option
Questions
ayuda
daypo
search.php

Hooligansdv

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Hooligansdv

Description:
SAP Security

Creation Date: 2020/12/13

Category: Others

Number of questions: 256

Rating:(3)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Profile parameter: Number of incorrect logon attempts allowed with a user master record before the logon procedure is terminated. login/fails_to_session_end. login/min_password_lng. Login/fails_to_user_lock. login/failed_user_auto_unlock. login/password_expiration_time.

The security policies are created by the security team in isolation from the business team. Determine whether this statement is true or false. True. False.

What are the 2 types of roles implementation strategy?. Menu roles. Authorization roles. Item roles.

What is the transaction of the ICM monitor?. SMICM. SHDFK. SIFIDH.

Which authorization object enforces administering the spool system (Admin)? Values SP01, SP0R, SPAA, SPAB, SPAC, SPAD, SPAM, SPAR, SPTD, SPTR. S_ADMI_FCD. S_SPO_PAGE.

Which authorization object is checked when a user invokes a RFC?. RSRFCCHK. object S_RFC.

The reports of the user information system start with?. RSUSR + #. ESUSE + #.

Which authorization object is needed to execute external commands?. Sapxpg. S_RZL_ADM. S_LOG_COM.

Authorization that defines the authorization object name and the authorization name for which an administrator has authorization and the activities that are allowed ?. S_USER_GRP. S_USER_AUTH. S_USER_PRO. S_USER_AGR. S_USER_TCD.

The Audit Information System is intended for external audits only. True. False.

Which transaction allows you to view the assignments of the events to audit classes and security levels with the system log message maintenance?. SE92. SE93. SE91. SE94.

What is the default password of the user SAP*?. SAP*. PASS. 06071992.

What are the 5 steps of the authorization concept conception?. Preparation:. Analysis and Conception. Implementation. Quality assurance and Tests. Cutover. Authorization profile.

What is the transaction for client copy between systems?. SCC9. SCC8. SCC7. SCC6.

How to ensure that the indirectly called transaction with the ABAP statement CALL_TRANSACTION is subject to an authorization check?. SE97. TCDCOUPLES. SE96. SE95.

Transaction code to maintain profile parameters?. RZ11. USOBX_C. USOBT_C. USOBX.

What is the transaction for the User Information system?. SDFM. ADIM. SUIM. SUPM.

What are the 3 main components of a SAP role?. Role Menu. Authorization. User. Access Control.

What are the 3 different fields of the S_LOG_COM authorization object?. Command. Opsystem. Host. COMP.

Which transaction displays the table change log?. SCU3. SCU2. SCU1.

What are the 3 constraints of the logon ticket?. same DNS. user Id identical in all systems. user must accept session cookies. Same DHF,Id passcode contents passcode.

Which authorization object enforce actions you can take with spool requests (Admin) and enforce access to a spool request that does not belong to you?. S_SAO_ACT. S_SPO_ACT.

CUA: In which transaction is the technical definition of the RFC connection maintained?. SM59. SM58. SM57. SM56.

Only the complete user master and not individual users canbe copied?. TRUE. FALSE.

Which authorization object defines which table contents may be maintained by which employees?. S_TABU_DIS. The authorization object S_TABU_DIS controls only complete accesses, which are made using standard table maintenance. S_TAEAU_DPS.

What is the transaction for local client copy?. SCCL. SFGH. CDDF. SCEL.

509 client certificates: which table is responsible for the user mapping?. USREXTID. UDBNVVD. UFSKSDHD.

At which level is it possible to enforce the changes?. System. client. viable.

The SAP also has a CA that issues digital certificates to customers. How is the digital certificate issued by the SAP Trust Center Services called?. the SAP Passport. Digital signature.

Profile parameter: Number of incorrect logon attempts allowed with a user master record before the user master record is locked. The lock is removed at midnight. login/fails_to_session_end. login/min_password_lng. Login/fails_to_user_lock. login/failed_user_auto_unlock. login/password_expiration_time.

Which authorization object protects the standard list download?. S_GUI. S_DFG. S_GUT.

Which SAP Product is used for DIAG/RFC Proxy?. SAP Create. SAP router.

You have successfully finished an SAP S/4HANA backend, SAP Fiori front-end and Web- dispatcher configuration. In the SAP Fiori Launchpad the search for a G/L account fails, but regular app search works fine. What could be the cause of the problem?. Missing authorization on the front-end side. The search connectors are NOT activated. The SAP Web Dispatcher is down. Missing authorization on the back-end side.

