawfulness, Fairness and Transparency. Storage Limitations. Data Minimization. Data Quality.

Which of the following are prerequisites for using transaction PFCG? (Choose two.). Maintain parameter auth/no_check_in_some_cases = Y. Fill in initials values for customer tables using transaction SU25. Maintain the Check Indicators for Critical Authorization objects. Generate Standard Role SAP_NEW using transaction SU25.

In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the following data sources for storing user data? (Choose three.). Java system database. Directory /usr/sap. LDAP Directory. UDDI provider. ABAP-based SAP system.

What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? (Choose two.). To recommend Legal Change Notes related to SAP innovations. To recommend Performance Notes to improve system response. To recommend SAP Hot News Notes (priority 1 and 2). To recommend SAP Security Notes for evaluation.

Denunciar Test