Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONArchitect

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Architect

Description:
Security_Architect

Author:
Hemant
(Other tests from this author)

Creation Date:
27/09/2021

Category:
Others

Number of questions: 80
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Which communication methods does the SAP Fiori Launchpad use to retrieve business data? Note:There are 3 correct answers to this question. A. Trusted RFC B. Secure Network Communication (SNC) C. HTIP(S) D. Info Access (lnA) E. Data.
How can you protect a table containing sensitive data using the authorization object S_TABU_DIS? A. The field DICBERCLS of the authorization object must enumerate all table names of the tables containing sensitive data. B. Authorization table groups containing tables with sensitive data must be defined in table TDDAT and these must be omitted for all employees who do not need access to these tables C. The tables containing sensitive data must be named using the authorization object S_TA BU_NAM for all responsible administrator employees. The fields DICBERCLS of the object S_TABU_DIS can then be filled with *. D. The tables containing sensitive data must be associated with table groups in table TBRG.
Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager? A. S_RFCACL B. S_SERVICE C. S_ ICM D. S_RFC.
What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note:There are 2 correct answers to this question. A. Baseline detection B. Predictive threat notification C. Pseudonymize user identities for data protection D. Synchronization of user contexts from ABAP Systems.
When re-configuring the user management engine (UME) of an AS Java system, what do you need to consider to change the data source from system database to an ABAP system successfully? A. All users and groups in the system database must have different IDs than existing users and groups in the ABAP system. B. The logon security policy for the existing users is aligned with the logon security policy in the ABAP system. C. You must manually replace the UME configuration file dataSourceConfiguration_database_only.xmlwith an appropriate dataSourceConfiguration_abap.xmlfile D. You need to import the users from the system database into the ABAP system.
What are the features of the Audit Information System (AIS)? Note:There are 2 correct answers to this question. A. It offers two types of audit reports: system and business B. The report selection variables are configured during setup C. It can be launched directly using transact on SECR D. The roles are built from nodes in the Implementation Guide (IMG).
What is the User Management Engine (UME) property "connect on pooling" used for? Note:There are 2 correct answers to this question. A. To improve performance of requests to the LDAP directory server B. To share server resources among requesting LDAP clients C. To create a new connect on to the LDAP directory server for each request D. To avoid unauthorized request to the LDAP directory server.
Your customer runs a 3-tier environment You are asked to set up controls around monitoring the sensitive objects (such as programs, user-exits, function modules)in a development system before they are transported to the quality assurance system. Which table would you maintain to monitor such sensitive objects before executing an import? A. TMSTCRI B. TMSMCONF C. TMSBUFFER D. TMSCDES.
You have an HR table for which you want to create a role to provide users the ability to display and change its table content based on the country groupings. Which of the steps would you take to accomplish these requirements? Note:There are 2 correct answers to this question. A. Maintain the authorization object S_TABU_LIN B. Define an organization criterion through transaction SPRO C. Maintain the authorization object S_TABU_NAM D. Create an authorization group with appropriate authorization fields for the table.
What benefits does the SAP Cloud Connector have compared to a 3rd partyreverse proxy solution, when connecting your SAP Cloud Platform with your SAP backend systems? Note:There are 2 correct answers to this question. A. It can cache SAP proprietary OData packets to improve the response times B. It supports multiple application protocols, such as HTTP and RFC C. It allows for remote invocation by the SAP Cloud Platform only D. It establishes an SSL VPN tunnel to SAP Cloud Platform.
Where can we store the Security Audit Log events? Note:There are 2 correct answers to this question. A. In a central fi e system B. In the database table RSAU_BUF_DATA C. In the file system of the application servers D. In the SAP Solution Manager system.
You are consolidating user measurement results and transferring them to SAP. What act on do you take? A. Run transact on USMM B. Run report RSLAW_PLUGIN C. Run report RSUSR200 D. Run report RFAUDI06_BCE.
Based on your company guidelines you have set the password expiration to 60 days. Unfortunately, there is an RFC user on your SAP system which must not have a password change for 180 days. Which option would you recommend to accomplish such a request? A. Create additional authorizations for RFC users and assign it to them B. Create enhancement spot I user-exit C. Create a security policy via SECPOL and assign it to tl1e RFC users D. Change profile parameter login/password_expiration_time to 180.
