Security Flashcards

1
Q

What information can be provided by an Audit Class? Note: There are 3 correct Answers to this question.

A

A. Transaction Start

B. Dialog Logon

D. RFC/CPIC Logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following accurately describe Solution Manager functionality? Note: There are 3 correct Answers to this question.

A

A. SAP SOS self-service is a convenient entry point to introduce security monitoring.

D. SAP EWA provides the most comprehensive security check.

E. System recommendations provide a worklist of potentially relevant security notes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of SAP Notes listed by SAP Solution Manager System Recommendations? Note:
There are 2 correct Answers to this question.

A

A. To recommend Performance Notes to improve system response

D. To recommend SAP Security Notes for evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the case of missing OData authorizations, why is it not recommended to maintained S_SERVICE manually within an SAP Fiori Authorization Role?
Note: There are 2 correct answer to this question.

A

B. Both front-end and back-end entries are generating the same S_SERVICE authorization object with different authorization values

D. The SRV_NAME Value of the S_SERVICE authorization object is the hash value of an OData service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You want to adjust check indicator values for certain authorization object delivered by SAP. In which of the following tables should your adjustments be recorded?

A

A. USOBX_C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the OData back-end service is located on a remote back-end users need which authorization object to perform the RFC call on the back-end system?
Note: There are 2 correct answer to this question.

A

A. S_RFC

C. S_RFCACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following describe the behavior of a reference user when assigned to a user master record? Note: There are 2 correct Answers to this question.

A

B. The roles of the reference user can be shown.

C. The user master record references the roles and authorizations assigned to the reference user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you enforce an additional transaction start authorization check for custom transaction?

A

C. Maintain the SU24 entry for the custom transaction and adding the desired authorization object, setting the Check Indicator to “Check” and setting Proposal to Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the various protocols can be used to establish secure communication? Note: There are 3 correct answer to this question.

A

A. From Secure Login Server to SAP Netweaver : RFC (SNC)

D. From SAP GUI to SAP Netweaver : DIAG/RFC (SNC)

E. From Secure Login Server to LDAP Server : HTTPS (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following actions are correctly describes the usage of Front Channel Single Sign-On based on (SAML) 2.0?
Note: There are 2 correct answer to this question.

A

B. The identity provider returns the user to service providers with an authentication request

D. The identity provider queries the user for authentication credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When you are troubleshooting an application start issue, what does the Search for Startable Applications in Roles report help you determine? Note: There are 2 correct Answers to this question.

A

A. If the PFCG roles contain all of the start authorizations required for the application

C. If there is an application start lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following authorization objects are used to secure the execution of External Commands when a defining a background job step?
Note: There are 2 correct answer to this question.

A

A. S_PROGRAM

C. S_LOG_COM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following actions are required to ensure complete logging of table data changes? Note:
There are 3 correct Answers to this question.

A

A. Instance profile parameter rec/client must be maintained for client.

B. Parameter RECCLIENT must be maintained in transaction STMS.

C. Log data changes must be enabled at the table level in transaction SE13.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?

A

C. SAP Data Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which UCON phase blocks the access to RFC Function Modules without an assigned Communication Assembly?

A

C. Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following user types are precluded from logging onto the system directly? Note: There are
3 correct Answers to this question.

A

A. System

D. Communication

E. Reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which ABAP transaction codes are relevant for SNC parameter configuration? Note: There are 2 correct answer to this question.

A

A. SNCCONFIG

B. SNCWIZARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following transactions allow you to define role assignments for OData Services that are available on multiple back-end systems? Note: There are 2 correct Answers to this question.

A

A. /UI2/GW_MAINT_SRV

D. /IWFND/MAINT_SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which authorization object is required to modify authorization data of derived roles?

A

A. S_USER_VAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following parameter must be configured to capture log data in the Security Audit log?

A

C. rsau/enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation. Which instance profile parameter can you configure to allow a small group of users to bypass the limitation of multiple logins?

A

B. login/multi_login_users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following are used in SAP Enterprise Threat Detection (ETD) architecture? Note: There are
2 correct Answers to this question.

A

B. SAP HANA Smart Data Streaming

D. Forensic lab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following app-specific types of entities do users need to use SAP Fiori apps? Note: There are 2 correct Answers to this question.

A

B. UI

D. Authorizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

During maintenance of role you notice that the status text for an authorization object indicates status “Changed New” What does this status text mean?