Derived roles: 2 ways to perform the comparison between the roles?. Comparison from the imparting role ("Generate Derived role" button. Comparison from the derived role ("Transfer Data" button). Comparison from the derived role ("Transfer blow").

3 enterprise portal authentication mechanisms: User Id/Password (Form based iView) X. 509 digital certificate. Third party authentication (Windows). Use external authentication (snc/extid_login_diag).

Which table defines which authorization checks are to be performed with a transaction and which not?. RZ11. USOBX_C. USOBT_C. USOBX.

Which profile parameters specifies the number of seconds until an inactive user is automatically logged out?. rdisp/gui_auto_logout. rdisp/gui.

What are the 2 different worlds for SSO?. SAP GUI for Windows SNC. Web SSL. SAP RTD for Windows SFG.

4 SNC profile parameters?. Activate SNC (snc/enable). Set level of protection (snc/data_protection/max). Accept RFC and DIAG connection that are not protected with SNC (snc/accept_insecure_gui). Use external authentication (snc/extid_login_diag). Portal Content Directory (content role assignment).

Which transaction should be used when access to a table and why?. SM28. SM29. SM30. SM31.

How to display the results of the security audit log (transaction)?. SE20. SE21. SE22. SE23.

Which of the following are logs that exist in an SAP system? (More than one answer is correct). Webflowlogs. Application logs. Change documents logs. User and authorization change logs. None of the above.

What program allows you to assign an authorization group to all executable programs or to individual programs or program group?. RSCSAUTH. RDFFGSAH. REDVDDFF.

What are the 2 status texts about authorizations after a comparison?. Old. New. Previous.

The client change option does not override the system change option (t/f)?. True. False.

What is the goal of SNC in an ITS environment?. Authentication between the components. Authentication between the components. Privacy protection. Using groups at the creation dolmen level.

What is the meaning of the traffic lights Icons for The authorization maintenance?. Green. Yellow. Red. Blue.

Which is the only user in the SAP system for which no user master record is required (since it is defined in the code)?. SAP*. PASS. 06071992.

What is the measure for each source of risk?. Organizational Measures. Technical Measures. Environmental measures. Access Control. System Access Control.

4 types of security audit log filters?. User. Audit Classes. Client. Security Level. Unsecurity.

SAP systems maintain their audit logs on a daily basis. The system does not delete or overwrite audit files from previous days; it keeps them until you manually delete them. Which transaction is used in order to archive or delete the audit files?. SM15. SM16. SM17. SM18.

Which authorization object is provided to create and maintain users and assignments in a decentralized fashion with user groups?. S_USER_GRP. S_CHANGE_GRP. S_CHATLOG_GRP. S_PROFESSION_GRP.

Which authorization object control the authorization to execute a program. S_PROGRAM. C_PROGRAM. F_PROGRAM. H_PROGRAM.

What are the 3 major components of the Role maintenance tool (PFCG)?. menu. authorizations. users. profile.

Which authorization object is needed to maintain external commands?. gw/sec_info. Sapxpg. S_RZL_ADM.

What are the return codes after the authorization check with the ABAP object authoritycheck?. The user has the authorization for the object and the fields value. The user has the authorization for the object, but not for filed value. The user has no authorization. No profile is entered in the user master record. Check if an authorization object is assigned to the transaction code.

What is the SAP standard role for spool administration?. S_SPO_PAGE. SAP_BC_SPOOL_ADMIN.

What is the safeguard of Eavesdropping. Safeguard. Encryption.

What activities can be assigned to the authorization object S_PROGRAMM?. Starting a program (SUBMIT). Scheduling a program as a background job (BTCSUBMIT). Variant maintenance (VARIANT). Variant maintenance (SDFGHJT).

Can a role have several profile generated?. True. False.

What is the default password of the special user Early Watch?. SUPPORT. Maintain.

Which special user is responsible for maintaining the ABAP Dictionary and the software logistics in the client 000?. DDIC. Early Watch. SUPPORT. S_TCODE.

How do you protect access to the ITS service and template files?. Using groups at the operating system level. Using groups at the creation dolmen level.

What are the 3 main sources of risks?. Persons. Technology. Environment. Implementation & support.

Authorization Profile that defines the profile names for which an administrator has authorization and the activities that are allowed?. S_USER_GRP. S_USER_AUTH. S_USER_PRO. S_USER_AGR. S_USER_TCD.

What are the authorizations needed to create and maintain an external command?. SM69. SM70. SM71. SM72.

Which SAP standard roles gives access required to administer background jobs. SAP_BA_BATCH_ADMIN PANEL. SAP_BC_BATCH_ADMIN.

Which authorization object ensure that the decentralized admin only add authorized t-codes to roles?. S_USER_AGR. S_USER_TCD. S_USER_VAL.

