What transactions do you have to use to map a back-end system to one of those roles?
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transactions do you have to use to map a back-end system to one of...
What need to be done for this purpose?
You want to check the custom ABAP codes in your system for security vulnerabilities and you want to use the SAP Code Vulnerability Analyzer to carry out these extended security checks. What need to be done for this purpose? Note: There are 2 correct answers to this questionA . Run...
Which of the 7 core principles of the General Data Privacy Regulation (GDPR) requires thorough documentation of all policies and controls that govern the collection and processing of data?
Which of the 7 core principles of the General Data Privacy Regulation (GDPR) requires thorough documentation of all policies and controls that govern the collection and processing of data?A . Accuracy B. Lawfulness, Fairness and Transparency C. Accountability D. Integrity and ConfidentialityView AnswerAnswer: C
Which actions are performed by the SAP Web Dispatcher in this scenario?
You are using the SAP Web Dispatcher for load-balancing purposes. Which actions are performed by the SAP Web Dispatcher in this scenario? Note: There are 2 correct answers to this question.A . Authenticates the user's credentials B. Uses SAP logon groups to determine which requests are directed to which server...
How do you prevent the access of users to the transaction A from within the program?
In your system, you have a program which calls transaction A. Users with access to this program can still execute transaction A without explicit authorizations given to this transaction. How do you prevent the access of users to the transaction A from within the program? A. Make sure you do...
What transaction do you have to use to map a back-end system to one of those roles?
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transaction do you have to use to map a back-end system to one of...
Which users should exist in client 000? Note: There are 2 correct answers to this question
Which users should exist in client 000? Note: There are 2 correct answers to this questionA . SAP* B. EARLYWATCH C. SAPCPIC D. TMSADMView AnswerAnswer: A,B
Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 correct answers to this question
Which communication protocols are supported by the SAP Cloud Connector? Note: There are 2 correct answers to this questionA . NNTP B. LDAP C. SNA D. RFCView AnswerAnswer: B,D
User1 grants role 1 to user2. Who can revoke role 1 role from user2?
User1 grants role 1 to user2. Who can revoke role 1 role from user2?A . The system OBA user B. The owner of role 1 C. Only User1 D. Any user with the 'ROLE ADMIN' database roleView AnswerAnswer: D
What information constitutes an indirect connection to an individual, in the context of GDPR? Note: There are 3 correct answers to this question
What information constitutes an indirect connection to an individual, in the context of GDPR? Note: There are 3 correct answers to this questionA . National Identifier B. Postal Address C. Date of Birth D. License plate number E. IP AddressView AnswerAnswer: A,D,E