Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

P_SECAUTH_21 Sample Questions Answers

Questions 4

Which of the objects do you assign to an SAP Fiori tile to make it visible in the SAP Fiori Launchpad? Note: There are 2 correct answers to this question.

Options:

A.

Group

B.

Role

C.

User

D.

Catalog

Buy Now
Questions 5

You have Reason Codes already defined. Which is the correct sequence of steps to configure a Firefighter ID in Emergency Access Management?

Options:

A.

Maintain a Firefighter ID for Controllers and Firefighters

Maintain an Owner for a Firefighter ID

Maintain Access Control Owner

B.

Maintain an Owner for a Firefighter ID

Maintain a Firefighter ID for Controllers and Firefighters

Maintain Access Control Owner

C.

Maintain an Owner for a Firefighter ID

Maintain a Firefighter ID for Controllers and Firefighters

Maintain Access Control Owner

D.

Maintain an Owner for a Firefighter ID

Maintain a Firefighter ID for Controllers and Firefighters

Maintain Access Control Owner

Buy Now
Questions 6

Which Object ID is used to integrate Business Rule Framework (BRF+) to Multi Step Multi Process (MSMP) initiator workflow?

Options:

A.

Function ID

B.

Application ID

C.

Process ID

D.

Expression ID

Buy Now
Questions 7

What are the key capabilities of Enterprise Threat Detection? Note: There are 2 correct answers to this question

Options:

A.

Blocking user access

B.

Predictive threat notification

C.

Dashboard-based analysis for security risks

D.

Real time capture of abnormal user activities

Buy Now
Questions 8

Which of the following events will create security alerts in the CCMS Alert Monitor of SAP Solution Manager? Note: There are 2 correct answers to this question.

Options:

A.

Manual table changes

B.

Changes to the instance profile

C.

Call of RFC functions

D.

Start of reports

Buy Now
Questions 9

What are characteristics only valid for the MDC high isolation mode?

Options:

A.

Every tenant has its own set of OS users

B.

All internal database communication is secured using SNC

C.

Every tenant has its own set of database users

D.

Every tenant has its own set of database users belonging to the same sapsys group

Buy Now
Questions 10

Which features do SAP HANA SQL-based analytic privileges offer compared to classic XML-based ones? Note: there are 2 correct answers to this question.

Options:

A.

Control of read-only SAP HANA procedures

B.

Transportable

C.

Complex filtering

D.

Control of read-only access to SQL views

Buy Now
Questions 11

Which authorization object controls access to the trusting system between the managed system and SAP Solution Manager?

Options:

A.

S_RFCACL

B.

S_RFC

C.

S_SERVICE

D.

S_ ICM

Buy Now
Questions 12

Which tools can you use to troubleshoot an authorization issue with a Fiori application? Note: There are 2 correct answers to this question

Options:

A.

/UI2/FLC

B.

/UI2/GW_APPS_LOG

C.

/IWFND/ERROR_LOG

D.

/IWBEP/ERROR_LOG

Buy Now
Questions 13

What is the purpose of the parameter rec/client in an AS ABAP based SAP system?

Options:

A.

To log changes in Core Data Services views

B.

To log changes in tables

C.

To generate changes in documents

D.

To generate source code versions

Buy Now
Questions 14

You have configured a Gateway SSO authentication using X.509 client certificates. The configuration of the dual trust relationship between client (browser) and SAP Web Dispatcher as well as the configuration of the SAP Web Dispatcher to accept and forward client certificates were done. Users complain that they can't log in to the back-end system. How can you check the cause?

Options:

A.

Run back-end transaction SMICM and open the trace file

B.

Run back-end system trace using ST12

C.

Run gateway transaction /IWFND/TRACES

D.

Run gateway transaction /IWFND/ ERRORJ.OG

Buy Now
Questions 15

For which reasons would you choose an "anonymous SSL Client PSE" setup? Note: There are 2 correct answers to this question

Options:

A.

To perform mutual authentication

B.

To use data encryption

C.

To use as a container for the CAs

D.

To perform authentication

Buy Now
Questions 16

You have delimited a single role which is part of a composite role, and a user comparison for the composite role has been performed. You notice that the comparison did NOT remove the profile assignments for that single role. What program would you run to resolve this situation?

Options:

A.

0 PRGN_COMPRESS_TIMES

B.

0PRGN_COMPARE_ROLE_MENU

C.

0 PRGN_DELETE_ACT IVITY_GROUPS

D.

0 PRGN_MERGE_PREVIEW

Buy Now
Questions 17

How is the role concept applied for modeled authorizations based on Core Data Services (CDS) views?

Options:

A.

CDS roles are defined for the CDS views and implicitly applied to each user

B.

CDS roles are mapped to the CDS view in the access rules

C.

CDS roles are defined in the WHERE clause when calling a CDS view in Open SQL

D.

CDS roles are defined for CDS views in Object Navigator

Buy Now
Questions 18

How can you protect a table containing sensitive data using the authorization object S_TABU_DIS?

Options:

A.

The tables containing sensitive data must be associated with table groups in table TBRG.

B.

The field DICBERCLS of the authorization object must enumerate all table names of the tables containing sensitive data.

C.

Authorization table groups containing tables with sensitive data must be defined in table TDDAT and these must be omitted for all employees who do not need access to these tables

D.

The tables containing sensitive data must be named using the authorization object S_TA BU_NAM for all responsible administrator employees. The fields DICBERCLS of the object S_TABU_DIS can then be filled with *.

Buy Now
Questions 19

While performing an audit of changes to the system and client change options for your production SAP S/4HANA environment, you receive the following message in transaction SCC4. "No logs found for selected period" How can you correct the problem.

Options:

A.

Maintain parameter rec/client with value ALL

B.

Maintain parameter rdisp/TRACE with value 3

C.

Maintain parameter rsau/enable with value 1

D.

Maintain parameter log-mode with value normal SAP HANA

Buy Now
Questions 20

What are the requirements of SPNego SSO configuration in an SAP Fiori front-end system? Note: There are 2 correct answers to this question.

Options:

A.

The system requires an identity provider as an issuing system to enable single sign-on with SPNego in an internet-facing deployment scenario.

B.

The system's users in the ABAP system must have the same user names as the database users in SAP HANA

C.

The system should typically be located within the corporate network.

D.

The system requires Microsoft Active Directory infrastructure in place.

Buy Now
Status:
Expired
Exam Code: P_SECAUTH_21
Exam Name: SAP Certified Technology Professional - System Security Architect
Last Update: Mar 26, 2024
Questions: 80
$64  $159.99
$48  $119.99
$40  $99.99
buy now P_SECAUTH_21