What are the 2 possibilities to establish a trust when using the SAPCRYPTOLIB?. Either use a single PSE for all communication partner. Exchange public-key certificates. Using groups at the creation dolmen level.

What are the 4 types of RFC connections?. Synchronous RFC. Asynchronous RFC. Dsshsdbcvdsa RFC.

Which authorization object helps you to enforce the role naming convention in restricting the allowed roles names?. S_USER_AGR. S_USER_TCD. S_USER_VAL.

Which authorithation object determines what table someone can look at with the transactions SE16, SE16N, or SE17; SM30 or SM31; and SE12. S_TABU_DIS. S_TEDU_FID. S_TRAS_DIC.

Which are the 2 ways to control the choice of user passwords?. System profile parameters. Invalid passwords. Valid passwords.

Which profile parameters define the location of the secinfo file?. gw/sec_info. Sapxpg. S_RZL_ADM.

What are the 3 authorization objects required to create and maintain user master records?. S_USER_GRP. S_USER_PRO. S_USER_AUT. S_CHANGE_PRO.

What are the 3 trust manager profile parameters?. sec/libsapsecu, specify the location of the SAPCRYPTOLIB. ssf/ssfapi_lib, specify the location of the SAPCRYPTOLIB. ssf/name must be set to SAPSECULIB. Using groups at the creation dolmen level.

Which transaction allows you to approve a transport request?. STMS. SYAS. AJSA.

What are the 2 main options to create and save audit filters?. Create and save filters permanently in the database. Change filters dynamically. Create and save filter temporary in the database.

Which field has the authorization object S_TABU_CLI?. CLIIDMAINT. MAINTAIN.

Which are the 2 ways in which we can determine the required authorization, if we can not find documentation?. authorization error analysis. SU53. ST01. SF34.

What are the 3 standards approval steps and their authorization object, value and default value?. By request owner. By user department. By system administrator. By user administrator.

What is the SAP standard composite menu and authorization Role which contains every role in the AIS?. SAP_AUDITOR. SAP_CA_AUDITOR. SAP_CF_AUTITOR. SAP_SEC_AUDITOR.

What are the 2 required steps necessary for operating the profile generator?. Profile parameter auth/no_check_in_some_cases has the value Y. The default tables USOBX_C and USOBT_C are filled. The default tables UQWFX_C and UKDBT_C are filled.

When you connect the Diagnostics Agent to your Solution Manager system, which of the following Outside Discovery jobs are triggered? Note: There are 3 correct answers to this question. Log File Discovery. IIS Discovery. Database Discovery. Network Discovery. Host Discovery.

What are the different types of Organization plans objects?. Organizational Unit. Position. Job. Task. Work.

What are the 2 ways to assign roles to users for a limited period of time with a user comparison?. As a background job: report pfcg_time_dependency. With the transaction PFUD (User master record reconciliation). With the transaction PEAD (User master record reconciliation).

Which protocol is used between SAP Servers?. RFC, Remote function call. The ITS, Internet Transaction Server. The SAP Web-GUI.

PFCG, which are the activities to create a role?. Define role name. Determine activities. Design user menus. Maintain authorization data. Maintain master data.

How can you deactivate the special properties of SAP*?. set the system profile parameter. login/no_automatic_user_sapstar to a value greater than zero. set the new profile parameter.

What is the transaction to maintain and activate the security audit log?. SM19. SM20. SM22. SM21. SM23.

3 types of security policy. General Security policy. IT Security policy. Configuration documentation. Change Policy.

In a dual host installation, where do you use firewalls?. Firewall in front of the Web server to deny access using undesired protocols. Firewall between the Web server and the AGate to restrict access even more. Using groups at the operating system level.

To which object type are person assigned to in the organizational plan?. Position. Post. Cost.

Derived roles: Can the inherited roles be changed?. True. False.

Which 2 tables control the behavior of the Profile Generator after the transaction has been selected?. RZ11. USOBX_C. USOBT_C. USOBX.

Which ABAP object used to check the authorization object assigned to the transaction?. TSTCA. Authoritycheck. S_USER_GRP. S_USER_AUTH. S_USER_PRO.

Which protocol is used between the SAP GUI and the Server?. DEDG Protocol. DIAG Protocol.

Transaction to define child and central system in the CUA. SALE. PURCHASE.

Which SAP product transforms the traditional SAP applications to Web-based transactions, so that they are accessible using Internet technology?. RFC, Remote function call. The ITS, Internet Transaction Server. The SAP Web-GUI.

