option
Questions
ayuda
daypo
search.php

Geografija 7 3/3

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Geografija 7 3/3

Description:
SECAUTH 3

Creation Date: 2022/10/28

Category: Others

Number of questions: 39

Rating:(2)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

In SAP S/4HANA Cloud authorization objects are grouped into which item?. Single technical roles. Groups. Business roles. Privileges.

Which of the following transactions allow you to customize or configure SAP Fiori Catalogs and Groups? (Choose two.). /U12/FLPD_CONF. /U12/FLPCM_CONF. /U12/FLPD_CUST. /U12/FLPCM_CUST.

Which of the following authorization objects would be required to allow back-end server access to a Web Dynpro application using the SAP Fiori Launchpad?. S_TCODE. S_START. S_SERVICE. S_PERSONAS.

Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?. Logging. Configuration. Activation. Evaluation.

Which is the frequency of SAP Patch day?. Yearly. Quarterly. Weekly. Monthly.

Which of the following are prerequisites for using transaction PFCG? (Choose two.). Maintain parameter auth/no_check_in_some_cases = Y. Fill in initials values for customer tables using transaction SU25. Maintain the Check Indicators for Critical Authorization objects. Generate Standard Role SAP_NEW using transaction SU25.

You want to turn off the SAP Menu on the Easy Access Menu screen. What administrative function do you need in Authorization Object S_USER_ADM?. SSM_CUST. PRGN_CUST. USR_CUST. USR_CUST_S.

What is the main purpose of SAP Access Control, as an enterprise software solution?. Identify security risk and document compliance. Deployment of encryption services. Secure authentication for cloud and on-premise. Manage corporate social media presence.

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation. Which instance profile parameter can you configure to allow a small group of users to bypass the limitation of multiple logins?. login/server_logon_restriction. login/multi_login_users. login/disable_multi_gui_login. login/disable_multi_rfc_login.

Which of the following actions correctly describes the usage of Front Channel Single Sign-On based on (SAML) 2.0?. The service provider queries the user for authentication credentials. The identity provider queries the user for authentication credentials. The identity provider returns the user to the service providers with an authentication request. The identity provider presents the requested resource to the user.

Which of the various protocols can be used to establish secure communication? (Choose three.). From Secure Login Client to Secure Login Server: DIAG/RFC (SNC), HTTPS, RADIUS. From Business Explorer to SAP Netweaver: DIAG/RFC (SNC), HTTPS (SSL). From SAP GUI to SAP Netweaver: DIAG/RFC (SNC). From Secure Login Server to SAP Netweaver: RFC (SNC). From Secure Login Server to LDAP Server: HTTPS (SSL).

Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0?. The service provider redirects the user to an identity provider and includes a SAML artifact referring to the authentication request. The service provider gets the authentication request from the identity provider over a SOAP channel. The service provider queries the user for authentication credentials. The identity provider gets the authentication response from the service provider over a SOAP channel.

In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the following data sources for storing user data? (Choose three.). Java system database. Directory /usr/sap. LDAP Directory. UDDI provider. ABAP-based SAP system.

Which of the following are system security threats? (Choose three.). Availability. Code injection. Authorization violation. System penetration. Nonrepudiation.

What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.). Monitoring of GDPR compliance. Segregation of Duty analysis. Forensic investigations. Realtime alerts. Monitoring of security events.

Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? (Choose two.). SAP IQ. SAP HANA Smart Data Streaming. SAP ASE. Forensic lab.

Which of the following defines "Phishing"?. Pretending to be another user. Acquiring sensitive information by masquerading as a trustworthy entity. Overloading an application with requests. Modifying an IP address of the source of the TCP/IP packet.

SAP Cloud Identity and Access Governance consists of which of the following software services? (Choose three.). Access Request. User Access Certification. Emergency Access Management. Access Analysis. Role Design.

What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? (Choose three.). Mitigations. Risk library. Emergency access. Process hierarchy. Mitigation controls.

You are responsible for determining the reason why you need personal data and how this data is processed or stored. What key role do you play under GDPR in relation to personal data?. Data Steward. Data Processor. Data Subject. Data Controller.

Which of the following are core principles of GDPR? (Choose three.). Data Archiving. Lawfulness, Fairness and Transparency. Storage Limitations. Data Quality. Data Minimization.

Which of the following are examples of personal data under the GDPR? (Choose three.). IP address. Aggregated statistics on the use of a product. GPS data from a cellular phone. Age group. E-mail address.

Which of the following correctly describe the SAP Security Optimization Service (SOS) offerings? (Choose three.). Self Service: performed by experienced service engineers. Onsite Service: performed by specialists. Onsite Service: available with additional costs. Remote Service: part of CQC service offering. Self Service: all completely automated checks in all SAP systems.

Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? (Choose three.). Data Destruction. Data Archiving. Data Retention. Data Logging. Alert Notification.

What information can be provided by an Audit Class? (Choose three.). User Authorizations. Dialog Logon. RFC/CPIC Logon. User Roles. Transaction Start.

What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? (Choose two.). To recommend Legal Change Notes related to SAP innovations. To recommend Performance Notes to improve system response. To recommend SAP Hot News Notes (priority 1 and 2). To recommend SAP Security Notes for evaluation.

Which of the following parameters must be configured to capture log data in the Security Audit Log?. rec/client. dir_logging. rsau/enable. rdisp/TRACE.

Which transaction code allows you to configure the SAP Security Audit Log?. SM19. SM20. SM18. SUIM.

Which of the following actions are required to ensure complete logging of table data changes? (Choose three.). Log data changes must be enabled at the table level in transaction SE13. Parameter RECCLIENT must be maintained in transaction STMS. Client change options must be set to Automatic Recording of Changes. The security audit log must be activated using transaction SM19. Instance profile parameter rec/client must be maintained for client.

Which analyses does SAP Solution Manager E2E Diagnostics provide? There are 2 correct answers to this question. Configuration Analysis. Change Analysis. Workload Analysis. Security Analysis.

Where can you search for obsolete applications?. SUIM. SU25. SU24. SE93.

Which of the following are capabilities of SAP Process Control? There are 3 correct answers to this question. Collaborative policy management and approval. Continuous control monitoring of master and transaction data. Central repository for internal control compliance documentation. Framework for complete information lifecycle management. Management of corporate data ownership and accountability0.

When deploying SAP Fiori apps on the SAP Cloud, where are the SAP Fiori UI components installed?. SAP Cloud Connector. SAP Cloud Platform. SAP Gateway. SAP S/4 HANA back-end.

Which component handles OData service provisioning for SAP Fiori Launchpad?. Central UI (SAP_UI). Product UI (UIBAS001). SAP Gateway Foundation (SAP_GWFND). SAP Basis (SAP_BASIS).

Which of the following are tools that support access certification and review in Access Control? There are 3 correct answers to this question. User Access Review. Role Reaffirm. Role Certification. Audit Management. User Information System.

Which filters are available in SAP Security Audit? There are 3 correct answers to this question. Transaction start. Audit class. Events. RFC/CPIC logon. Client.

PFCG provides a user with multiple views to maintain a role. Which of the following features is allowed via the Basic Maintenance View? There are 2 correct answers to this question. Access all of the functions for role maintenance. Assign the role to objects in the organizational plan. Assign the roles only to SAP users. Change workflow task assignments.

During which of the following implementation phases should training for your user and role administration teams take place?. Implementation. Blueprint. Final Preparation. Project Preparation.

In SAP NetWeaver AS ABAP, you can control the choice of user passwords using which of the following tables?. CDHDR. CDPOS. USR40. USR04.

Report abuse