Which authorizations should you restrict when you create a developer role in an AS ABAP production system? Note:There are 2 correct answers to this question. A. The ability to execute class methods through authorization object S_PROGRAM B. The ability to execute queries through authorization object S_OUERY C. The ability to use the ABAP Debugger through authorization object S_DEVELOP D. The ability to execute function modules through authorization object S_DEVELOP.
You want to carry out some preparatory work for executing the SAP Security Optimization Self-service on a customer system. Which of the following steps do you have to execute on the managed systems? Note:There are 2 correct answers to this question. A. Grant operating system access B. Install the ST-A/Pl plug-in C. Configure specific authorizations D. Configure Secure Network Communications.
You want to configure SNC with X.509 certificates using Common CryptoLib as the cryptographic library in a new installed AS ABAP system. Besides running SNCWIZARD, what do you need to set up for this scenario? Note:There are 2 correct answers to this question A. Set the environment variable CCL_ PROFILE to the default profile file path B. Set the environment variable CCL_ PROFILE to SECUDIR C. Set the CCL SNC parameters using sapgenpse D. Maintain the relevant CCL/SNC/' profile parameters.
A user has the authorization to execute SP01. What can this user access with authorization object S_ SPO_ ACT when the 'Value for Authorization Check' field is set to "_USER A. All spool requests for users in the same user group B. All spool requests for a specific user in the client C. All spool requests for all users in the client D. User's own spool requests.
How can you register an SAP Gateway service? Note:There are 2 correct answers to this question A. Use SAP_GAT EWAY_ACTIVATE_ODATA_SERV in transact on STC01 on the front-end server B. Use transaction /IWFND/MA INT_SERVICE on the front-end server C. Use transaction SEGW on the back-end server D. Use SAP_GAT EWAY_BASIC_CONFIG in transact on STC0 1 on the frontend server.
Which basis transaction provides an optimized user interface for evaluating authorization checks only? A. ST01 B. RSECADMIN C. STAUTHTRACE D. ABAP_TRACE.
What reference is used to connect multiple Cloud Connectors to one SAP Cloud Platform subaccount? A. System Alias B. Instance ID C. Location ID D. Virtual Host.
To prevent session fixation and session hijacking attacks, SAP's HTTP security session management is highly recommended. What are the characteristics of HTTP security session management? Note:There are 2 correct answers to this question. A. The session identifier is a reference to the session context transmitted through a cookie. B. The system is checking the logon credentials again for every request C. It uses URLs containing sap-context d to identify the security session D. The security sessions are created during logon and deleted during logoff.
You want to use Configuration Validation functionality in SAP Solution Manager to check the consistency of settings across your SAP environment. What serves as the reference basis for Configuration Validation? Note:There are 2 correct answers to this question. A. A list of recommended settings attached to a specific SAP Note B. A virtual set of manually maintained configuration ems C. A result list of configuration items from SAP Early Watch Alert (EWA) D. A target system in your system landscape.
What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note:There are 2 correct answers to this question A. The Logon ticket is used for user-to-system communication B. The Logon ticket session is held in the working memory C. The Logon ticket has an unconfigurable lifetime validity D. The Logon ticket is domain restricted.
You are running a 3-tier SAP system landscape. Each time you are accessing STMS_IMPORT on any of these systems, you are prompted for a TMSADM password. How can you stop this prompt from appearing? A. Reset the TMSADM user's password on the system you are trying to access STMS_ IMPORT. B. Run the report RSUSR405 on the domain controller. C. Change the TMSA DM user's password directly in the TMS RFC destination in transact on SM59. D. Run the report TMS_ UPDATE_PWD_OF_TMSADM on the domain controller.
In your SAP HCM system, you are implementing structural authorizations for your users. What are the characteristics of this authorization type? Note:There are 2 correct answers to this question. A. The structural profile is maintained and assigned to users using the Profile Generator B. The structural profile is maintained and assigned to users using the Implementation Guide C. The structural profile determines the access mode which the user can perform D. The structural profile determines the accessible object in the organizational structure.
You have implemented CUA in your organization and you only want to compare the company address data between the central system and child systems to perform the synchronization activities. Which transact on do you use for comparing the company address between these systems? A. SCUC B. SUCOMP C. SCUG D. SCUM.