What are the 4 check indicators?. CM = Check/Maintain. C = Check. N = No Check. U = Unmaintained. C= Uuregistered.

Are transactions called indirectly with the ABAP statement CALL_TRANSACTION checked?. True. False.

Which safeguards answers to the threat of Tampering (denial, message alteration)?. the SAP Passport. Digital signature.

What is the transaction to display an overview of the modifications and enhancement found in the system that you can search by Last transport request or Request/Task?. SE95. SE96. SE97. SE99.

In which transaction can you release the change request to transport?. SE09. SE10. SE08.

Which SAP Standard role allow you to set-up the AIS?. SAP_AUDITOR_ADMIN. SAP_EDITOR_ADMIN.

What are the 3 user authentication mechanisms?. User Id and passwords. X.509 client certificates. Pluggable Authentication Services PAS. External mechanisms. Y.508 client certification.

Which transaction lists each RFC destination and the user involved?. RSRFCCHK. object S_RFC.

Which authorization objects protect the file access?. C_DATASET. S_DATASET. P_DATASET.

Which transaction allows you to see if the TMS Quality Assurance approval procedure has been set up?. STMS. SAMS. SRMS.

Which of the authorization objects protect transaction code execution?. S_TCODE. P_TCODE. Q_TCODE. X_TCODE.

Which transactions allow you to view the transport system log?. SE10. SE09. SE11.

What is the important property of catalog roles in SAP HANA?. Catalog roles are transportable. Privilege revocation is transitive. SYS_REPO needs to be granted privileges on data. Version management in place.

Profile parameter: If the parameter is set to 1 (default), user locks caused by incorrect logons during previous days are not taken into consideration. If the value is set to 0, the lock is not removed. login/fails_to_session_end. login/min_password_lng. Login/fails_to_user_lock. login/failed_user_auto_unlock. login/password_expiration_time.

What are the 2 profile parameters used to configure sso with sap logon tickets?. Login/create_sso2_ticket. Login/accept_sso2_ticket. Login/accept_sso3_ticket.

What are the 2 main components of the AIS reporting tree?. System auditing functions. Business auditing functions. Reporting auditing functions.

How entries in the Table USR40 (Invalid passwords) can be made generically?. ? denotes a single character. * denotes a character string. ? denotes double character.

4 activities of the ICF with transaction SICF (Maintain services). SE80. SE79. SE78. SE77.

What 4 information contains the sap logon ticket?. User Id,. User passcode. Validity period,. Issuing System ID. Issuing system's digital signature.

What are the main components of the authorization concept?. Authorization object class. Authorization object. Authorization field. Authorization. Authorization profile. Consultant.

What contains the Personal Security Environment (PSE). Public key. Private key. Server`s public-key certificate. Certificates of trusted CAs (certificate list).

How should be the naming convention for new developments?. Authorization and authorization profiles. Authorization classes, object, fields. Analysis and Conception. Quality assurance and Tests.

3 kinds of alternatives technologies for the load balancing. Hardware load balancer. Software load balancer. Web switchd.

What is the default Communication RFC user set up for the transport management?. TMSADM. TRSDASM. TGRDHSJ.

Profile parameter: If this parameter is set to value 1, the system blocks multiple SAP dialog logons (in the same client and with the same username). login/fails_to_session_end. login/disable_multi_gui_login. login/min_password_lng. Login/fails_to_user_lock.

The activity "Send User Name and Password" is the first step during the password authentication procedure in SAP NetWeaver ABAP based systems; whereas the activity "Authenticate" is the last. What is the correct sequence of the activities between these two steps?. Check Code Conversion Calculate hash function (pwd) in Application Server Compare hash stored in USR02. Calculate hash function (pwd) in Application Server Check Code Conversion Compare hash stored in USR02. Calculate hash function (pwd) in Application Server Compare hash stored in USR02 Check Code Conversion. Compare hash stored in USR02. Check Code Conversion Calculate hash function (pwd) in Application Server.

Which transaction allows you to maintain the profile parameters?. RZ11. RZ12. RZ13.

Is it possible to add composite roles to composite roles?. True. False.

For what is the Audit Information System (AIS) a checking tool?. External auditing. Internal auditing. System checks. Data protection. Ultra data prodection.

ITS, scalability and load balancing, what are the 6 possible landscape?. Single Wgates connects to multiple Agates. Separate WGates connects to single Agate. Multiple WGates connects to multiple Agates. ITS connects to single Application server. Using groups at the creation dolmen level. Multiple ITS instances connect to single systems. ITS connects to message server (Load balancing).

Which authorization object restricts a user's access rights to specific parts of a table?. S_TABU_LIN. TDDAT. S_TABU_CLI. Early Watch.

