A user has the authorization to execute SP01. What can this user access with authorization object S_ SPO_ ACT when the 'Value for Authorization Check' field is set to "_USER?
A. All spool requests for all users in the client
B. All spool requests for users in the same user group
C. User's own spool requests
D. All spool requests for a specific user in the client
You have Reason Codes already defined. Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?
A. Maintain a Firefighter ID for Controllers and Firefighters Maintain an Owner for a Firefighter ID Maintain Access Control Owner
B. Maintain an Owner for a Firefighter ID Maintain a Firefighter ID for Controllers and Firefighters Maintain Access Control Owner
C. Maintain an Owner for a Firefighter ID Maintain a Firefighter ID for Controllers and Firefighters Maintain Access Control Owner
D. Maintain an Owner for a Firefighter ID Maintain a Firefighter ID for Controllers and Firefighters Maintain Access Control Owner
Which basis transaction provides an optimized user interface for evaluating authorization checks only?
A. STAUTHTRACE
B. RSECADMIN
C. ST01
D. ABAP_TRACE
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transaction do you have to use to map a back-end system to one of those roles?
A. /UI2/GW_SYS_ALIAS
B. PFCG
C. SM59
D. /IWFND/MAINT_SERVICE
You want to allow some of your colleagues to use the SAP GUI for Java to connect directly to your SAP back-end system from a public internet connection without having to set up a VPN connection first.
Which of the following SAP solutions is suited for this purpose?
A. SAP Web Dispatcher
B. SAP router
C. SAP Cloud Connector
D. SAP NetWeaver Gateway
What is the SAP Best Practice to delete a security SAP role in SAP landscape?
A. Transport the SAP role and delete the role using Profile Generator
B. Delete the SAP role in all clients using Profile Generator
C. Delete the SAP role using Profile Generator, and then put it in the transport
D. Delete the SAP role in all clients in all systems using Profile Generator
Currently, transports into your SAP system are not scanned automatically. To avoid the import of non-secure programs, you have implemented the strategy to set up a virus scanner using a script to automatically scan for the malicious programs.
What is the valid fi e format where data files are first converted into and then checked by a virus scanner?
A. XML
B. Plain text
C. 0csv
D. SAP compressed
How do you check when and by whom profiles were assigned or deleted?
A. Run report RSUSR008_009_NEW with appropriate filters
B. Run report RSUSR100 with appropriate filters
C. Check system trace using transaction ST01
D. Check security audit log using transact on SM20
What are characteristics only valid for the MDC high isolation mode?
A. Every tenant has its own set of OS users
B. All internal database communication is secured using SNC
C. Every tenant has its own set of database users
D. Every tenant has its own set of database users belonging to the same sapsys group
How do you handle user "SAP 'in AS ABAP? Note: There are 3 correct answers to this question.
A. Remove all authorizations from the user
B. Lock and expire the user in all clients
C. Set profile parameter login/no_automatic_user_sapstar to 0
D. Set profile parameter login/no_automatic_user_sapstar to 1
E. Lock and expire the user in all clients except 000