Month End Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

SAP C_SEC_2405 SAP Certified Associate - Security Administrator Exam Practice Test

Demo: 24 questions
Total 80 questions

SAP Certified Associate - Security Administrator Questions and Answers

Question 1

Which SU01 user types are NOT enabled for interaction? Note: There are 2correct answers to this question.

Options:

A.

Service

B.

System

C.

Dialog

D.

Communications Data

Question 2

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2correct answers to this question.

Options:

A.

Password policy settings

B.

Client connect restrictions

C.

Identity providers

D.

Authorization privileges

Question 3

Which authorization objects can be used to restrict access to SAP Enterprise Search models in the SAP Fiori launchpad? Note: There are 2correct answers to this question.

Options:

A.

S_ESH_CONN

B.

SDDLVIEW

C.

S_ESH_ADM

D.

RSDDLTIP

Question 4

What are some of the rules for SAP-developed roles in SAP S/4HANA Cloud Public Edition? Note: There are 3correct answers to this question.

Options:

A.

Authorization defaults define role authorizations.

B.

Role maintenance reads applications from role menus.

C.

Role maintenance reads applications from a catalog.

D.

Catalogs are assigned to role menus.

E.

Manual role authorizations are supported in custom catalogs.

Question 5

What is required to centrally administer a user's master record using Central User Administration? Note: There are 3correct answers to this question.

Options:

A.

An RFC destination to the target system

B.

An RFC destination to the target client

C.

An existing master record in the target client for the user

D.

An ALE distribution model

E.

An entry in transaction BD54 for the child system

Question 6

What does SAP Key Management Service (KMS) do to secure cryptographic keys? Note: There are 3correct answers to this question.

Options:

A.

Store keys

B.

Conceal keys

C.

Rotate keys

D.

Generate keys

E.

Transmit keys

Question 7

What use cases are available for a Local Identity Directory? Note: There are 3correct answers to this question.

Options:

A.

Hybrid mode

B.

Merging attributes

C.

S/4HANA use case

D.

Proxy mode

E.

Classic use case

Question 8

Which limitations apply to restricted users in SAP HANA Cloud? Note: There are 3correct answers to this question.

Options:

A.

They can only create objects in their own database schema.

B.

They can only connect to the database using HTTP/HTTPS.

C.

They only have full SQL access via the SQL console.

D.

They cannot connect via ODBC or JDBC.

E.

They cannot create objects in the database.

Question 9

What must you do before you can use transaction PFCG? Note: There are 2correct answers to this question.

Options:

A.

Fill tables USOBT and USOBX with the SAP-delivered authorization default values.

B.

Set the system profile parameter auth/no_check_in_some_cases to Y.

C.

Fill tables USOBT_C and USOBX_C with the SAP-delivered authorization default values.

D.

Set the system profile parameter auth/no_check_in_some_cases to N.

Question 10

Which levels of security protection are provided by Secure Network Communication (SNC)? Note: There are 3correct answers to this question.

Options:

A.

Authentication

B.

Integrity

C.

Availability

D.

Privacy

E.

Authorization

Question 11

What does a status text value of "Old" mean during the maintenance of authorizations for an existing role?

Options:

A.

Field values have not been changed.

B.

Field values were unchanged and no new authorization was added.

C.

Field values were changed as a result of the merge process.

D.

The field delivered with content was changed but the old value was retained.

Question 12

You are evaluating startable applications. Which of the following can you use to check if there is an application start lock on an application contained in a PFCG role? Note: There are 2correct answers to this question.

Options:

A.

Transaction SUIM-Executable Transactions report

B.

Transaction SM01_DEV

C.

Transaction SM01_CUS

D.

Transaction SUIM - Transactions Executable with Profile report

Question 13

In which order do you define the security-relevant objects in SAP BTP?

Options:

A.

Role collection

B.

Role template

C.

