Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which optional components can be included when transporting a role definition from the development system to the quality assurance system? Note: There are 3 correct answers to this question.

A.

Direct user assignments

B.

Generated profiles of dependent roles

C.

Generated profiles of single roles

D.

Indirect user assignments

E.

Personalization data

Your developer has created a new custom transaction for your SAP S/4HANA on-premise system and has provided you a list of the authorizations needed to execute the new ABAP program. What must you do to ensure that each required authorization is automatically created every time this new custom transaction is added to a PFCG role?

A.

Maintain each authorization in transaction SU22 and set the Check Indicator value to "Check".

B.

Maintain each authorization object in transaction SU22 and set the Default Status to "Yes".

C.

Maintain each authorization in transaction SU24 and set the Default Status to "Yes".

D.

Maintain each authorization object in transaction SU24 and set the Default Status to "Yes".

After you maintained authorization object S_TABU_DIS and ACTVT field value 02 as authorization defaults for transaction SM30 in your development system, what would be the correct option for transporting only these changes to your quality assurance system?

A.

Save your changes and use the transport interface in SU25 to transport the changes using the Transport Management System.

B.

Save your changes to a Workbench transport request and transport using the Transport Management System.

C.

Save your changes to a Customizing transport request and transport using the Transport Management System.

D.

Save tables USOBT_C and USOBX_C to a transport request and transport using the Transport Management System.

Which solution is NOT used to identify security recommendations for the SAP Security Baseline?

A.

SAP Security Notes

B.

SAP EarlyWatch Alert

C.

SAP Code Vulnerability Analyzer

D.

SAP Security Optimization Service

To connect to data sources that are NOT all based on OData, which of the following options does SAP recommend you use?

A.

OData Provisioning service

B.

SAP Process Integration

C.

Cloud connector

D.

SAP Integration Suite

Which authorization objects can be used to restrict access to SAP Enterprise Search models in the SAP Fiori launchpad? Note: There are 2 correct answers to this question.

A.

S_ESH_ADM

B.

SDDLVIEW

C.

RSDDLTIP

D.

S_ESH_CONN

What must you do if you want to enforce an additional authorization check when a user starts an SAP transaction?

A.

Assign authorization object S_START to the chosen transaction code with transaction SU24 and specify the Program ID and Object Type.

B.

Assign the authorization object to be checked to the chosen transaction code in the SAP Default authorization data using transaction SU22 and set Check Indicator to "Check".

C.

Assign the authorization object and permissions to the chosen transaction code using transaction SE93.

D.

Assign the authorization object to be checked to the chosen transaction code with transaction SU24 and set Default Status to "Yes".

In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization Trace? Note: There are 3 correct answers to this question.

A.

Analyze authorization check results for missing authorizations

B.

Display business roles granting specific access

C.

Adjust role restrictions to account for missing authorizations

D.

Analyze authorization check results for already assigned authorizations

E.

Adjust role restrictions to further limit access when performing forensic analysis

When you maintain authorizations for SAPUI5 Fiori apps, which of the following object types is the front-end authorization object type?

A.

TADIR IWSV - SAP Gateway Business Suite Enablement-Service

B.

TADIR G4BA - SAP Gateway Odata V4 Backend Service Group & Assignments

C.

TADIR IWSG - SAP Gateway: Service Groups Metadata

D.

TADIR INA1 - InA Service

What are some security safeguards categories? Note: There are 3 correct answers to this question.

A.

Access Control

B.

Physical

C.

Organizational

D.

Financial

E.

Technical