New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! P_TSEC10_75 has been withdrawn.

Practice Free P_TSEC10_75 SAP Certified Technology Professional - System Security Architect Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the SAP P_TSEC10_75 Exam the most current and reliable questions . To help people study, we've made some of our SAP Certified Technology Professional - System Security Architect exam materials available for free to everyone. You can take the Free P_TSEC10_75 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Which authorization object is needed to execute external commands?

A.

Sapxpg

B.

S_RZL_ADM

C.

S_LOG_COM

Question # 7

The Audit Information System is intended for external audits only.

A.

True

B.

False

Question # 8

Derived roles: Can the inherited roles be changed?

A.

True

B.

False

Question # 9

Which profile contains authorization for all new checks in existing transaction?

A.

SAP_NEW

B.

SAP_ OLD

C.

SAP_ ADVANCED

D.

SAP_ PREVIOUS

Question # 10

What are the 4 status texts about authorizations maintenance?

A.

Standard

B.

Maintained

C.

Changed

D.

Manual

E.

Double

Question # 11

Which table Specifies which systems are allowed to connect to the SAP system using SNC?

A.

SNCSYSACL

B.

SNDFKEERL

C.

SLOKUHTDL

Question # 12

Which SAP product transforms the traditional SAP applications to Web-based transactions, so that they are accessible using Internet technology?

A.

RFC, Remote function call

B.

The ITS, Internet Transaction Server

C.

The SAP Web-GUI

Question # 13

Which transaction lists each RFC destination and the user involved?

A.

RSRFCCHK

B.

object S_RFC

Question # 14

Which are the two different maintenance views of the profile generator PFCG?

A.

Basic maintenance

B.

Complete view

C.

Design user menus

D.

Maintain authorization data

Question # 15

Which transaction show which authorizations are currently in the user buffer?

A.

SU56

B.

SU45

C.

SU34

D.

SU76

Question # 16

What are the 4 check indicators?

A.

CM = Check/Maintain

B.

C = Check

C.

N = No Check

D.

U = Unmaintained.

E.

C= Uuregistered

Question # 17

Which authorization object is checked when a user invokes a RFC?

A.

RSRFCCHK

B.

object S_RFC

Question # 18

For what is the Audit Information System (AIS) a checking tool?

A.

External auditing

B.

Internal auditing

C.

System checks

D.

Data protection

E.

Ultra data prodection

Question # 19

Which kind of attack makes the server unavailable?

There are several ways to do this, such as snap the network cable, physically destroy the server, or unplug it from the network.

A.

A denial of data

B.

A denial of service

Question # 20

Which special user is responsible for maintaining the ABAP Dictionary and the software logistics in the client 000?

A.

DDIC

B.

Early Watch

C.

SUPPORT

D.

S_TCODE

Question # 21

Which protocol is used between SAP Servers?

A.

RFC, Remote function call

B.

The ITS, Internet Transaction Server

C.

The SAP Web-GUI

Question # 22

What are the 4 types of RFC connections?

A.

Synchronous RFC

B.

Asynchronous RFC

C.

Dsshsdbcvdsa RFC

Question # 23

Authorization that defines the authorization object name and the authorization name for which an administrator has authorization and the activities that are allowed ?

A.

S_USER_GRP

B.

S_USER_AUTH

C.

S_USER_PRO

D.

S_USER_AGR

E.

S_USER_TCD

Question # 24

Which profile parameter set the time for automatic SAPGUI logout?

A.

rdisp/gui_auto_Signin

B.

rdisp/gui_auto_logout

Question # 25

Which authorization object protects the standard list download?

A.

S_GUI

B.

S_DFG

C.

S_GUT

Question # 26

Which SAP Standard role allow you to set-up the AIS?

A.

SAP_AUDITOR_ADMIN

B.

SAP_EDITOR_ADMIN

Question # 27

Which of the following are security advantages to a three-tier landscape?

A.

Ensure changes occur only on development system.

B.

Ensure changes occur only on your production system.

C.

Developers do not have access to production data.

D.

You control when changes are moved into production.

E.

You can test changes in a QA system

Question # 28

ITS, scalability and load balancing, what are the 6 possible landscape?

A.

Single Wgates connects to multiple Agates

B.

Separate WGates connects to single Agate

C.

Multiple WGates connects to multiple Agates

D.

ITS connects to single Application server

E.

Using groups at the creation dolmen level

F.

Multiple ITS instances connect to single systems

G.

ITS connects to message server (Load balancing)

Question # 29

After a transport of the user master record. Should a comparison occur?

A.

YES

B.

NO

Question # 30

How can you deactivate the special properties of SAP*?

A.

set the system profile parameter

B.

login/no_automatic_user_sapstar to a value greater than zero

C.

set the new profile parameter

Question # 31

Which safeguards answers to the threat of Tampering (denial, message alteration)?

A.

the SAP Passport

B.

Digital signature

Question # 32

What is the default password of the special user Early Watch?

A.

SUPPORT

B.

Maintain

Question # 33

Which authorization component can be transported?

A.

User master records

B.

Roles

C.

Authorization profiles

D.

Check indicators

E.

components

Question # 34

How can you protect the target system with an import lock in order to avoid transporting the user assignments to roles?

A.

PRGN_CUST

B.

USER_REL_IMPORT:=NO.

C.

USER_REL_IMPORT:=YES.

Question # 35

Profile parameter: If this parameter is set to value

1, the system blocks multiple SAP dialog logons (in the same client and with the same user name)

A.

login/fails_to_session_end

B.

login/disable_multi_gui_login

C.

login/min_password_lng

D.

Login/fails_to_user_lock

Question # 36

Which transactions maintain the custom tables USOBX_C and USOBX_T?

A.

RZ11

B.

USOBX_C

C.

USOBT_C

D.

USOBX

E.

SU24

Question # 37

What is the goal of SNC in an ITS environment?

A.

Authentication between the components

B.

Integrity protection

C.

Privacy protection

D.

Using groups at the creation dolmen level

Question # 38

How to ensure that the indirectly called transaction with the ABAP statement CALL_TRANSACTION is subject to an authorization check?

A.

SE97

B.

TCDCOUPLES

C.

SE96

D.

SE95