Role3

Question 14

When planning an authorization concept for your SAP S/4HANA Cloud Public Edition implementation, what rules must you consider? Note: There are 2correct answers to this question.

Options:

A.

SAP Fiori apps, dashboards, and displays can be assigned directly to a business role.

B.

Business catalogs can be assigned directly to a business user.

C.

Business roles can be assigned directly to a business user.

D.

Business catalogs can be assigned directly to a business role.

Question 15

In S/4HANA on-premise, which of the following combinations is required to grant a business user access to data from a Core Data Services (CDS) view using the standard ABAP authorization concept and authorization object S_RS_AUTH?

Options:

A.

•A CDS role with access conditions based on authorization object S_RS_AUTH,

•APFCG role with authorization for object S_RS_AUTH and assignment of the PFCG role

•The CDS role to the business user.

B.

•A CDS role with access conditions based on authorization object S_RS_AUTH

•APFCG role containing the CDS role and access conditions based up authorization object S_RS_AUTH

•Assignment of the PFCG role to the business user. C.

C.

•ACDS role with access conditions based on authorization object S_RS_AUTH

•A PFCG role with authorization for object S_RS_AUTH

•Assignment of the PFCG role to the business user. D.

D.

•A CDS role with access conditions based on authorization object S_RS_AUTH

•APFCG role containing the CDS role and access conditions based up authorization object S_RS_AUTH

•Assignment of the PFCG role and the CDS role to the business user.

Question 16

Which object type is assigned to activated OData services in transaction SU24?

Options:

A.

IWSV

B.

G4BA

C.

IWSG

D.

HTTP

Question 17

Following an upgrade of your SAP S/4HANA on-premise system to a higher release, you perform a Modification Comparison using SU25.

What does this comparison do?

Options:

A.

It compares your changes to the SAP defaults in USOBX and USOBT with the new SAP defaults in the current release and allows you to make adjustments.

B.

It compares the Role Maintenance data from the current release with the data for the previous release and allows you to adjust any custom default values in tables USOBX and USOBT.

C.

It compares the Role Maintenance data from the previous release with the data for thecurrent release and writes any new default values in tables USOBX_C and USOBT_C.

D.

It compares your changes to the SAP defaults in USOBX_C and USOBT_C with the new SAP defaults in the current release and allows you to make adjustments.

Question 18

Which privilege types are available in SAP HANA Cloud? Note: There are 3correct answers to this question.

Options:

A.

Application

B.

Package

C.

System

D.

Analytic

E.

Object

Question 19

SAP BTP distinguishes between which of the following users? Note: There are 2correct answers to this question.

Options:

A.

Business users

B.

Technical users

C.

Platform users

D.

Key users

Question 20

Which log types are available in the Administration Console of Cloud Identity Services? Note: There are 2correct answers to this question.

Options:

A.

Change logs

B.

Troubleshooting logs

C.

Performance logs

D.

Usage logs

Question 21

Which of the following user types are excluded from some general password-related rules, such as password validity or initial password? Note: There are 2correct answers to this question.

Options:

A.

Dialog

B.

System

C.

Communication

D.

Service

Question 22

Which of the following are Security Goals? Note: There are 2correct answers to this question.

Options:

A.

Repudiation

B.

Identity Authentication

C.

Encryption

D.

Information Integrity

Question 23

What are some security safeguards categories? Note: There are 3correct answers to this question.

Options:

A.

Physical

B.

Access Control

C.

Organizational

D.

Technical

E.

Financial

Question 24

When you maintain authorizations for SAPUI5 Fiori apps, which of the following object types is the front-end authorization object type?

Options:

A.

TADIR G4BA-SAP Gateway Odata V4 Backend Service Group & Assignments

B.

TADIR IWSV - SAP Gateway Business Suite Enablement-Service

C.

TADIR IWSG - SAP Gateway: Service Groups Metadata

D.

TADIR INA1 InA Service

Demo: 24 questions
Total 80 questions