A

D. The authorization object was used to create a new authorization because the initial configuration of the role change a default value maintained in SU24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following authorization objects would be required to allow back-end server access to a Web Dynpro application using the SAP Fiori Launchpad?

A

A. S_SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What content can be shared between the SAP Access Control and SAP Cloud Identity and Access Governance products? Note: There are 3 correct Answers to this question.

A

A. Mitigation controls

B. Risk library

D. Mitigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following illustrate the simplification of user and role maintenance on SAP Cloud? Note:
There are 2 correct Answers to this question.

A

A. Business users have business roles.

D. Read and write access can be restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this limitation. Which instance parameter can you configure to allow small group of user to bypass the limitations of multiple logins?

A

B. Login/ multi_login_users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following items are addressed by Configuration Validation? Note: There are 3 correct answer to this question.

A

A. RFC Logins

B. Database Parameters

D. Software Packages

30
Q

Which of the following authorization objects would be required to allow back-end server access to a Web Dynpro application using the SAP Fiori Launchpad?

A

A. S_START

31
Q

Which of the following transaction allows you to define role assignments for 0 Data Services that are available on multiple back-end systems?
Note: There are 2 correct answer to this question.

A

C. /IWFND/MAINT_SERVICE

D. /UI2/GW_MAINT_SRV

32
Q

Which of the following table contains transport request object list and table entry keys? Note: There are 2 correct answer to this question.

A

C. E071

D. E071K

33
Q

SAP Cloud Identity and Access Governance consists of which of the following software services? Note:
There are 3 correct Answers to this question.

A

A. Access Request

B. Role Design

C. Access Analysis

34
Q

Which of the following are prerequisites for using transaction PFCG? Note: There are 2 correct Answers to this question.

A

B. Maintain parameter auth/no_check_in_some_cases = Y

C. Fill in initials values for customer tables using transaction SU25

35
Q

In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the following data sources for storing user data?
Note: There are 3 correct answer to this question.

A

A. ABAP-based sap system

C. LDAP Directory

E. Java system database

36
Q

You are configuring authorizations to secure access to table data using transaction SM31 and you encounter authorization object S_TABU_DIS and field DICBERCLS. How can this field be used to secure access?

A

D. It allows you to specify access to tables associated with a specific authorization group.

37
Q

Which ABAP transaction codes are relevant for SNC Parameter Configuration? Note: There are 2 correct Answers to this question.

A

C. SNCWIZARD

D. SNCCONFIG

38
Q

Which of the following phases in SAP AUDIT MANAGEMENT auditing process? Note: There are 3 correct answer to this question.

A

C. Monitoring Progress

D. Communication Results

E. Engagement Planning

39
Q

The DBMS tab in transaction SU01 allows you to manage database privilege assignments for which of the following scenarios?
Note: There are 2 correct answer to this question.

A

C. When a user needs to run applications that access database directly

D. When users need 1:1 user mapping to map analytical privileges of database to the virtual analysis of authorization on SAP BW

40
Q

A PFCG role can be linked to an SAP Organizational Management structure by which object types? Note:
There are 3 correct answer to this question.

A

A. Job

B. Organizational Unit

C. Position

41
Q

You want to limit an authorization administrator so that they can only assign certain authorizations. Which authorization object should you use?

A

A. S_USER_AGR

42
Q

Which of the following defines “Phishing”?

A

A. Acquiring sensitive information by masquerading as trustworthy entity

43
Q

Which of the following conditions apply when merging authorizations for the same object? Note: There are 2 correct Answers to this question.

A

A. Changed authorizations can be merged with manual authorizations, as long as the activation status is the same.

D. Both the activation status and the maintenance status of the authorizations match.

44
Q

Which of the following are the examples of personal data under the GDPR? Note: There are 3 correct answer to this question.

A

A. GPS data from Cellular phone

B. IP Address

D. Email Address

45
Q

Which of the following allows you to improve the quality of your enterprise data assets with consistent data validation rules, data profiling and metadata management?

A

A. SAP Information Steward

46
Q

Which is the frequency of SAP Patch day?

A

B. Monthly

47
Q

Which of the following describes an Authorization Object class?

A

A. It defines a logical grouping of authorization objects.

48
Q

You are responsible for determining the reason why you need personal data and how this data is processed or stored. What key role do you play under GDPR in relation to personal data?

A

A. Data Controller

49
Q

You want to turn off the SAP menu on Easy Access Menu Screen. What administrative function do you need in Authorization Object S_USER_ADM ?

