Security Flashcards
(72 cards)
What information can be provided by an Audit Class? Note: There are 3 correct Answers to this question.
A. Transaction Start
B. Dialog Logon
D. RFC/CPIC Logon
Which of the following accurately describe Solution Manager functionality? Note: There are 3 correct Answers to this question.
A. SAP SOS self-service is a convenient entry point to introduce security monitoring.
D. SAP EWA provides the most comprehensive security check.
E. System recommendations provide a worklist of potentially relevant security notes.
What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? Note:
There are 2 correct Answers to this question.
A. To recommend Performance Notes to improve system response
D. To recommend SAP Security Notes for evaluation
In the case of missing OData authorizations, why is it not recommended to maintained S_SERVICE manually within an SAP Fiori Authorization Role?
Note: There are 2 correct answer to this question.
B. Both front-end and back-end entries are generating the same S_SERVICE authorization object with different authorization values
D. The SRV_NAME Value of the S_SERVICE authorization object is the hash value of an OData service
You want to adjust check indicator values for certain authorization object delivered by SAP. In which of the following tables should your adjustments be recorded?
A. USOBX_C
If the OData back-end service is located on a remote back-end users need which authorization object to perform the RFC call on the back-end system?
Note: There are 2 correct answer to this question.
A. S_RFC
C. S_RFCACL
Which of the following describe the behavior of a reference user when assigned to a user master record? Note: There are 2 correct Answers to this question.
B. The roles of the reference user can be shown.
C. The user master record references the roles and authorizations assigned to the reference user.
How can you enforce an additional transaction start authorization check for custom transaction?
C. Maintain the SU24 entry for the custom transaction and adding the desired authorization object, setting the Check Indicator to “Check” and setting Proposal to Yes.
Which of the various protocols can be used to establish secure communication? Note: There are 3 correct answer to this question.
A. From Secure Login Server to SAP Netweaver : RFC (SNC)
D. From SAP GUI to SAP Netweaver : DIAG/RFC (SNC)
E. From Secure Login Server to LDAP Server : HTTPS (SSL)
Which of the following actions are correctly describes the usage of Front Channel Single Sign-On based on (SAML) 2.0?
Note: There are 2 correct answer to this question.
B. The identity provider returns the user to service providers with an authentication request
D. The identity provider queries the user for authentication credentials
When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? Note: There are 2 correct Answers to this question.
A. If the PFCG roles contain all of the start authorizations required for the application
C. If there is an application start lock
Which of the following authorization objects are used to secure the execution of External Commands when a defining a background job step?
Note: There are 2 correct answer to this question.
A. S_PROGRAM
C. S_LOG_COM
Which of the following actions are required to ensure complete logging of table data changes? Note:
There are 3 correct Answers to this question.
A. Instance profile parameter rec/client must be maintained for client.
B. Parameter RECCLIENT must be maintained in transaction STMS.
C. Log data changes must be enabled at the table level in transaction SE13.
Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?
C. SAP Data Services
Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?
C. Evaluation
Which of the following user types are precluded from logging onto the system directly? Note: There are
3 correct Answers to this question.
A. System
D. Communication
E. Reference
Which ABAP transaction codes are relevant for SNC parameter configuration? Note: There are 2 correct answer to this question.
A. SNCCONFIG
B. SNCWIZARD
Which of the following transactions allow you to define role assignments for OData Services that are available on multiple back-end systems? Note: There are 2 correct Answers to this question.
A. /UI2/GW_MAINT_SRV
D. /IWFND/MAINT_SERVICE
Which authorization object is required to modify authorization data of derived roles?
A. S_USER_VAL
Which of the following parameter must be configured to capture log data in the Security Audit log?
C. rsau/enable
Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation. Which instance profile parameter can you configure to allow a small group of users to bypass the limitation of multiple logins?
B. login/multi_login_users
Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? Note: There are
2 correct Answers to this question.
B. SAP HANA Smart Data Streaming
D. Forensic lab
Which of the following app-specific types of entities do users need to use SAP Fiori apps? Note: There are 2 correct Answers to this question.
B. UI
D. Authorizations
During maintenance of role you notice that the status text for an authorization object indicates status “Changed New” What does this status text mean?
D. The authorization object was used to create a new authorization because the initial configuration of the role change a default value maintained in SU24