Which of the following illustrate the simplification of users and role maintenance on SAP Cloud? Note: There are 2 correct answer to this question.
Which of the following illustrate the simplification of users and role maintenance on SAP Cloud? Note: There are 2 correct answer to this question.A . Business roles are automatically provisioned.B . Business users have business roles.C . Templates are provided for role derivation.D . Read and write access can be...
Which of the following accurately describes the role/profile SAP_NEW? Note: There are 2 correct answer to this question.
Which of the following accurately describes the role/profile SAP_NEW? Note: There are 2 correct answer to this question.A . The SAP_NEW must be generated in accordance with the system environment using the report REGENERATE_SAP_NEWB . The profile SAP_NEW provides authorizations to all new objects and objects change by releaseC ....
How can you protect a system when you do not want the user assignments for a role to be transported?
How can you protect a system when you do not want the user assignments for a role to be transported?A . Restrict access to the user assignment tab in PFCG in the target systemB . Restrict import of users in table PRGN_CUST in the target systemC . Restrict import of...
Which of the following phases in SAP AUDIT MANAGEMENT auditing process? Note: There are 3 correct answer to this question.
Which of the following phases in SAP AUDIT MANAGEMENT auditing process? Note: There are 3 correct answer to this question.A . Mitigation ReviewB . Engagement PlanningC . Remediation AnalysisD . Communication ResultsE . Monitoring ProgressView AnswerAnswer: B,D,E
Which of the following describe SAP Fiori Tile Target Mapping? Note: There are 2 correct answer to this question.
Which of the following describe SAP Fiori Tile Target Mapping? Note: There are 2 correct answer to this question.A . It represents visual part of tileB . It defines the target application which is launched.C . It is define within an SAP Tile GroupD . It is part of the...
How can this field be use to secure access?
You are Configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS . How can this field be use to secure access?A . It allows you to specify access to tables associated with a specific authorization groupB . It allows...
Which is the frequency of SAP Patch Day?
Which is the frequency of SAP Patch Day?A . MonthlyB . YearlyC . WeeklyD . QuarterlyView AnswerAnswer: A
Which of the following authorization objects are used to secure the execution of External Commands when a defining a background job step? Note: There are 2 correct answer to this question.
Which of the following authorization objects are used to secure the execution of External Commands when a defining a background job step? Note: There are 2 correct answer to this question.A . S_LOG_COMB . S_PROGRAMC . S_BTCH_EXTD . S_RZL_ADMView AnswerAnswer: A,B
Which of the following transaction allow you to customize or configure SAP Fiori Catalogs and Groups? Note: There are 2 correct answer to this question.
Which of the following transaction allow you to customize or configure SAP Fiori Catalogs and Groups? Note: There are 2 correct answer to this question.A . /UI2/FLPD_CUSTB . /UI2/FLPCM_CUTC . /UI2/FLPD_CONFD . /UI2/FLPCM_CONFView AnswerAnswer: A,C
Which instance parameter can you configure to allow small group of user to bypass the limitations of multiple logins?
Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation . Which instance parameter can you configure to allow small group of...