A

A. SSM_CUST

50
Q

Which of the following are prerequisites for using transaction PFCG? Note: There are 2 correct answer to this question.

A

A. Maintain parameter auth/no_check_in_some_cases = Y

D. Fill Initial values for customer tables using transaction SU25

51
Q

Which archiving object can you use for archiving change documents related to changes with authorizations assigned to user?

A

D. US_AUTH

52
Q

Which of the following are SAPUI5 Fiori application types? Note: There are 2 correct Answers to this question.

A

C. Transactional

D. Analytical

53
Q

What is the purpose of securing sensitive business data? Note: There are 3 correct answer to this question.

A

C. Protection Image

D. Disruption of software deployment

E. Protection of Intellectual property

54
Q

Which of the following actions correctly describes the usage of Back Channel Single Sign-On based on (SAML) 2.0?

A

B. The service provider redirects the user to an identity provider and includes a SAML artifact referring to authentication request.

55
Q

Which of the following transaction allow you to customize or configure SAP Fiori Catalogs and Groups?
Note: There are 2 correct answer to this question.

A

C. /UI2/FLPD_CONF

D. /UI2/FLPD_CUST

56
Q

Which of the transaction allows a user to change the authorization values of multiple roles at same time?

A

B. PFCGMASSVAL

57
Q

Where you can enable Read Access Logging tools?

A

A. SICF

58
Q

Which TADIR Service Object type includes business functional authorization objects used within the OData execution?

A

A. IWSG und IWSV

59
Q

Your company uses derived roles. During maintenance of the Plant Manager imparting role, you add a new transaction to the Menu tab which introduces a new organizational level that will be unique for each of your
150
plants. How will the new organization level be maintained in the derived roles?

A

C. Manually by maintaining each derived role individually

60
Q

What is the equivalent of the AS ABAP user type System in the AS JAVA UME security policy?

A

A. Technical User

61
Q

Which of the following accurately describes the role/profile SAP_NEW? Note: There are 2 correct answer to this question.

A

C. The profile SAP_NEW provides authorizations to all new objects and objects change by release

D. The SAP_NEW must be generated in accordance with the system environment using the report REGENERATE_SAP_NEW

62
Q

Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? Note: There are
2 correct answer to this question.

A

B. Static and Dynamic Application Security Testing

C. Capture of manual and automated check execution

63
Q

Which configuration options apply to the usage of VCLIENT in the parameter icm/server_port_ Note: There are 3 correct Answers to this question.

A

A. VCLIENT=0, which notifies the SSL server that no SSL client verification is needed

D. VCLIENT=1, the server asks the client to transfer a certificate

E. VCLIENT default value is 1

64
Q

Which transaction codes are relevant to enable SNC between ABAP systems? Note: There are 3 correct Answers to this question.

A

A. RZ10

C. STRUST

E. SNC0

65
Q

Which of the following accurately describe a Composite Role? Note: There are 2 correct Answers to this question.

A

A. User assignment is maintained at the Composite Role level.

C. Authorizations are maintained at the single role level.

66
Q

Which of the following checks are performed for SAProuter by the SAP Security Optimization Service?
Note: There are 3 correct Answers to this question.

A

A. Operating System Access Check

B. Secure Network Communication Check

C. SAProuttab Check

67
Q

The report “Search for Application in Role Menu” can be called via which of the following options? Note:
There are 2 correct Answers to this question.

A

A. Transaction SUIM (menu node “Roles”)

C. Transaction RSUSR_ROLE_MENU

68
Q

Which of the following features are provided by the SAP Fiori Launchpad content manager? Note: There are 3 correct Answers to this question.

A

B. Create and configure Catalogs

C. Display the issues with SAP Fiori Launchpad content

E. Display role assignments for Catalogs

69
Q

How can you protect a system when you do not want the user assignments for a role to be transported?

A

B. Restrict import of users in table PRGN_CUST in the target system

70
Q

Which of the following technical capabilities does SAP Code Vulnerability Analysis provide? Note: There are 2 correct Answers to this question.

A

A. Capture of manual and automated check executions

B. Static and Dynamic Application Security Testing

71
Q

Which transaction code allows you to configure the SAP Security Audit Log?

A

D. SM19

72
Q

Which feature is available in the CommonCryptoLib Scenario provided by SAP Security Library?

A

B. Secure Store and Forward(SSF)