What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.

What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.A . They are used for user-to-system trusted login B. They are used for system-to-system communication C. They have an unconfigurable validity of 2 minutes D. They are transmitted as cookiesView AnswerAnswer: B,C

February 24, 2023 No Comments READ MORE +

Which setting do you recommend?

You are evaluating the "Cross-client object change" option using transact on SCC4 for your Unit Test Client in the development environment. Which setting do you recommend?A . Changes to repository and cross-client customizing allowed B. No changes to repository and cross-client customizing objects C. No changes to cross-client customizing objects...

February 24, 2023 No Comments READ MORE +

What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note: There are 2 correct answers to this question.

What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note: There are 2 correct answers to this question.A . The Logon ticket is used for user-to-system communication B. The Logon ticket is domain restricted C. The Logon ticket has an unconfigurable lifetime validity D. The Logon...

February 24, 2023 No Comments READ MORE +

When checking the cause, it was discovered that a tenant configuration parameter has been changed. The audit logging did NOT show any events.What could be the reason for this?

You are running an SAP HANA database in a multi database container (MDC) mode with a single tenant configured. The global_auditing_state parameter has been set to "true" on the global.ini.After restarting the system and tenant databases, the tenant did not come up. When checking the cause, it was discovered that...

February 23, 2023 No Comments READ MORE +

How are classic authorizations integrated with CDS authorizations?

You are reviewing the authorizations for Core Data Services (CDS) views. How are classic authorizations integrated with CDS authorizations?A . By using the statement AUTHORITY-CHECK in the access control of the CDS view B. By defining access conditions in an access rule for the CDS view C. By assigning the...

February 23, 2023 No Comments READ MORE +

Where can we store the Security Audit Log events? Note: There are 2 correct answers to this question.

Where can we store the Security Audit Log events? Note: There are 2 correct answers to this question.A . In the database table RSAU_BUF_DATA B. In the file system of the application servers C. In the SAP Solution Manager system D. In a central fi e systemView AnswerAnswer: B,C

February 23, 2023 No Comments READ MORE +

Which type of systems can be found in the Identify Provisioning Service landscape? Note:

Which type of systems can be found in the Identify Provisioning Service landscape? Note: There are 2 correct answers to this questionA . Identify Provider B. Source C. Proxy D. Service ProviderView AnswerAnswer: A,B

February 23, 2023 No Comments READ MORE +

What is the default authentication mechanism in the SAP Cloud Platform?

What is the default authentication mechanism in the SAP Cloud Platform?A . X 509 Certificates B. Kerberos C. SAP Logon Tickets D. SAMLView AnswerAnswer: D

February 23, 2023 No Comments READ MORE +

What does the Return Code 12 signify?

A security consultant has activated a trace via ST01 and is analyzing the authorization error with Return Code 12. What does the Return Code 12 signify?A . "Objects not contained in User Buffer" B. "No authorizations and does NOT have authorization object in their buffer" C. "No authorizations but does...

February 22, 2023 No Comments READ MORE +

What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note:

What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note: There are 2 correct answers to this question.A . Synchronization of user contexts from ABAP Systems B. Predictive threat notification C. Pseudonymize user identities for data protection D. Baseline detectionView AnswerAnswer: C,D

February 22, 2023 No Comments READ MORE +