New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

SAP C_SECAUTH_20 SAP Certified Technology Associate - SAP System Security and Authorizations Exam Practice Test

Demo: 12 questions
Total 80 questions

SAP Certified Technology Associate - SAP System Security and Authorizations Questions and Answers

Question 1

Which of the following actions are required to ensure complete logging of table data changes? Note: There are 3 correct answer to this question.

Options:

A.

The security log must be activated using transaction SM19

B.

Client change option must be set to Automatic Recording of changes

C.

Instance profile parameter rec/client must be maintained for client

D.

Log Data changes must be enable at the table level in transaction SE13

E.

Parameter RECCLIENT must be maintained in transaction STMS

Question 2

You want to adjust check indicator values for certain authorization object delivered by SAP. In which of the following tables should your adjustments be recorded?

Options:

A.

USOBX_C

B.

USOBT_C

C.

USOBHASH

D.

USOBX

Question 3

Which of the following transaction allow you to customize or configure SAP Fiori Catalogs and Groups? Note: There are 2 correct answer to this question.

Options:

A.

/UI2/FLPD_CUST

B.

/UI2/FLPCM_CUT

C.

/UI2/FLPD_CONF

D.

/UI2/FLPCM_CONF

Question 4

What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? Note: There are 2 correct answer to this question.

Options:

A.

To recommend SAP Hot News Notes (priority 1 and 2)

B.

To recommend Legal Change Notes related to SAP innovations

C.

To recommend Performance Notes to improve system response

D.

To recommend SAP security Notes for evaluation

Question 5

Which transaction codes are relevant to enable SNC between ABAP system? Note: There are 3 correct answer to this question.

Options:

A.

RZ10

B.

SNCO

C.

STRUST

D.

PFCG

E.

SU01

Question 6

When you are troubleshooting an application start issue, what does the Search Startable Application in Roles report help you determine?

Note: There are 2 correct answer to this question.

Options:

A.

If the PFCG roles contains all the start authorizations required for the application

B.

If the PFCG menu contains SAP Fiori Tile Group

C.

If there is an application start lock

D.

If the PFCG roles assigned to end user

Question 7

Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?

Options:

A.

SAP Information Steward

B.

SAP Process Control

C.

SAP Information LifeCycle Management

D.

SAP Data Services

Question 8

In the case of missing OData authorizations, why is it not recommended to maintained S_SERVICE manually within an SAP Fiori Authorization Role?

Note: There are 2 correct answer to this question.

Options:

A.

The SRV_NAME Value of the S_SERVICE authorization object is the hash value of an OData service

B.

The SRV_NAME Value of the S_SERVICE authorization object is the name of an OData service

C.

Both front-end and back-end entries are generating the same S_SERVICE authorization object with different authorization values

D.

Both front-end and back-end entries are generating the same S_SERVICE authorization object with same authorization values

Question 9

Which of the following are SAP UI5 Fiori application types? Note: There are 2 correct answer to this question.

Options:

A.

Legacy

B.

Transactional

C.

Analytical

D.

Web Dynpro

Question 10

Which TADIR Service Object type includes business functional authorization objects used within the OData execution?

Options:

A.

IWSG

B.

IWSC

C.

OSOD

D.

IWSV

Question 11

Which of the various protocols can be used to establish secure communication? Note: There are 3 correct answer to this question.

Options:

A.

From Secure Login Server to LDAP Server : HTTPS (SSL)

B.

From Secure Login Server to SAP Netweaver : RFC (SNC)

C.

From Business Explorer to SAP Netweaver : DIAG/RFC (SNC), HTTPS (SSL)

D.

From Secure Login Client to Secure Login Server: DIAG/RFC (SNC), HTTPS, RADIUS

E.

From SAP GUI to SAP Netweaver : DIAG/RFC (SNC)

Question 12

Which values are permitted for the S_BTCH_JOB authorization object? Note: There are 3 correct answer to this question.

Options:

A.

SHOW

B.

RELE

C.

01 (Create)

D.

02 (Change)

E.

DELE

Demo: 12 questions
Total 80 questions