Which of the following rules does SAP recommend you consider when you define a role-naming convention for an SAP S/4HANA on-premise system? Note: There are 3 correct answers to this question.
If you want to evaluate catalog menu entries and authorization default values of IWSG and IWSV applications, which SUIM reports would you use? Note: There are 2 correct answers to this question.
Under which of the following conditions can you merge authorizations for the same object during role maintenance? Note: There are 2 correct answers to this question.
Your developer has created a new custom transaction for your SAP S/4HANA on-premise system and has provided you a list of the authorizations needed to execute the new ABAP program. What must you do to ensure that each required authorization is automatically created every time this new custom transaction is added to a PFCG role?
Which access categories are available to maintain restrictions in SAP S/4HANA Cloud Public Edition? Note: There are 3 correct answers to this question.
Which solution is NOT used to identify security recommendations for the SAP Security Baseline?
When performing a comparison from the imparting role, what happens to organizational level field values in the derived role? Note: There are 2 correct answers to this question.
In the administration console of the Cloud Identity Services, which system property types can you add? Note: There are 2 correct answers to this question.
Which cryptographic libraries are provided by SAP? Note: There are 2 correct answers to this question.
When planning an authorization concept for your SAP S/4HANA Cloud Public Edition implementation, what rules must you consider? Note: There are 2 correct answers to this question.
Which of the following user types are excluded from some general password-related rules, such as password validity or initial password? Note: There are 2 correct answers to this question.
When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3 correct answers to this question.
Which archiving objects are relevant for archiving change documents for user master records? Note: There are 2 correct answers to this question.
Which entities share data with Business Partners in the S/4HANA Business User Concept? Note: There are 2 correct answers to this question.
Where can you find SAP Fiori tiles and target mappings according to segregation of duty?
What does a status text value of "Old" mean during the maintenance of authorizations for an existing role?
In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization Trace? Note: There are 3 correct answers to this question.
Which SU01 user types are NOT enabled for interaction? Note: There are 2 correct answers to this question.
After you maintained authorization object S_TABU_DIS and ACTVT field value 02 as authorization defaults for transaction SM30 in your development system, what would be the correct option for transporting only these changes to your quality assurance system?
When you maintain authorizations for SAPUI5 Fiori apps, which of the following object types is the front-end authorization object type?
Which levels of security protection are provided by Secure Network Communication (SNC)? Note: There are 3 correct answers to this question.