For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA system? Note:There are 2 correct answers to this question. A. To protect the password of the root key backup B. To store the secure single sign-on configuration C. To store root keys for data volume encryption D. To protect the X.509 public key infrastructure certificates.
What are characteristics only valid for the MDC high isolation mode? A. Every tenant has its own set of database users B. Every tenant has its own set of database users belonging to the same sapsys group C. Every tenant has its own set of OS users D. All internal database communication is secured using SNC.
You want to allow some of your colleagues to use the SAP GUI forJava to connect directly to your SAP back-end system from a public internet connection without having to set up a VPN connection first. Which of the following SAP solutions is suited for this purpose? A. SAP Cloud Connector B. SAP router C. SAP Web Dispatcher D. SAP NetWeaver Gateway.
What authorization object is checked when a user selects an A BAP Web Dynpro application to execute? A. S_TCODE B. S_SERVICE C. S_PROGRAM D. S_START.
The SAP HANA database is installed with multi database container (MDC) mode with multiple tenant databases configured. What are the required activities to enable access between tenants? Note:There are 2 correct answers to this question. A. Decrease the level of isolation mode on all MDC tenants B. Create user mapping between local and remote tenant databases C. Configure smart data access (SDA) between the relevant HANA tenants D. Set whitelist of cross-tenant database communication channel.
You have a load balancer in a DMZ network zone (called nat1.mydomain.com) in front of 2 SAP NetWeaver AS systems (host1.mydomain.com, host2.mydomain.com). What is the recommended common name part of the distinguished name on the SSL Server's PSE? A. It should be a combined DNS alias for host 1.mydomain.com and host2.mydomain.com and nat1.mydomain.com B. It should be nat1.mydomain.com C. It should be •.mydomain.com (wildcard) names D. It should be host 1.mydomain.com, host2.mydornain.com individually for each PSE.
What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note:There are 3 correct answers to this question A. The default values in the tables USOBX and USOBT B. The default authority check settings for the role maintenance tool C. The default values so they are appropriate for the transactions used in the roles D. The authorization objects that are not linked to transact on codes correctly E. The authorization objects that have unacceptable default values.
Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the mallcious programs. What is the valid fi e format where data files are first converted into and then checked by a virus scanner? A. SAP compressed B. XML C. 0csv D. Plain text.
In addition to the authorization /Ul2/LAUNCHPAD, which other authorizations are required to assign to an SAP Fiori Launchpad user? Note:There are 2 correct answers to this question. A. /U12/INTEROP B. /Ul2/FLC C. /U12JPAGE_BUILDER_PERS D. /Ul2JPAGE_BUILDER_CUST.
A user reports an issue with data not showing up in the visualization of the SAP Fiori tiles. You want to verify the target mapping. At what level are you going to check the target mapping? A. O At the application level in the Web IDE B. O At the group level in the SAP Fiori Launchpad C. O At the catalog level in the SAP Fiori front-end server D. O At the group level in the SAP Fiori front-end server.
What are the characteristics of assertion tickets? Note:There are 2 correct answers to this question A. They are transmitted as cookies B. They are used for system-to-system communication C. They have an unconfigurable validity of 2 minutes D. They are used for user-to-system trusted login.
Why should you create multiple dispatchers in SAP Identity Management? Note:There are 2 correct answers to this question. A. To accommodate scalability B. To handle password provisioning C. To support fail-over scenarios D. To handle special network access requirements.
You are setting up your SAP NetWeaver AS in a SSL client scenario. What are the reasons to choose an "anonymous SSL Client PSE" setup? Note:There are 2 correct answers to this question. A. To support mutual authentication B. To have an individual identity when accessing a specific application C. To use as a container for the list of CAs that the server trusts D. To support server-side authentication and data encryption.
You have Reason Codes already defined. Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management? A. • Maintain an Owner for a Firefighter ID • Maintain a Firefighter ID for Controllers and Firefighters • Maintain Access Control Owner B. • Maintain an Owner for a Firefighter ID • Maintain a Firefighter ID for Controllers and Firefighters • Maintain Access Control Owner C. • Maintain an Owner for a Firefighter ID • Maintain a Firefighter ID for Controllers and Firefighters • Maintain Access Control Owner D. • Maintain a Firefighter ID for Controllers and Firefighters • Maintain an Owner for a Firefighter ID • Maintain Access Control Owner.
