Which of the following change logs do you enable?

Your compliance team requires that all changes to access rules be tracked. Which of the following change logs do you enable? Note: There are 3 correct answers to this question. A. Role B. Access Rule C. Function D. Rule Set E. Critical RoleView AnswerAnswer: B,C,D If your compliance team requires...

July 24, 2023 No Comments READ MORE +

Which of the following are key themes?

SAP Governance, Risk and Compliance solutions are organized along 4 key themes. Which of the following are key themes? Note: There are 3 correct answers to this question.A . Business Integrity Screening B. Access Governance C. Cybersecurity and Data Protection D. Enterprise Risk and Compliance E. Audit ManagementView AnswerAnswer: B,C,D...

July 23, 2023 No Comments READ MORE +

Which of the following steps are a part of this process?

SAP developed a three phase, six step SoD Risk Management Process for use when implementing Access Risk Analysis. Which of the following steps are a part of this process? Note: There are 3 correct answers to this question. A. Risk Recognition B. Mitigation C. Analysis D. Role Building and Analysis...

July 23, 2023 No Comments READ MORE +

How can you make sure that a risk analysis is performed when you use access request management? Note: There are 2 correct answers to this question

How can you make sure that a risk analysis is performed when you use access request management? Note: There are 2 correct answers to this questionA . Set Enable Offline Risk Analysis parameter to Yes B. Configure the MSMP workflow stage to require a risk analysis C. Configure the MSMP...

July 23, 2023 No Comments READ MORE +

Which of the following are required to enable Centralized Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.

Which of the following are required to enable Centralized Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.A . Set the Application Type parameter for Emergency Access Management to value ID in the target system UGRC plug-in B. Set the Application Type parameter for Emergency Access...

July 22, 2023 No Comments READ MORE +

Which methods can you use to send a firefight session log to a controller? Note: There are 2 correct answers to this question.

Which methods can you use to send a firefight session log to a controller? Note: There are 2 correct answers to this question. A. Email B. Log Display C. Support message D. WorkflowView AnswerAnswer: A,D When you need to send a firefight session log to a controller in SAP Access...

July 22, 2023 No Comments READ MORE +

Which of the following logs can be collected for an Emergency Access Management session? Note: There are 3 correct answers to this question.

Which of the following logs can be collected for an Emergency Access Management session? Note: There are 3 correct answers to this question. A. Audit log B. System log C. Change log D. GRC Audit log E. Application logView AnswerAnswer: A,B,D In the context of an Emergency Access Management (EAM)...

July 21, 2023 No Comments READ MORE +

Which of the following are possible ways to assign emergency access in Emergency Access Management? Note: There are 2 correct answers to this question.

Which of the following are possible ways to assign emergency access in Emergency Access Management? Note: There are 2 correct answers to this question.A . Assign a Firefighter ID to a firefighter owner in SAP Access Control B. Assign a Firefighter ID to a firefighter in SAP Access Control C....

July 21, 2023 No Comments READ MORE +

How can you ensure that a coordinator has the opportunity to review UAR request assignments?

How can you ensure that a coordinator has the opportunity to review UAR request assignments?A . Set the Admin review required before sending tasks to reviewers parameter for UAR to YES B. Schedule the Generate new request for UAR rejected request job C. Maintain the GRAC_COORDINATOR agent at the approval...

July 21, 2023 No Comments READ MORE +

Which of the following conditions can you use to configure an escape route in MSMP Workflow? Note: There are 2 correct answers to this question.

Which of the following conditions can you use to configure an escape route in MSMP Workflow? Note: There are 2 correct answers to this question. A. No Role Owner B. SOD Violation C. Approver Not Found D. Auto Provisioning FailureView AnswerAnswer: A,C In MSMP (Multi-Stage Multi-Path) Workflow in SAP Access...

July 20, 2023 No Comments READ MORE +