Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question
What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note: There are 2 correct answers to this question
What are the features of the Audit Information System (AIS)? Note: There are 2 correct answers to this question.
A system user created a User1 and a schema on the HANA database with some data. User2 is developing modelling views and requires access to objects in User1's schema. What needs to be done?
What authorization object is checked when a user selects an A BAP Web Dynpro application to execute?
A security consultant has activated a trace via ST01 and is analyzing the authorization error with Return Code 12. What does the Return Code 12 signify?
Who can revoke a runtime role from a user in the SAP HANA tenant database? Note: There are 2 correct answers to this question. Note: there are 2 correct answers to this question.
You want to check the custom ABAP codes in your system for security vulnerabilities and you want to use the Code Vulnerability Analyzer (CVA) for carrying out these extended security checks. What needs to be done for this purpose? Note: There are 2 correct answers to this question.
Why should you create multiple dispatchers in SAP Identity Management? Note: There are 2 correct answers to this question.
How does the SAP SSO wizard (transaction SNCWIZARD) simplify the SNC configuration process?
Which type of systems can be found in the Identify Provisioning Service landscape? Note: There are 2 correct answers to this question
You want to allow your trainee colleagues to use the SAP GUI to connect directly to your SAP S/4HANA (on-premise) demo system form a public internet connection
Which of the following SAP solutions is suited for this purpose?
How can you describe the hierarchical relationships between technical entities in the Cloud Foundry?
To enable access between tenant databases, what do you need to do in an SAP HANA system for multitenant database containers? Note: there are 3 correct answers to this question.
SAP GRC Access Control provides risk analysis for which of the following? Note: There are 2 correct answers to this question.