What are the 4 status texts about authorizations maintenance?. Standard. Maintained. Changed. Manual. Double.

What are the 2 checks executed after a transaction start to ensure that the user has the appropriate authorization?. Check if the user is authorized to start the Transaction. Check if an authorization object is assigned to the transaction cod. Check if the user is unauthorized to start the Transaction. Check if an un-authorization object is assigned to the transaction code.

Which profile parameter can you use in order to specify the use of S_RFC?. Name of RFC to be protected. Activity. auth/rfc_authority_check.

What is the table for the SNC System access control list. SNCSYSACL. SNFDJDEVM. SDFJDLSMD.

What are the 3 fields of the authorization object S_RFC?. Type of RFC object to be protected. Name of RFC to be protected. Activity. Deactivity.

Profile parameter: The value 0 means that the user is not forced to change the password. A value > 0 specifies the number of days after which the user must change the logon password. login/fails_to_session_end. login/min_password_lng. Login/fails_to_user_lock. login/failed_user_auto_unlock. login/password_expiration_time.

6 types of information that can be recorded with the security audit log?. Dialog log-on attempts. RFC log-on attemps. Transaction starts. Modification.

What are the 3 steps to install the PAS?. Install SAP package ntauth.sar. Set the Service file parameters. Maintain user mapping. Maintain table USREXTID Report (RSUSREXTID). user must accept session cookies.

Composite role: What are the 2 possibilities if the composite role has been modified and you click on the refresh button?. Re import. Merge. Reduction. Extension.

What is the transaction to maintain the SNC PSE?. Use the trust manager S_Trust. Use the trust manager A_Trust. Use the trust manager D_Trust.

What is the audit log's main objective?. Security-related changes. Higher level of transparency. Enables the reconstruction of a series of events. Slower level of transparency.

SSL encryption with WAS. 4 info to specify with the help of profile parameters?. Specify Plug-in. Specify Server Port. Specify whether to use client certificate. Software load balancer. Specify location of sap cryptolab.

Which special user is delivered in the client 066?. DDIC. Early Watch. SUPPORT. S_TCODE.

Which authorizations object do you use to grant access to all ABAP Workbench components. S_DEVELOP. C_DEVELOP. F_DEVELOP.

Which transaction will be used to choose the granularity of log category to Multi Step Multi Process (MSMP) ID while debugging issues with the MSMP workflow?. GRFNMW_ADMIN. GRFNMW_CONFIGURE_WD. GRFNMW_DEBUG_MSG. GRFNMW_DEBUG.

What is the field of the authorization object S_TABU_CLI. Filament. CLIIDMAINT.

What are the authorization object and their fields that allow you to work with transport?. CUST. DTRA. TASK. DARK.

Authorization that defines the roles names for which an administrator is authorized and the activities that are allowed?. S_USER_GRP. S_USER_AUTH. S_USER_PRO. S_USER_AGR. S_USER_TCD.

What are the transactions code for creating, editing and display the organizational plan?. Create. Change. Display. Uncreate.

What is the principle of Treble control?. Sharing the administrative tasks (user admin and. authorization admin, role maintenance, profile generation). amongst three administrators is called the principle of treble control. authorization admin, role maintenance, profile don't generation).

Which kind of attack makes the server unavailable? There are several ways to do this, such as snap the network cable, physically destroy the server, or unplug it from the network. A denial of data. A denial of service.

Profile parameter: minimum length of the logon password. login/fails_to_session_end. login/min_password_lng. Login/fails_to_user_lock. login/failed_user_auto_unlock. login/password_expiration_time.

In which table is the assignment between the groups and the ABAP dictionary objects (tables)?. TDDAT. S_TABU_CLI. Early Watch. SUPPORT.

What is the transaction to access the CCMS alert monitor. RZ20. RZ21. RZ22. RZ23.

Which authorization object gives access to many administration functions?. S_AGFI_FCD. S_AFGI_FCD. S_ADMI_FCD.

What are the 2 options and the properties of a stateful user session?. Session ID (Either in web browser cookie or into the user´s URL) -> SSL doesn´t work. IP Address of client -> SSL Ok (but an issue with proxy). IP Address of client ->SAL Ok (but an issue with proxy).

Which authorization object grants authorization to maintain crossclient tables with the standard table maintenance transaction?. TDDAT. S_TABU_CLI. Early Watch. SUPPORT.

Mandatory fields needed to create user masterdata. On the Address tab page: Last name field. On the logon data tab page: Initial password. To administer user master records centrally. To create authorization profiles centrally.

