What authorization object is checked when a user selects an A BAP Web Dynpro application to execute?
What authorization object is checked when a user selects an A BAP Web Dynpro application to execute?A . S_PROGRAM B. S_START C. S_TCODE D. S_SERVICEView AnswerAnswer: B
What are the features of the Audit Information System (AIS)? Note: There are 2 correct answers to this question.
What are the features of the Audit Information System (AIS)? Note: There are 2 correct answers to this question.A . The roles are built from nodes in the Implementation Guide (IMG) B. It can be launched directly using transact on SECR C. It offers two types of audit reports: system...
Which communication methods does the SAP Fiori Launchpad use to retrieve business data? Note: There are 2 correct answers to this question
Which communication methods does the SAP Fiori Launchpad use to retrieve business data? Note: There are 2 correct answers to this questionA . OData B. InA C. HOP D. SNCView AnswerAnswer: B,D
While performing an audit of changes to the system and client change options for your production SAP S/4HANA environment, you receive the following message in transaction SCC4. "No logs found for selected period" How can you correct the problem.
While performing an audit of changes to the system and client change options for your production SAP S/4HANA environment, you receive the following message in transaction SCC4. "No logs found for selected period" How can you correct the problem.A . Maintain parameter rec/client with value ALL B. Maintain parameter rdisp/TRACE...
Which of the following user types can be used to log on interactively? Note: There are 2 correct answers to this question
Which of the following user types can be used to log on interactively? Note: There are 2 correct answers to this questionA . System B. Dialog C. Communication D. ServiceView AnswerAnswer: B,D
How do you check when and by whom profiles were assigned or deleted?
How do you check when and by whom profiles were assigned or deleted?A . Run report RSUSR008_009_NEW with appropriate filters B. Run report RSUSR100 with appropriate filters C. Check system trace using transaction ST01 D. Check security audit log using transact on SM20View AnswerAnswer: B
Why do you use table logging in AS ABAP?
Why do you use table logging in AS ABAP?A . To log changes in application data B. To log changes in master data C. To log changes in table technical settings D. To log changes in customizing tablesView AnswerAnswer: D
Which of the following steps do you have to execute on the managed systems?
You want to carry out some preparatory work for executing the SAP Security Optimization Self-service on a customer system. Which of the following steps do you have to execute on the managed systems? Note: There are 2 correct answers to this question.A . Install the ST-A/PI plug-in B. Configure Secure...
Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?
You have Reason Codes already defined. Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?A . Maintain a Firefighter ID for Controllers and Firefighters Maintain an Owner for a Firefighter ID Maintain Access Control Owner B. Maintain an Owner for a Firefighter ID...
Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.
Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.A . Group B. Role C. User D. CatalogView AnswerAnswer: A,D