option
Questions
ayuda
daypo
search.php

Geografija 7 1/3

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Geografija 7 1/3

Description:
SECAUTH 1

Creation Date: 2022/10/26

Category: Others

Number of questions: 30

Rating:(1)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0?. The service provider get the authentication request from the identity provider over a SOAP channel. The service provider queries the user for authentication credentials. The identity provider get the authentication response from the service provider over a SOAP channel. The service provider redirects the user to an identity provider and includes a SAML artifact referring to authentication request.

Your company uses derived roles. During maintenance of the Plant Manager imparting role, you add a new transaction to the Menu tab which introduces a new organizational level that will be unique for each of your 150 plants. How will the new organization level be maintained in the derived role?. Automatically using the Copy Data button during maintenance of the imparting role. All at once using transaction PFCGMASSVAL. Automatically after generating the profiles of the imparting role and adjusting the derived roles. Manually by maintaining each derived role individually.

Which feature is available in the CommonCryptoLib Scenario provided by SAP Security Library?. Hardware Security Model (HSM). SPNEGO/ABAP. SSL/TLS. Secure Store and Forward (SSF).

Which of the following authorization objects are used to secure the execution of External Commands when a defining a background job step? Note: There are 2 correct answer to this question. S_LOG_COM. S_PROGRAM. S_BTCH_EXT. S_RZL_ADM.

Where you can enable Read Access Logging tools?. SUIM. SICF. SPRO. SWI5.

You are Configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be use to secure access?. It allows you to specify access to tables associated with a specific authorization group. It allows you specify access to specific client-dependent table. It allows you specify access to a specific client independent table. It allows you specify access tables reference by a specific program group.

Which of the following checks performed for SAProuter by the SAP security optimization service (SOS)? Note: There are 3 correct answer to this question. Secure Network Communication Check. Saprouttab Check. User Management Check. Operating System Access Check. Password Check.

What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? Note: There are 2 correct answer to this question. To recommend SAP Hot News Notes (priority 1 and 2). To recommend Legal Change Notes related to SAP innovations. To recommend Performance Notes to improve system response. To recommend SAP security Notes for evaluation.

Which of the various protocols can be used to establish secure communication? Note: There are 3 correct answer to this question. From Secure Login Server to LDAP Server : HTTPS (SSL). From Secure Login Server to SAP Netweaver : RFC (SNC). From Business Explorer to SAP Netweaver : DIAG/RFC (SNC), HTTPS (SSL). From Secure Login Client to Secure Login Server : DIAG/RFC (SNC), HTTPS, RADIUS. From SAP GUI to SAP Netweaver : DIAG/RFC (SNC).

You want to adjust check indicator values for certain authorization object delivered by SAP. In which of the following tables should you adjustments be recorded?. USOBX_C. USOBT_C. USOBHASH. USOBX.

Which values are permitted for the S_BTCH_JOB authorization object? Note: There are 3 correct answer to this question. SHOW. RELE. 01 (Create). 02 (Change). DELE.

Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?. SAP Information Steward. SAP Process Control. SAP Information Lifecycle Management. SAP Data Services.

Which of the following are SAP UI5 Fiori application types? Note: There are 2 correct answer to this question. Legacy. Transactional. Analytical. Web Dynpro.

Which application allows a role developer to perform the mass maintenance of menu options from selected SAP Fiori Title Catalogs?. PRGN_PRINT_AGR_MENU. PRGN_COMPARE_ROLE_MENU. PRGN_CREATE_FIORI_FRONTENDROLE. PRGN_CREATE_FIORI_BACKANDROLES.

Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? Note: There are 2 correct answer to this question. Static and Dynamic Application Security Testing. Deprovisioning of problematic ABAP code. Direct integration with Root Cause Analysis. Capture of manual and automated check execution.

Which of the transaction allows a user to change the authorization values of multiple roles at same time?. PFCGROLEDIST. SUPC. PFCGMASSVAL. PFCG.

Which transaction codes are relevant to enable SNC between ABAP system? Note: There are 3 correct answer to this question. RZ10. SNC0. STRUST. PFCG. SU01.

What is equivalent of the AS ABAP user type System in the AJ JAVA UME security policy?. Internal Service User. J2EE User. Default User. Technical User.

Which of the following table contains transport request object list and table entry keys? Note: There are 2 correct answer to this question. E071. E070. E070L. E071K.

A PFCG role can be linked to an SAP Organizational Management structure by which object types? Note: There are 3 correct answer to this question. Job. Person. Organizational Unit. Task. Position.

When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following item should be provided? Note: There are 3 correct answer to this question. SAP Favorites. Catalog for the Start Authorization. UI access to the Apps. Start Authorizations for OData Services. WAPA Business Server Pages.

Which configuration options apply to the usage of VCLIENT in the parameter icm/server_port_<xx>? Note: There are 3 correct answer to this question. VCLIENT default value is 0. VCLIENT value must be specified if SSL configuration is defined by SSLCONFIG. VCLIENT default value is 1. VCLIENT = 0, which notifies the SSL server that no SSL client verification is needed. VCLIENT = 1 the server asks the client to transfer a certificate.

When you are troubleshooting an application start issue, what does the Search Startable Application in Roles report help you determine? Note: There are 2 correct answer to this question. If the PFCG roles contain all the start authorizations required for the application. If the PFCG menu contains SAP Fiori Tile Group. If there is an application start lock. If the PFCG roles assigned to end user.

Which of the following app-specific types of entities do users need to use SAP Fiori apps? Note: There are 2 correct answer to this question. Master Data. UI. Authorizations. Parameters.

Which of the following actions are required to ensure complete logging of table data changes? Note: There are 3 correct answer to this question. The security log must be activated using transaction SM19. Client change option must be set to Automatic Recording of changes. Instance profile parameter rec/client must be maintained for client Log. Data changes must be enable at the table level in transaction SE13. Parameter RECCLIENT must be maintained in transaction STMS.

Which of the following items are addressed by Configuration Validation? Note: There are 3 correct answer to this question. Database Parameters. Critical Roles. Failed Transport. Software Packages. RFC Logins.

You are Configuring authorizations to secure access to table data using transaction SM13 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be use to secure access?. It allows you to specify access to tables associated with a specific authorization group. It allows you specify access to specific client-dependent table. It allows you specify access to a specific client-independent table. It allows you specify access to tables reference by a specific program group.

Which TADIR Service Object type includes business functional authorization object used within the OData execution?. IWSG. IWSC. OSOD. IWSV.

Which of the following Correctly describe the SAP Security Optimization Service (SOS) Offering? Note: There are 3 correct answer to this question. Onsite Service: Performed by Specialist. Remote Service: Part of CQC service offering. Self Service: All Completely Automated checks in all SAP system. Onsite Service: Available with additional Cost. Self Service: Perform by experienced service engineers.

Which of the following transaction allows you to define role assignments for 0 Data Services that are available on multiple back-end systems? Note: There are 2 correct answer to this question. /IWFND/MAINT_SERVICE. /IWFND/GW_SYS_ALIAS. /IWFND/GW_CLIENT. /UI2/GW_MAINT_SRV.

Report abuse