Which authorizations should you restrict when you create a developer role in an AS ABAP production system? Note: There are 2 correct answers to this question.

Which authorizations should you restrict when you create a developer role in an AS ABAP production system? Note: There are 2 correct answers to this question.A . The ability to execute class methods through authorization object S_PROGRAMB . The ability to execute queries through authorization object S_OUERYC . The ability...

May 5, 2022 No Comments READ MORE +

Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?

You have Reason Codes already defined . Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?A . Maintain a Firefighter ID for Controllers and Firefighters Maintain an Owner for a Firefighter ID Maintain Access Control OwnerB . Maintain an Owner for a Firefighter...

May 3, 2022 No Comments READ MORE +

What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.

What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.A . Configuration check of the SAP systems and the SAP middleware components against defined configurationsB . Results with recommendations on how to resolve identified vulnerabilities without prioritizationC . Analysis of security vulnerabilities within...

May 1, 2022 No Comments READ MORE +

Which of the following events will create security alerts in the CCMS Alert Monitor of SAP Solution Manager? Note: There are 2 correct answers to this question.

Which of the following events will create security alerts in the CCMS Alert Monitor of SAP Solution Manager? Note: There are 2 correct answers to this question.A . Manual table changesB . Changes to the instance profileC . Call of RFC functionsD . Start of reportsView AnswerAnswer: C,D

May 1, 2022 No Comments READ MORE +

Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager?

Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager?A . S_RFCACLB . S_RFCC . S_SERVICED . S_ ICMView AnswerAnswer: A

April 30, 2022 No Comments READ MORE +

What does the Return Code 12 signify?

A security consultant has activated a trace via ST01 and is analyzing the authorization error with Return Code 12 . What does the Return Code 12 signify?A . "Objects not contained in User Buffer"B . "No authorizations and does NOT have authorization object in their buffer"C . "No authorizations but...

April 30, 2022 No Comments READ MORE +

Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.

Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.A . GroupB . RoleC . UserD . CatalogView AnswerAnswer: A,D

April 29, 2022 No Comments READ MORE +

What needs to be done?

A system user created a User1 and a schema on the HANA database with some data. User2 is developing modelling views and requires access to objects in User1's schema. What needs to be done?A . User1 should grant _SYS_REPO with SELECT WITH GRANT privilegeB . User2 needs to be granted...

April 29, 2022 No Comments READ MORE +

What program would you run to resolve this situation?

You have delimited a single role which is part of a composite role, and a user comparison for the composite role has been performed. You notice that the comparison did NOT remove the profile assignments for that single role . What program would you run to resolve this situation?A ....

April 29, 2022 No Comments READ MORE +

Which actions are performed by the SAP Web Dispatcher in this scenario?

You are using the SAP Web Dispatcher for load-balancing purposes . Which actions are performed by the SAP Web Dispatcher in this scenario? Note: There are 2 correct answers to this question.A . Authenticates the user's credentialsB . Uses SAP logon groups to determine which requests are directed to which...

April 29, 2022 No Comments READ MORE +