What transactions do you have to use to map a back-end system to one of those roles?

You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transactions do you have to use to map a back-end system to one of...

February 14, 2023 No Comments READ MORE +

What need to be done for this purpose?

You want to check the custom ABAP codes in your system for security vulnerabilities and you want to use the SAP Code Vulnerability Analyzer to carry out these extended security checks. What need to be done for this purpose? Note: There are 2 correct answers to this questionA . Run...

February 13, 2023 No Comments READ MORE +

Which of the 7 core principles of the General Data Privacy Regulation (GDPR) requires thorough documentation of all policies and controls that govern the collection and processing of data?

Which of the 7 core principles of the General Data Privacy Regulation (GDPR) requires thorough documentation of all policies and controls that govern the collection and processing of data?A . Accuracy B. Lawfulness, Fairness and Transparency C. Accountability D. Integrity and ConfidentialityView AnswerAnswer: C

February 13, 2023 No Comments READ MORE +

Which actions are performed by the SAP Web Dispatcher in this scenario?

You are using the SAP Web Dispatcher for load-balancing purposes. Which actions are performed by the SAP Web Dispatcher in this scenario? Note: There are 2 correct answers to this question.A . Authenticates the user's credentials B. Uses SAP logon groups to determine which requests are directed to which server...

February 12, 2023 No Comments READ MORE +

How do you prevent the access of users to the transaction A from within the program?

In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction. How do you prevent the access of users to the transaction A from within the program? A. Make sure you do...

February 12, 2023 No Comments READ MORE +

What transaction do you have to use to map a back-end system to one of those roles?

You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transaction do you have to use to map a back-end system to one of...

February 11, 2023 No Comments READ MORE +

Which users should exist in client 000? Note: There are 2 correct answers to this question

Which users should exist in client 000? Note: There are 2 correct answers to this questionA . SAP* B. EARLYWATCH C. SAPCPIC D. TMSADMView AnswerAnswer: A,B

February 11, 2023 No Comments READ MORE +

Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 correct answers to this question

Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 correct answers to this questionA . NNTP B. LDAP C. SNA D. RFCView AnswerAnswer: B,D

February 11, 2023 No Comments READ MORE +

User1 grants role 1 to user2. Who can revoke role 1 role from user2?

User1 grants role 1 to user2. Who can revoke role 1 role from user2?A . The system OBA user B. The owner of role 1 C. Only User1 D. Any user with the 'ROLE ADMIN' database roleView AnswerAnswer: D

February 11, 2023 No Comments READ MORE +

What information constitutes an indirect connection to an individual, in the context of GDPR? Note: There are 3 correct answers to this question

What information constitutes an indirect connection to an individual, in the context of GDPR? Note: There are 3 correct answers to this questionA . National Identifier B. Postal Address C. Date of Birth D. License plate number E. IP AddressView AnswerAnswer: A,D,E

February 10, 2023 No Comments READ MORE +