Which user group should be assigned to the users SAP*, DDIC, EARLYWATCH?. user group Support. user group SUPER.

What are the transactions to create and monitor background jobs?. SM36. SM37. SM38.

Profile parameter: list containing the users who may log onto the system more than once is stored. login/fails_to_session_end. login/multi_login_users. login/min_password_lng. Login/fails_to_user_lock.

Which authorization object define which printers you can print to?. S_SPO_DEV. S_SVR_DEV.

How is the system called to set up a trusted relationship and allow user logging based on this trusted relationship for transport?. TGD Trusted Services. TMS Trusted Services. TJF Trusted Services.

What are the fields of the authorization object S_DEVELOP. DEVCLASS. OBJTYPE (PROG). OBJNAME. P_GROUP. ACTV. C_Group.

Which transaction show which authorizations are currently in the user buffer?. SU56. SU45. SU34. SU76.

The following tools are available for conducting thorough system security audits. Role maintenance tool. System audit log. CCMS security alert. System trace tools. Users and Authorizations information systems. All of the above.

Does the user assigned to a position then inherits all authorization profiles of these roles?. YES. NO.

Which of the following are benefits of creating a custom t-code to link SE16 to a specific table?. You no longer need to grant access to transaction code SE16. With your custom transaction code, you can look at any table. With your custom transaction code, you can look only at the table specified in the transaction code. Custom transaction codes can be easily created, without requiring any programming.

What is the transaction to view the change document for an object. SCDO. SFED. SCGH. SCVF.

Which kind of servers translates the logical name into the physical name, the domain name into the IP address?. DNS. DES. DJF.

Derived roles: is the user assignment inherited?. True. False.

7 activities of the ICM monitor?. Start and Stop the ICM. Set trace level, view logs. View profile parameters settings View statistics. View memory pipe informationView active services. Monitor service cache. Start Memory in icm.

What are the 5 steps of the ASAP Methodology?. Project preparation. Business blueprint. Implementation. Final preparation. Go live and support. Analysis and Conception.

How to maintain the configuration of the logon tickets?. SSO1. SSO2. STRUSTSSO3. STRUSTSSO2.

What are the 4 supported check indicators for transactions?. No check. Unmaintained. Check. Check/Maintain.

In which 4 cases Secure Store and Forward (SSF) provides security for SAP data and documents?. Data leaves the SAP system. Data is stored on insecure media. Data is transmitted over insecure networks. Data security is associated with persons and individuals. Data book is associated with persons.

Which table maps the Authorization Group to a list of tables?. TDDAT. TPPDE. RTYRA.

What are the 2 fields of the authorization object S_TABU_DIS. DICBERCLS. ACTVT. Odet fee.

What are the 4 activities required for an upgrade of The Profile Generator?. Migrate the report tree. Check the Profile Generation activation. Upgrade the roles and default tables (su25). Conversion of manually created profiles to roles if necessary (su25).

Which authorization object checks the objects of an area menu, since a transaction code is assigned to each executables menu entry?. DDIC. Early Watch. SUPPORT. S_TCODE.

Authorization object that defines the user groups for which an administrator has authorization and the activities that are allowed?. S_USER_GRP. S_USER_AUTH. S_USER_PRO. S_USER_AGR. S_USER_TCD.

After a transport of the user master record. Should a comparison occur?. YES. NO.

Which command displays all connections and listening ports on your computer?. netstat -a. netstat -b. netstat -c.

What is Central User Administration used for?. To administer password for SAP users centrally. To maintain printer landscapes centrally. To administer user master records centrally. To create authorization profiles centrally.

Which transactions copies the SAP default table USOBX and USOBT to the custom tables USOBX_C and USOBX_T?. SU25. RZ11. USOBX_C. USOBT_C. USOBX.

What are the 4 steps required to setup the AIS. Copy the SAP role. Update the roles. Create a user for the auditor. Assign the roles. User profile roles.

Which authorization objects can you examine to determine if security is administered centrally or regionally?. S_USER_GRP. S_TCD_GRP. S_USER_AGR. S_USER_ADD.

Which authorization object and its field enforce the administration function in the change and transport system?. TABL. INIT. IMPA. IMPS. TADD. TESSD.

ITS: What are the 4 main functions of the A gate?. Communication to and from the SAP system. Communicates using the SAP protocols RFC and DIAG. Data security is associated with persons and individuals. Generating the HTML pages from SAP screens. Managing user logon data and session information.

Which transaction displays the history of the system change options?. SE03. SE04. SE05. SE06.

How is a system (or a combination of systems) called that protects a networked system from unauthorized or unwelcome access?. A firewall. B firewall. F firewall.

