Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! P_TSEC10_75 has been withdrawn.

P_TSEC10_75 Practice Exam Questions with Answers SAP Certified Technology Professional - System Security Architect Certification

Question # 6

Which authorization object is needed to execute external commands?

A.

Sapxpg

B.

S_RZL_ADM

C.

S_LOG_COM

Full Access
Question # 7

The Audit Information System is intended for external audits only.

A.

True

B.

False

Full Access
Question # 8

Derived roles: Can the inherited roles be changed?

A.

True

B.

False

Full Access
Question # 9

Which profile contains authorization for all new checks in existing transaction?

A.

SAP_NEW

B.

SAP_ OLD

C.

SAP_ ADVANCED

D.

SAP_ PREVIOUS

Full Access
Question # 10

What are the 4 status texts about authorizations maintenance?

A.

Standard

B.

Maintained

C.

Changed

D.

Manual

E.

Double

Full Access
Question # 11

Which table Specifies which systems are allowed to connect to the SAP system using SNC?

A.

SNCSYSACL

B.

SNDFKEERL

C.

SLOKUHTDL

Full Access
Question # 12

Which SAP product transforms the traditional SAP applications to Web-based transactions, so that they are accessible using Internet technology?

A.

RFC, Remote function call

B.

The ITS, Internet Transaction Server

C.

The SAP Web-GUI

Full Access
Question # 13

Which transaction lists each RFC destination and the user involved?

A.

RSRFCCHK

B.

object S_RFC

Full Access
Question # 14

Which are the two different maintenance views of the profile generator PFCG?

A.

Basic maintenance

B.

Complete view

C.

Design user menus

D.

Maintain authorization data

Full Access
Question # 15

Which transaction show which authorizations are currently in the user buffer?

A.

SU56

B.

SU45

C.

SU34

D.

SU76

Full Access
Question # 16

What are the 4 check indicators?

A.

CM = Check/Maintain

B.

C = Check

C.

N = No Check

D.

U = Unmaintained.

E.

C= Uuregistered

Full Access
Question # 17

Which authorization object is checked when a user invokes a RFC?

A.

RSRFCCHK

B.

object S_RFC

Full Access
Question # 18

For what is the Audit Information System (AIS) a checking tool?

A.

External auditing

B.

Internal auditing

C.

System checks

D.

Data protection

E.

Ultra data prodection

Full Access
Question # 19

Which kind of attack makes the server unavailable?

There are several ways to do this, such as snap the network cable, physically destroy the server, or unplug it from the network.

A.

A denial of data

B.

A denial of service

Full Access
Question # 20

Which special user is responsible for maintaining the ABAP Dictionary and the software logistics in the client 000?

A.

DDIC

B.

Early Watch

C.

SUPPORT

D.

S_TCODE

Full Access
Question # 21

Which protocol is used between SAP Servers?

A.

RFC, Remote function call

B.

The ITS, Internet Transaction Server

C.

The SAP Web-GUI

Full Access
Question # 22

What are the 4 types of RFC connections?

A.

Synchronous RFC

B.

Asynchronous RFC

C.

Dsshsdbcvdsa RFC

Full Access
Question # 23

Authorization that defines the authorization object name and the authorization name for which an administrator has authorization and the activities that are allowed ?

A.

S_USER_GRP

B.

S_USER_AUTH

C.

S_USER_PRO

D.

S_USER_AGR

E.

S_USER_TCD

Full Access
Question # 24

Which profile parameter set the time for automatic SAPGUI logout?

A.

rdisp/gui_auto_Signin

B.

rdisp/gui_auto_logout

Full Access
Question # 25

Which authorization object protects the standard list download?

A.

S_GUI

B.

S_DFG

C.

S_GUT

Full Access
Question # 26

Which SAP Standard role allow you to set-up the AIS?

A.

SAP_AUDITOR_ADMIN

B.

SAP_EDITOR_ADMIN

Full Access
Question # 27

Which of the following are security advantages to a three-tier landscape?

A.

Ensure changes occur only on development system.

B.

Ensure changes occur only on your production system.

C.

Developers do not have access to production data.

D.

You control when changes are moved into production.

E.

You can test changes in a QA system

Full Access
Question # 28

ITS, scalability and load balancing, what are the 6 possible landscape?

A.

Single Wgates connects to multiple Agates

B.

Separate WGates connects to single Agate

C.

Multiple WGates connects to multiple Agates

D.

ITS connects to single Application server

E.

Using groups at the creation dolmen level

F.

Multiple ITS instances connect to single systems

G.

ITS connects to message server (Load balancing)

Full Access
Question # 29

After a transport of the user master record. Should a comparison occur?

A.

YES

B.

NO

Full Access
Question # 30

How can you deactivate the special properties of SAP*?

A.

set the system profile parameter

B.

login/no_automatic_user_sapstar to a value greater than zero

C.

set the new profile parameter

Full Access
Question # 31

Which safeguards answers to the threat of Tampering (denial, message alteration)?

A.

the SAP Passport

B.

Digital signature

Full Access
Question # 32

What is the default password of the special user Early Watch?

A.

SUPPORT

B.

Maintain

Full Access
Question # 33

Which authorization component can be transported?

A.

User master records

B.

Roles

C.

Authorization profiles

D.

Check indicators

E.

components

Full Access
Question # 34

How can you protect the target system with an import lock in order to avoid transporting the user assignments to roles?

A.

PRGN_CUST

B.

USER_REL_IMPORT:=NO.

C.

USER_REL_IMPORT:=YES.

Full Access
Question # 35

Profile parameter: If this parameter is set to value

1, the system blocks multiple SAP dialog logons (in the same client and with the same user name)

A.

login/fails_to_session_end

B.

login/disable_multi_gui_login

C.

login/min_password_lng

D.

Login/fails_to_user_lock

Full Access
Question # 36

Which transactions maintain the custom tables USOBX_C and USOBX_T?

A.

RZ11

B.

USOBX_C

C.

USOBT_C

D.

USOBX

E.

SU24

Full Access
Question # 37

What is the goal of SNC in an ITS environment?

A.

Authentication between the components

B.

Integrity protection

C.

Privacy protection

D.

Using groups at the creation dolmen level

Full Access
Question # 38

How to ensure that the indirectly called transaction with the ABAP statement CALL_TRANSACTION is subject to an authorization check?

A.

SE97

B.

TCDCOUPLES

C.

SE96

D.

SE95

Full Access