You verified the password of the TMSADM user in your SAP landscape to be SAP defaulted. You want to reset this password by using program TMS_UPDATE_PWD_OF_TMSADM. What steps would you take to reset this password? Note:There are 2 correct answers to this question A. Run this program in the Domain Controller (client 000) B. Deactivate the SNC opt on C. Lock TMSADM in all the system/clients including 000 D. Assign “SAP_ALL" to TMSADM in all systems/clients including 000.
Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fiori Launchpad? Note:There are 2 correct answers to this question. A. Catalog B. Role C. Group D. User.
You have implemented CUA in your organization and you want to set the field distribution attribute as follows: Maintain a default value in the central system that is automatically distributed to the child systems when you create a user. After distribution, the data is maintained only locally and is no longer distributed if you change it in the central or child system. Which field distribution parameter do you maintain? A. Local B. Redistribution C. Proposal D. Global.
Which OData authorizations are required for a user to see business data in the SAP Fiori Launchpad? Note:There are 2 correct answers to this question A. Access authorization in the SAP Fiori front-end system B. Start authorization in the SAP Fiori front-end system C. Start authorization in the SAP S/4HANA back-end system D. Access authorization in the SAP S/4HANA back-end system.
You have configured a Gateway SSO authentication using X.509 client certificates. The configuration of the dual trust relationship between client (browser) and SAP Web Dispatcher as well as the configuration of the SAP Web Dispatcher to accept and forward client certificates were done. Users complain that they can't log in to the back-end system. How can you check the cause? A. Run back-end system trace using ST12 B. Run gateway transaction /IWFND/TRACES C. Run gateway transaction /IWFND/ ERROR_LOG D. Run back-end transaction SMICM and open the trace file.
What authorization objects do we need to create job steps with external commands in a background job? Note:There are 2 correct answers to this question A. S_BTCH_EXT B. S_LOG_COM C. S_RZL_ADM D. S_ADMl_FCD.
Your company is running SAP S/4HANA on premise, with the requirement to run the SAP Fiori Launchpad in the SAP Cloud Platform. What would be the recommended scenario for user authentication for internet browser access to the SAP Fiori Launchpad? A. SAP Logon Tickets B. X.509 Client Certificates C. Principal Propagation D. SAML2 and OData Provisioning.
You are running an SAP HANA database in a multi database container (MDC) mode with a single tenant configured. The global_auditing_state parameter has been set to "true" on the global.ini.After restarting the system and tenant databases, the tenant did not come up. When checking the cause, it was discovered that a tenant configuration parameter has been changed. The audit logging did NOT show any events.What could be the reason for this? Note:There are 2 correct answers to this question. A. The audit level was set to INFO B. The system was offline when the changes were done C. The configuration parameter was changed from the OS level D. The global_auditing_state parameter on the nameserver.ini file needs to be activated.
You are using the SAP Web Dispatcher for load-balancing purposes. Which actions are performed by the SAP Web Dispatcher in this scenario? Note:There are 2 correct answers to this question. A. Uses SAP logon groups to determine which requests are directed to which server B. Decrypts the HTTPS request and then selects the server C. Authenticates the user's credentials D. Checks current state of the message server.
You want to check the custom ABAP codes in your system for security vulnerabilities and you want to use the Code Vulnerability Analyzer (CVA) for carrying out these extended security checks. What needs to be done for this purpose? Note:There are 2 correct answers to this question. A. Run CVA from the ABAP Test Cockpit B. Execute transaction ST12 to start the analysis C. Execute program RSLIN_SEC_LICENSE_SETUP D. Run CVA from the ABAP Trace.
Why do you use table logging in AS ABAP? A. To log changes in customizing tables B. To log changes in application data C. To log changes in master data D. To log changes in table technical settings.
In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction. How do you prevent the access of users to the transaction A from within the program? A. Make sure you do NOT assign transact on A to the authorization object S_TCODE in the role that you assign to the unauthorized users. B. Maintain SE93 with authorization objects for transact on A. C. Maintain the check indicator in table TCDCOUPLES D. Ensure that transact on A is NOT assigned into the same program authorization group.
How would you control access to the ABAP RFC function modules? Note:There are 2 correct answers to this question. A. O Deactivate switchable authorization checks B. O Block RFC Callback Whitelists C. O Implement UCON functionality D. O Restrict RFC authorizations.
