SAP C_GRCAC_13 SAP Certified Application Associate – SAP Access Control 12.0 Online Training
SAP C_GRCAC_13 Online Training
The questions for C_GRCAC_13 were last updated at Nov 19,2024.
- Exam Code: C_GRCAC_13
- Exam Name: SAP Certified Application Associate - SAP Access Control 12.0
- Certification Provider: SAP
- Latest update: Nov 19,2024
You want to generate a BRFplus Initiator Rule that utilizes an expression of type Decision Table for the SAP_GRAC_ACCESS_REQUEST MSMP Process ID.
Which rule types can you use? Note: There are 2 correct answers to this question.
- A . Class Based Rule
- B . Function Module Based Rule
- C . BRFplus Flat Rule
- D . BRFplus Rule
Why might you integrate Business Role Management with Business Rules Framework? Note: There are 2 correct answers to this question.
- A . Determine role owner
- B . Determine role methodology
- C . Determine role business area
- D . Determine role naming convention
Which of the following are required to enable Centralized Emergency Access Management (EAM)? Note: There are 2 correct answers to this question.
- A . Set the Application Type parameter for Emergency Access Management to value ID in the target system UGRC plug-in
- B . Set the Application Type parameter for Emergency Access Management to value ID in SAP Access Control
- C . Set the Enable Decentralized Firefighting parameter for Emergency Access Management to YES
- D . Set the Enable Decentralized Firefighting parameter for Emergency Access Management to NO
You are defining connector settings for the connector between your SAP Access Control system and your SAP
S/4HANA system.
Which of the following integration scenarios should you configure? Note: There are 2 correct answers to this question.
- A . AM
- B . S4HANA
- C . PROV
- D . SUPMG
Your compliance team requires that all changes to access rules be tracked.
Which of the following change logs do you enable? Note: There are 3 correct answers to this question.
- A . Role
- B . Access Rule
- C . Function
- D . Rule Set
- E . Critical Role
SAP developed a three phase, six step SoD Risk Management Process for use when implementing Access Risk Analysis.
Which of the following steps are a part of this process? Note: There are 3 correct answers to this question.
- A . Risk Recognition
- B . Mitigation
- C . Analysis
- D . Role Building and Analysis
- E . Rule Set Design
Which of the following conditions can you use to configure an escape route in MSMP Workflow? Note: There are 2 correct answers to this question.
- A . No Role Owner
- B . SOD Violation
- C . Approver Not Found
- D . Auto Provisioning Failure
SAP Governance, Risk and Compliance solutions are organized along 4 key themes.
Which of the following are key themes? Note: There are 3 correct answers to this question.
- A . Business Integrity Screening
- B . Access Governance
- C . Cybersecurity and Data Protection
- D . Enterprise Risk and Compliance
- E . Audit Management
You are tasked with configuring SAP Access Control to retrieve user and authentication information. SAP Access Control supports connector configuration for which of the following functions? Note: There are 3 correct answers to this question.
- A . User Search Data Source
- B . User Detail Data Source
- C . End User Verification
- D . User Identity Federation
- E . User Identity Management
How can you ensure that a coordinator has the opportunity to review UAR request assignments?
- A . Set the Admin review required before sending tasks to reviewers parameter for UAR to YES
- B . Schedule the Generate new request for UAR rejected request job
- C . Maintain the GRAC_COORDINATOR agent at the approval stage in MSMP Process ID SAP_GRAC_USER_ACCESS_REVIEW
- D . Set the Who are the reviewers? parameter for UAR to COORDINATOR