Which of the following scenarios do you choose?
You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad. Which of the following scenarios do you choose?A . Chrome, SAP Enterprise Portal, SAP GUI for Java B. Chrome, SAP Cloud Platform, SAP GUI for Java C. Internet Explorer, ABAP front-end server, SAP GUI for Windows...
Which authorization object is required to support trusted system access by an RFC user following the configuration of a Managed System in SAP Solution Manager?
Which authorization object is required to support trusted system access by an RFC user following the configuration of a Managed System in SAP Solution Manager?A . S_RFCACL B. S_ACL_HIST C. S_RFC_TT D. S_RFC_TTACView AnswerAnswer: A
A user reports an issue with data not showing up in the visualization of the SAP Fiori tiles. You want to verify the target mapping. At what level are you going to check the target mapping?
A user reports an issue with data not showing up in the visualization of the SAP Fiori tiles. You want to verify the target mapping. At what level are you going to check the target mapping?A . O At the catalog level in the SAP Fiori front-end server B. O...
What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.
What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.A . Configuration check of the SAP systems and the SAP middleware components against defined configurations B. Results with recommendations on how to resolve identified vulnerabilities without prioritization C. Analysis of security vulnerabilities within...
What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.
What does the SAP Security Optimization Service provide? Note: There are 2 correct answers to this question.A . Analysis of the security vulnerabilities within an SAP landscape B. Results containing the list of patches that have to be applied. C. Configuration checks of SAP systems D. Analysis of the network...
How can you stop this prompt from appearing?
You are running a 3-tier SAP system landscape. Each time you are accessing STMS_IMPORT on any of these systems, you are prompted for a TMSADM password. How can you stop this prompt from appearing?A . Run the report RSUSR405 on the domain controller. B. Reset the TMSADM user's password on...
Which Object ID is used to integrate Business Rule Framework (BRF+) to Multi Step Multi Process (MSMP) initiator workflow?
Which Object ID is used to integrate Business Rule Framework (BRF+) to Multi Step Multi Process (MSMP) initiator workflow?A . Function ID B. Application ID C. Process ID D. Expression IDView AnswerAnswer: A
How do you handle user "SAP 'in AS ABAP? Note: There are 3 correct answers to this question.
How do you handle user "SAP 'in AS ABAP? Note: There are 3 correct answers to this question.A . Remove all authorizations from the user B. Lock and expire the user in all clients C. Set profile parameter login/no_automatic_user_sapstar to 0 D. Set profile parameter login/no_automatic_user_sapstar to 1 E. Lock...
What are the characteristics of HTTP security session management? Note: There are 3 correct answers to this question
What are the characteristics of HTTP security session management? Note: There are 3 correct answers to this questionA . Refers to the session context through the session identifier B. Checks the logon credentials again for every request C. Starts security sessions with a short user-based expiration time D. Deletes security...
Which platform services are available in the Cloud Foundry? Note: There are 2 correct answers to this question
Which platform services are available in the Cloud Foundry? Note: There are 2 correct answers to this questionA . Commerce B. Integration C. Analytics D. Data QualityView AnswerAnswer: B,C