Which of the following events will create security alerts in the CCMS Alert Monitor of SAP Solution Manager? Note:There are 2 correct answers to this question. A. Changes to the instance profile B. Manual table changes C. Start of reports D. Call of RFC functions.
You are evaluating the "Cross-client object change" option using transact on SCC4 for your Unit Test Client in the development environment. Which setting do you recommend? A. No changes to repository and cross-client customizing objects B. Changes to repository and cross-client customizing allowed C. No changes to cross-client customizing objects D. No changes to repository objects.
SNC is configured in the production system. For emergency purposes, you want to allow certain accounts to be able to access the system with password logon . What do you need to set up for this purpose? Note:There are 2 correct answers to this question. A. Use profile parameter SNC/ONLY_ENCRYPTED_GUI with value 'O' B. Maintain the user access control list in table USRACLEXT C. Use the 'Unsecure communication permitted option' In SU01 for specific users D. Use profile parameter SNC/ACCEPT_ INSECURE_GUI with value 'U'.
You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad. Which of the following scenarios do you choose? A. Chrome, SAP Cloud Platform, SAP GUI for Java B. Chrome, SAP Enterprise Portal, SAP GUI for Java C. Internet Explorer, ABAP front-end server, SAP GUI for Windows D. Internet Explorer, SAP Business Client, SAP GUI for Windows.
Which tasks would you perform to allow increased security for the SAP Web Dispatcher Web Administration interface? Note:There are 2 correct answers to this question A. Use a separate port for the content B. Use subparameter ALLOWPUB = FALSE of the profile parameter icm/server_port_<xx> C. Use access restrictions with the icm/HTTP/auth_<xx> profile parameter D. Use Secure Socket Layer (SSL) for password encrypt on.
A system user created a User1 and a schema on the HANA database with some data. User2is developing modelling views and requires access to objects in User1's schema. What needs to be done? A. User2 needs to be granted with the same roles like User1 B. User1 should grant _SYS_REPO with SELECT WITH GRANT privilege C. ROLE ADMIN needs to be granted to User2 D. System user should grant User2 with SELECT privilege to User 1schema.
A security consultant has activated a trace via ST01 and is analyzing the authorization error with Return Code 12. What does the Return Code 12 signify? A. "Objects not contained in User Buffer" B. "No authorizations but does have authorization object in their buffer" C. "Too many parameters for authorization checks” D. "No authorizations and does NOT have authorization object in their buffer".
Because of which security threat would you need to make additional configuration settings to run the SAP Fiori Launchpad from within your SAP NetWeaver Portal? A. Cross-Site Request Forgery B. Content Spoofing C. Cross-Site Scripting D. Clickjacking.
Which features does the SAP Router support? Note:There are 2 correct answers to this question. A. Terminating, forwarding and (re)encrypting requests, depending on the SSL configuration B. Password-protecting connections from unauthorized access from outside the network C. Balancing the load to ensure an even distribution across the back-end servers D. Controlling and logging network connections to SAP systems.
What is required when you configure the PFCG role for an end-user on the front-end server? Note:There are 2 correct answers to this question. A. The S_RFC authorization object for the OData access B. The Fiori Launchpad designer assignment C. The catalog assignment for the start authorization D. The group assignment to display it in the Fiori Launchpad.
User1 grants role 1 to user2. Who can revoke role 1 role from user2? A. Any user with the 'ROLE ADMIN' database role B. Only user1 C. The system OBA user D. The owner of role 1.
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transaction do you have to use to map a back-end system to one of those roles? A. /Ul2/GW_SYS_ALIAS B. /IWFND/MAINT_SERVICE C. SM59 D. PFCG.
What does the SAP Security Optimization Service provide? Note:There are 2 correct answers to this question A. Results with recommendations on how to resolve identified vulnerabilities without prioritization B. Configuration check of the SAP systems and the SAP middleware components against defined configurations C. Analysis of your operating system, database, and entire SAP system to ensure optimal performance and reliability D. Analysis of security vulnerabilities within an enterprise's SAP landscape to ensure optimal protection against intrusions.
Which data source needs to be integrated into SAP Identity Management via the Virtual Directory Server (VOS)? A. AS ABAP B. SAP HCM C. AS Java D. LDAP.
