SAP P_SECAUTH_21 SAP Certified Technology Professional – System Security Architect Online Training
SAP P_SECAUTH_21 Online Training
The questions for P_SECAUTH_21 were last updated at Dec 20,2024.
- Exam Code: P_SECAUTH_21
- Exam Name: SAP Certified Technology Professional - System Security Architect
- Certification Provider: SAP
- Latest update: Dec 20,2024
You are reviewing the authorizations for Core Data Services (CDS) views.
How are classic authorizations integrated with CDS authorizations?
- A . By using the statement AUTHORITY-CHECK in the access control of the CDS view
- B . By defining access conditions in an access rule for the CDS view
- C . By assigning the CDS view to the authorization profile in PFCG
- D . By defining the CDS view in the authorization object in SU21
Which authorization object is required to support trusted system access by an RFC user following the configuration of a Managed System in SAP Solution Manager?
- A . S_RFCACL
- B . S_ACL_HIST
- C . S_RFC_TT
- D . S_RFC_TTAC
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub).
What transactions do you have to use to map a back-end system to one of those roles?
- A . /UI2/GW_SYS_ALIAS
- B . /IWFND/MAINT_SERVICE
- C . SEGW
- D . PFCG
While performing an audit of changes to the system and client change options for your production SAP S/4HANA environment, you receive the following message in transaction SCC4. "No logs found for selected period" How can you correct the problem.
- A . Maintain parameter rec/client with value ALL
- B . Maintain parameter rdisp/TRACE with value 3
- C . Maintain parameter rsau/enable with value 1
- D . Maintain parameter log-mode with value normal SAP HANA
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub).
What transaction do you have to use to map a back-end system to one of those roles?
- A . /UI2/GW_SYS_ALIAS
- B . PFCG
- C . SM59
- D . /IWFND/MAINT_SERVICE
You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad.
Which of the following scenarios do you choose?
- A . Chrome, SAP Enterprise Portal, SAP GUI for Java
- B . Chrome, SAP Cloud Platform, SAP GUI for Java
- C . Internet Explorer, ABAP front-end server, SAP GUI for Windows
- D . Internet Explorer, SAP Business Client, SAP GUI for Windows
You are using the SAP Web Dispatcher for load-balancing purposes.
Which actions are performed by the SAP Web Dispatcher in this scenario? Note: There are 2 correct answers to this question.
- A . Authenticates the user’s credentials
- B . Uses SAP logon groups to determine which requests are directed to which server
- C . Checks current state of the message server
- D . Decrypts the HTTPS request and then selects the server
What authorization object is checked when a user selects an A BAP Web Dynpro application to execute?
- A . S_PROGRAM
- B . S_START
- C . S_TCODE
- D . S_SERVICE
Where can we store the Security Audit Log events? Note: There are 2 correct answers to this question.
- A . In the database table RSAU_BUF_DATA
- B . In the file system of the application servers
- C . In the SAP Solution Manager system
- D . In a central fi e system
You want to check the custom ABAP codes in your system for security vulnerabilities and you want to use the SAP Code Vulnerability Analyzer to carry out these extended security checks.
What need to be done for this purpose? Note: There are 2 correct answers to this question
- A . Run SAP Code Vulnerability Analyzer from the ABAP Test Cockpit
- B . Run SAP Code Vulnerability Analyzer from the transaction ST01
- C . Run the transaction ST12 to start the analysis
- D . Run the extended syntax check from the SLIN transaction