SAP C_SECAUTH_20 SAP Certified Technology Associate – SAP System Security and Authorizations Online Training
SAP C_SECAUTH_20 Online Training
The questions for C_SECAUTH_20 were last updated at Nov 15,2024.
- Exam Code: C_SECAUTH_20
- Exam Name: SAP Certified Technology Associate - SAP System Security and Authorizations
- Certification Provider: SAP
- Latest update: Nov 15,2024
How can you enforce an additional transaction start authorization check for custom transaction?
- A . Without additional custom development it is not possible to add another check during transaction start.
- B . Maintain the SU24 entry for the custom transaction and adding the desired authorization object, setting the Check Indicator to "Check" and setting Proposal to Yes.
- C . For each role containing the custom transaction, add the desired authorization object manually in transaction PFCG, maintained the field values and then generate the profile.
- D . Using Transaction SE93 , update the custom transaction definition by specifying the desired authorization object and maintaining the desired field values.
Which of the following accurately describe a Composite Role? Note: There are 2 correct answer to this question.
- A . Authorization are maintained on Single Role level
- B . Menus cannot be adjusted as required
- C . Transaction cannot be deleted from the menu with authorizations retained
- D . User assignment is maintained at the Composite Role level
Which authorization is required to modify authorization data of derived roles?
- A . S_USER_AGR
- B . S_USER_SYS
- C . S_USER_AUT
- D . S_USER_VAL
Which transaction code allows you to configure the SAP System Audit Log?
- A . SM20
- B . SM19
- C . SM18
- D . SUIM
Which of the following illustrate the simplification of users and role maintenance on SAP Cloud? Note: There are 2 correct answer to this question.
- A . Business roles are automatically provisioned.
- B . Business users have business roles.
- C . Templates are provided for role derivation.
- D . Read and write access can be restricted.
How can you protect a system when you do not want the user assignments for a role to be transported?
- A . Restrict access to the user assignment tab in PFCG in the target system
- B . Restrict import of users in table PRGN_CUST in the target system
- C . Restrict import of users in table PRGN_CUST in the development system
- D . Restrict access to the user assignment tab in PFCG in the Development system
Which of the following features are provided by the SAP Fiori Launchpad content Manager? Note: There are 3 correct answer to this question.
- A . Activate 0 Data Services
- B . Create and Configure Groups
- C . Create and Configure Catalogs
- D . Display the issue with SAP Fiori Launchpad Content
- E . Display role assignments for Catalogs
Which configuration options apply to the usage of VCLIENT in the parameter icm /server_port_<xx>? Note: There are 3 correct answer to this question.
- A . VCLIENT default value is 0
- B . VCLIENT value must be specified if SSL configuration is defined by SSLCONFIG
- C . VCLIENT default value is 1
- D . VCLIENT = 0, which notifies the SSL server that no SSL client verification is needed
- E . VCLIENT = 1 the server asks the client to transfer a certificate
Which values are permitted for the S_BTCH_JOB authorization object? Note: There are 3 correct answer to this question.
- A . SHOW
- B . RELE
- C . 01 (Create)
- D . 02 (Change)
- E . DELE
Which of the following user types are precluded from logging in to system directly? Note:
There are 3 correct answer to this question.
- A . Service
- B . System
- C . Communication
- D . Reference
- E . Dialog