Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

C_SECAUTH_20 Sample Questions Answers

Questions 4

The report "Search for Application in Role Menu" can be called via which of the following options? Note: There are 2 correct answer to this question.

Options:

A.

Transaction SUIM (menu node "Roles")

B.

Transaction RSUSR_ROLE_MENU

C.

Transaction RSUSR_START_APPL

D.

Transaction SUIM, (Menu node " Change Documents")

Buy Now
Questions 5

Which of the following table contains transport request object list and table entry keys? Note: There are 2 correct answer to this question.

Options:

A.

E071

B.

E070

C.

E070L

D.

E071K

Buy Now
Questions 6

Which of the following illustrate the simplification of users and role maintenance on SAP Cloud? Note: There are 2 correct answer to this question.

Options:

A.

Business roles are automatically provisioned.

B.

Business users have business roles.

C.

Templates are provided for role derivation.

D.

Read and write access can be restricted.

Buy Now
Questions 7

In SAP NetWeaver AS Java, the User Management Engine (UME) supports which of the following data sources for storing user data?

Note: There are 3 correct answer to this question.

Options:

A.

Java system database

B.

Directory/usr/sap

C.

ABAP-based sap system

D.

UDDI provider

E.

LDAP Directory

Buy Now
Questions 8

The DBMS tab in transaction SU01 allows you to manage database privilege assignments for which of the following scenarios?

Note: There are 2 correct answer to this question.

Options:

A.

When users need to use reporting authorizations on SAP BW

B.

When a user needs to run applications that access database directly

C.

When users need 1:1 user mapping to map analytical privileges of database to the virtual analysis of authorization on SAP BW

D.

When a user needs to execute CDS Views

Buy Now
Questions 9

Which of the following items are addressed by Configuration Validation? Note: There are 3 correct answer to this question.

Options:

A.

Database Parameters

B.

Critical Roles

C.

Failed Transport

D.

Software Packages

E.

RFC Logins

Buy Now
Questions 10

Which of the following parameter must be configured to capture log data in the Security Audit log?

Options:

A.

rec/client

B.

rsau/enable

C.

rdisp/TRACE

D.

dirjogging

Buy Now
Questions 11

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this

limitation. Which instance parameter can you configure to allow small group of user to bypass the limitations of multiple logins?

Options:

A.

login/disable_multi_rfc_login

B.

login/disable_multi_gui_lgoin

C.

Login/server_logon_restriction

D.

Login/ multi_login_users

Buy Now
Questions 12

Which TADIR Service Object type includes business functional authorization objects used within the OData execution?

Options:

A.

IWSG

B.

IWSC

C.

OSOD

D.

IWSV

Buy Now
Status:
Expired
Exam Code: C_SECAUTH_20
Exam Name: SAP Certified Technology Associate - SAP System Security and Authorizations
Last Update: Mar 25, 2024
Questions: 80
$72  $159.99
$54  $119.99
$45  $99.99
buy now C_SECAUTH_20