The SAP HANA database is installed with multi database container (MDC) mode with multiple tenant databases configured. What are the required activities to enable access between tenants? Note: There are 2 correct answers to this question.
Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager?
How does the SAP SSO wizard (transaction SNCWIZARD) simplify the SNC configuration process?
What information constitutes an indirect connection to an individual, in the context of GDPR? Note: There are 3 correct answers to this question
Which SAP tool provides functions to support Data Destruction, Business Rules Maintenance, and Processing of Audit Areas?
To prevent session fixation and session hijacking attacks, SAP's HTTP security session management is highly recommended. What are the characteristics of HTTP security session management? Note: There are 2 correct answers to this question.
Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question
Which communication methods does the SAP Fiori Launchpad use to retrieve business data? Note: There are 2 correct answers to this question
User1 grants role 1 to user2. Who can revoke role 1 role from user2?
What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.
Which characteristics apply to the SAP ID Service? Note: There are 2 correct answers to this question
Which type of systems can be found in the Identify Provisioning Service landscape? Note: There are 2 correct answers to this question
Which features does the SAP Router support? Note: There are 2 correct answers to this question.
What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.
Based on your company guidelines you have set the password expiration to 60 days. Unfortunately, there is an RFC user in your SAP system who must not have a password change for 180 days. Which option would you recommend to accomplish such a request?
How do you check when and by whom profiles were assigned or deleted?
What benefits does the SAP Cloud Connector have compared to a 3rd partyreverse proxy solution, when connecting your SAP Cloud Platform with your SAP backend systems? Note: There are 2 correct answers to this question.
The SSO authentication using X.509 client certificates is configured. Users complain that they can't log in to the back-end system. The trace file shows the following error message: "HTTP request [2/5/9] Reject untrusted forwarded certificate". What is missing in the configuration? Note: There are 2 correct answers to this question.
What can you maintain in transaction SU24 to reduce the overall maintenance in PFCG? Note: There are 3 correct answers to this question.
Which of the following user types can be used to log on interactively? Note: There are 2 correct answers to this question