ABAP Workbench components that are protected with S_DEVELOP. ABAP development tools. ABAP Dictionary and Data Modeler. Screen Painter and Menu Painter. ABAP WORKBENCH COMPONENTS.

Which authorization component can be transported?. User master records. Roles. Authorization profiles. Check indicators. components.

What are the 2 main corposants of the ITS. Web gate. Application gate. Transfer gate.

Testing and analyzing: SNC information is provided in trace files. What are the 3 most common errors?. Library could not be loaded. No credentials. No entry in ACL. No contents format.

Which table specify the users that can log on to the system using SNC?. USRACL. URDSAL. URSLAA.

Which table specifies that WebRFC users can log on using the AGate`s SNC-protected connection?. USRACLEXT. USRACJFFXL. UYTGFESDK.

Which of the following are security advantages to a three-tier landscape?. Ensure changes occur only on development system. Ensure changes occur only on your production system. Developers do not have access to production data. You control when changes are moved into production. You can test changes in a QA system.

What are the four main sections of the audit analysisreport?. Introductory information. Audit data. Statistical analysis. Contents. Detailed data.

5 Options available when manually inserting a new authorization? PFCG > Authorization tab > Edit > Insert authorization. Selection criteria. Manual input. Full authorization. From profile. From template. From csv file.

The following logon parameters can be used to ensure your system is adequately secured. logon/fails_to_user_lock. logon/min_password_specials. logon/min_password_diff. logon/named_super_user.

Which profile parameter set the time for automatic SAPGUI logout?. rdisp/gui_auto_Signin. rdisp/gui_auto_logout.

By default, authorization profiles are transported with role.What should be set up in order to avoid it?. PROFILE_TRANSPORT:=NO. Table PRGN_CUST. PROFILE_TRANSPORT:=YES.

What is the structure of SAP Router file entry?. D: Deny. P: Permit. S: Permit. T:Permit.

What is the transaction of the Internet Communication Framework (ICF)?. SICF. SERT. SDFG.

Which authorization object limit the number of pages a user can print to a specific printer?. S_ADMI_FCD. S_SPO_PAGE.

Which authorization object can be used to ensure the security administrator only add value for a specific company code?. S_USER_AGR. S_USER_TCD. S_USER_VAL.

How is it called when programs can be written that modify the IP address of the source of the TCP/IP packet, to fool the network into thinking that the packet is coming from within the network. Buffer. Overflow. Spoofing.

What is the default password of the user master record SAP* after the installation of the client 000?. SAP*. PASS. 06071992.

What 3 security goals answer SSF?. Integrity. Privacy. Authentication. Unprivacy.

What is the interface of web based information for enduser. RFC, Remote function call. The ITS, Internet Transaction Server. The SAP Web-GUI.

What is the profile parameter to define the maximum of filters that can be used?. Rsau/creation_slot. rsau/selection_slot.

Which authorization object enforces that one person can create the role, but another person must generate the role?. S_USER_AUT. S_USER_PRO.

What is the standard password of the user Early Watch?. DDIC. Early Watch. SUPPORT. S_TCODE.

What is the profile of the special user Eearlywatch?. S_WOOLS_EX_A. S_TOOLS_EX_A.

What are the 4 different types of roles?. Customizing role. Derived role. Composite role. Normal role. Straight role.

SNC: Where are the private keys stored?. In the SDC PSE. In the SNC PSE. In the SEC PSE.

What are the 3 types of encryption?. Symmetric. Asymmetric. Sdfmmetric.

What are the 5 majors authorisation objects used to protect which transaction codes a user can access and for which product are they meant to be?. S_TCODE. Q_TCODE. I_TCODE. E_TCODE.

What is the table for the Extended user Access control. USRACLEXT. LDSSDSJMX.

ITS: What are the 2 main functions of the Wgate (Webserver)?. Connects the ITS to the Webserver. Use the HTTP protocol. Use the HTML language.

What is the transaction for the system trace tool?. ST01. ST02. ST03. ST04.

How can you protect the target system with an import lock in order to avoid transporting the user assignments to roles?. PRGN_CUST. USER_REL_IMPORT:=NO. USER_REL_IMPORT:=YES.

Authorization that defines which field values an administrator may enter in roles for which authorization object and which fields?. S_USER_GRP. S_USER_AUTH. S_USER_PRO. S_USER_VAL. S_USER_SYS.

Which User information system report monitors the passwords of all predefined users?. RSUSR003. RSUSR004. RSUSR005.

