Which of the following are prerequisites for implementing Emergency Access Management? Note: There are 2 correct answers to this question.A . Users and roles that are used for firefighting activities have been created for the SAP Access Control V D systemB . The repository object sync must be completed.C . Implementation of a user...
Continue readingWhich report view can you use to apply a control and remove access?
You are performing an on demand risk analysis at the user level . Which report view can you use to apply a control and remove access?A . Remediation viewB . Technical viewC . Business viewD . Detail view View Answer Answer: A...
Continue readingWhat can you use a custom end-user personalization configuration for? Note: There are 3 correct answers to this question.
What can you use a custom end-user personalization configuration for? Note: There are 3 correct answers to this question.A . To assign it to the standard access requestB . To assign it to an access request templateC . To restrict a user’s ability to approve their own requestsD . To determine fields shown in...
Continue readingWhich of the following options can you use to configure escalation?
You want to configure your MSMP Workflow stage definition to ensure that a workflow request that has NOT been processed after a certain period of time can be escalated and approved by another approver . Which of the following options can you use to configure escalation? Note: There are 3 correct answers to this...
Continue readingWhat is the correct synchronization job schedule for completing this task?
You wish to synchronize data from transaction SU24 in the SAP S/4HANA production system into SAP Access Control for use in building a rule set. What is the correct synchronization job schedule for completing this task?A . It is not possible to synchronize SU24 data from a production systemB . Repository Object Sync followed...
Continue readingWhich of the following reviewer options does User Access Review support?
Which of the following reviewer options does User Access Review support?A . Manager or Risk OwnerB . Manager or Role Owner View Answer Answer: B...
Continue readingFor which of the following objects can you create an access request? Note: There are 3 correct answers to this question.
For which of the following objects can you create an access request? Note: There are 3 correct answers to this question.A . UserB . JobC . DivisionD . DepartmentE . Organizational Unit View Answer Answer: A,B,E...
Continue readingWhich of the following capabilities does it offer?
Business Role Management provides the functionality to improve the role management process . Which of the following capabilities does it offer? Note: There are 2 correct answers to this question.A . Replacement of the PFCG role management transactionB . Management of role definition transportsC . Enforcement of consistency in naming conventionsD . Identification of...
Continue readingWhich of the following are required to enable Centralized Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.
Which of the following are required to enable Centralized Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.A . Set the Application Type parameter for Emergency Access Management to value ID in the target system UGRC plug-inB . Set the Application Type parameter for Emergency Access Management to value ID...
Continue readingWhich of the following attributes can you use?
You are creating an Initiator rule and want to build a condition using header attributes . Which of the following attributes can you use? Note: There are 2 correct answers to this question.A . PrerequisiteB . Functional AreaC . CompanyD . Subprocess View Answer Answer: B,D...
Continue reading