You are reviewing the authorizations for Core Data Services (CDS) views. How are classic authorizations integrated with CDS authorizations? A. By defining access conditions in an access rule for the CDS view B. By using the statement AUTHORITY-CHECK in the access control of the CDS view C. By defining the CDS view in the authorization object in SU21 D. By assigning the CDS view to the authorization profile in PFCG.
How do you check when and by whom profiles were assigned or deleted? A. Run report RSUSR008_009_NEW with appropriate filters B. Check system trace using transaction ST01 B. Run report RSUSR100 with appropriate filters C. Check security audit log using transact on SM20.
What are the requirements of SPNego SSO configuration in an SAP Fiori front-end system? Note:There are 2 correct answers to this question. A. The system requires an identity provider as an issuing system to enable single sign-on with SPNego in an internet-facing deployment scenario . B. The system should typically be located within the corporate network. C. The system's users in the ABAP system must have the same user names as the database users in SAP HANA D. The system requires Microsoft Active Directory infrastructure in place.
Which Object ID is used to integrate Business Rule Framework (BRF+) to Multi Step Multi Process (MSMP) initiator workflow? A. Expression ID B. Function ID C. Application ID D. Process ID.
What is the SAP Best Practice to delete a security SAP role in SAP landscape? A. Delete the SAP role in all clients in all systems using Profile Generator B. Transport the SAP role and delete the role using Profile Generator C. Delete the SAP role in all clients using Profile Generator D. Delete the SAP role using Profile Generator, and then put it in the transport.
The SSO authentication using X.509 client certificates is configured. Users complain that they can't log in to the back-end system. The trace file shows the following error message:"HTTP request [2/5/9] Reject untrusted forwarded certificate''. What is missing in the configuration? Note:There are 2 correct answers to this question. A. On the back-end, the profile parameter icm/HTTPS/verify client must NOT be set to 0 B. On the web-dispatcher, the SAPSSLS.pse must be signed by a trusted certification authority C. On the web-dispatcher, the profile parameter icm/HTTPS/verify_client must be set to 0 D. The web dispatcher's SAPSSLC.PSE certificate must be added to the trusted reverse proxies list in icm/trusted_reverse_proxy_<xx>.
The SAP HANA database has its parameters configured with its default values. How can the SAP_INTERNAL_HA NA_SUPPORT catalog role be used? A. The role can be granted only with system privileges B. The role can be granted to multiple users at a time C. The role can be granted to the SYSTEM user D. The role can be granted to another role (nested).
Insufficient authorization checks might allow A BAP programs to access the PSE files. Which authorization objects should we check to protect the PSEs? Note:There are 2 correct answers to this question A. S_ADMl_FCD B. S_DEVELOP C. S_RZL_ADM D. S_DATASET.
How does the SAP SSO wizard (transaction SNCWIZARD) simplify the SNC configuration process? A. It creates the SNC_LIB environment variable B. It exports an SNC SAPCRYPTOLIB certificate and imports it into the partner system C. It installs the CA certificate response D. It sets the profile parameters for SAP SNC and SPNego in the default profile.
You have delimited a single role which is part of a composite role, and a user comparison for the composite role has been performed. You notice that the comparison did NOT remove the profile assignments for that single role. What program would you run to resolve this situation? A. 0PRGN_COMPARE_ROLE_MENU B. 0 PRGN_COMPRESS_TIMES C. 0 PRGN_MERGE_PREVIEW D. 0 PRGN_DELETE_ACT IVITY_GROUPS.
How do you handle user "SAP 'in AS ABAP? Note:There are 3 correct answers to this question. A. Remove all authorizations from the user B. Set profile parameter login/no_automatic_user_sapstar to 0 C. Set profile parameter login/no_automatic_user_sapstar to 1 D. Lock and expire the user in all clients E. Lock and expire the user in all clients except 000.
How is the role concept applied in the authorizations for Core Data Services (CDS) views? A. CDS roles are defined in the CDS view and implicitly applied to all users B. CDS roles are mapped to the CDS view in the access rules C. CDS roles are defined in the WHERE clause when calling a CDS view in Open SOL D. CDS roles are defined in the CDS view and assigned to users in the classic role editor.
Which tool do you use to customize the SAP HANA default password policy? Note:There are 2 correct answers to this question A. SAP HANA Studio B. SAP HANA Lifecycle Manager C. SAP Web lDE D. SAP HANA Cockpit.
Report abuse Consent Terms of use