Of which fields consist the authorization S_TABU_DIS?. DICBERCLS: Authorization group for ABAP Dictionary objects (only tables/views assigned to authorization group "V*" (DICBERCLS=V*) may be maintained.). ACTVT: Activity (02, 03). ACTVT: Activity (05, 07). ACTVT: Activity (09, 01).

Which transactions maintain the custom tables USOBX_C and USOBX_T?. RZ11. USOBX_C. USOBT_C. USOBX. SU24.

Which table defines for each transaction and for each authorization object which default values an authorization created from the authorization object should have in the Profile Generator?. USOBT. RZ11. USOBX_C. USOBT_C. USOBX.

Which are the 3 different roles in decentralized User Administration?. User administrator. Authorization data administrator. Authorization profile administrator. Authorization uses administrator.

In which table are the table change logged?. DBTABPRT. DFTAHG. DGJKAHST.

What is the difference between System Access Control and Role based Access control?. Organizational Measures. Technical Measures. Environmental measures. Access Control. System Access Control.

Which authorization enforces that one person can create the menu portion of the role, but someone else updates the authorizations?. S_USER_AUT. S_USER_PRO.

Authorization that defines the transactions that an administrator may include in a role?. S_USER_GRP. S_USER_AUTH. S_USER_PRO. S_USER_AGR. S_USER_TCD. S_USER_TND.

2 roles that the web application server (WAS) can play?. SAP Web AS as client component. SAP Web AS as server component. SAP Web AS as server component.

Which fields has the authorization object S_TABU_LIN?. Activity. Organizational criterion. Attribute for organizational criterion. Pripare.

What is a characteristic of the pre-delivered 'system-local' package within the SAP HANA repository?. It can be assigned to a delivery unit. It is used for development testing. It contains the SAP HANA Interactive Education (SHINE). It is used as a container for the SAP HANA live content.

What are the pro and cons of composite roles?. + One work center. + One composite role. + One assignment. + One central menu.

SAP offers many types of systems and applications. Each type of SAP system (mySAP CRM, SAP BW, SAP R/3, mySAP SRM, SAP APO) is so varied that the systems do not share security tools or security services. Determine whether this statement is true or false. True. False.

What are the 2 special users defined in client 000?. SAP*. DIDIC. *SAP.

Which profile contains authorization for all new checks in existing transaction?. SAP_NEW. SAP_ OLD. SAP_ ADVANCED. SAP_ PREVIOUS.

Regardless of the release status, after an upgrade you will have 2 possible statuses? What are they?. Source release did not use PFCG (it might have to be activated). Source release used PFCG (This means that tables USOBT_C and US OBX_C have to be updated as well as the existing roles). Conversion of manually created profiles to roles if necessary (su25).

Which are the two different maintenance views of the profile generator PFCG?. Basic maintenance. Complete view. Design user menus. Maintain authorization data.

With which transaction can you assess the security audit log?. SM20 or SM20n. SM21 or SM21n. SM22 or SM22n.

What 3 security goals answer the digital signature?. Integrity. Authentication. Non-repudiation. repudiation.

What are the 3 main windows of the Organization plan transaction?. Organizational Structure window. Staff Assignments window. Task Profile window. Work task window.

5 Scenarios of load-balancing with the WAS?. Message Server-based redirection. Dispatcher or Load-Balancer. SAP Web dispatcher. IP Address of client -> SSL Ok (but an issue with proxy). Alternative technologies. Combining technologies (Web switch and web dispatcher).

Which table Specifies which systems are allowed to connect to the SAP system using SNC?. SNCSYSACL. SNDFKEERL. SLOKUHTDL.

Which program start the external command after it has passed the gateway?. gw/sec_info. Sapxpg. S_RZL_ADM.

What is an ITS service?. Multiple ITS instances connect to single systems. An ITS service is the set of components needed to call an SAP transaction via the ITS.

Which authorization object check program (reports) use?. S_TABU_CLI. Early Watch. S_PROGRAM.

How to combine the 2 worlds (SAP GUI and web)?. How to combine the 2 worlds (SAP GUI and web)?. Logon tickets is passed to the SAP shortcuts using ITS service wngui. Only from web to traditional (traditional to web not supported). Maintain user mapping. Maintain table USREXTID Report (RSUSREXTID).

What is the table for maintaining system clients?. T000. T001. T002. T0000.

What is the safeguard of Eavesdropping?. Safeguard. Encryption.

In which transaction can you release the change request to transport?. SE10. SE08. SE09.

ITS configuration: What is the difference between a single host configuration and a dual host configuration?. Single Host. Dual Host. Multiple Host.

Which profile parameter specifies the exactness of the logon timestamp?. logon/update_logon_timestamp. logon/update.

Report abuse