Which of the following illustrate the simplification of user and role maintenance on SAP Cloud? (Choose two.)
A. Read and write access can be restricted.
B. Business users have business roles.
C. Templates are provided for role derivation.
D. Business roles are automatically provisioned.
Which application allows a role developer to perform the mass maintenance of menu options from selected SAP Fiori Tile Catalogs?
A. PRGN_COMPARE_ROLE_MENU
B. PRGN_CREATE_FIORI_BACKENDROLES
C. PRGN_PRINT_AGR_MENU
D. PRGN_CREATE_FIORI_FRONTENDROLE
Which of the following transactions allow you to customize or configure SAP Fiori Catalogs and Groups? (Choose two.)
A. /UI2/FLPD_CONF
B. /UI2/FLPCM_CONF
C. /UI2/FLPD_CUST
D. /UI2/FLPCM_CUST
When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following items should be provided? (Choose three.)
A. UI access to the Apps
B. SAP Favorites
C. Start Authorizations for OData services
D. Catalog for the Start Authorization
E. WAPA Business Server Pages
Which of the following SUIM reports can you use to determine if a user has a segregation of duty violation? (Choose two.)
A. User Comparison
B. User Level Access Risk Analysis
C. Users by Complex Search
D. Users With Critical Authorizations
Which of the following user types are precluded from logging onto the system directly? (Choose three.)
A. Dialog
B. Service
C. Communication
D. Reference
E. System
When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? (Choose two.)
A. If the PFCG role menu contains SAP Fiori Tile Groups
B. If the PFCG roles contain all of the start authorizations required for the application
C. If there is an application start lock
D. If the PFCG roles are assigned to end users
Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? (Choose two.)
A. Static and Dynamic Application Security Testing
B. Deprovisioning of problematic ABAP code
C. Capture of manual and automated check executions
D. Direct integration with Root Cause Analysis
What are the main features of SAP Enterprise Threat Detection (ETD)? (Choose three.)
A. Monitoring of GDPR compliance
B. Segregation of Duty analysis
C. Forensic investigations
D. Realtime alerts
E. Monitoring of security events
Which of the following are phases in the SAP Audit Management auditing process? (Choose three.)
A. Monitoring Progress
B. Engagement Planning
C. Remediation Analysis
D. Communicating Results
E. Mitigation Review