Where can you define a mitigating control? (Choose three)
A. In the mitigating controls workset in Access Control
B. In the rule setup in Access Control
C. In the Access Control risk analysis result screen
D. In the central process hierarchy in Process Control
E. In the activity setup in Risk Management
Which connection type do you use for the RFC destination to establish a connection between GRC and an SAP ERP back-end system?
A. Logical connection
B. TCP/IP connection
C. ABAP connection
D. ABAP driver connection
Which reviewers can you select using the Access Control configuration parameter 2006 (Who are the reviewers) for user access review (UAR)? (Choose two)
A. MANAGER
B. ROLE OWNER
C. RISK OWNER
D. SECURITY LEAD
E. APPROVER
You have created an agent rule in BRFplus. Which additional configurations do you have to perform to use this agent rule in a workflow? (Choose two)
A. Define agents and their purposes.
B. Maintain workflow route mappings.
C. Link the rule to the appropriate process ID.
D. Define notification variables.
How are lines and columns linked in a BRFplus initiator decision table?
A. A column to a column through a logical OR
B. A column to a line through a logical OR
C. A column to a column through a logical AND
D. A line to a line through a logical AND
You want to create a connector to an SAP ERP client. You must therefore define the technical parameters for the Remote Function Call (RFC) destination. What does SAP recommend regarding the name of the RFC destination?
A. The RFC destination name must begin with the prefix "GRC".
B. The RFC destination name must be the same as the logical system name.
C. The RFC destination name must include the installation number of the destination system.
D. The RFC destination name must include the IP address of the target destination.
What are Business Configuration (BC) Sets for Access Control? (Choose two)
A. A collection of configuration settings designed to populate SAP tables with content
B. A set of system parameter settings
C. A collection of configuration settings designed to populate custom-defined tables with content
D. A set of predefined Customizing settings
You have updated authorization data for your roles in the target system using PFCG. You now want to synchronize the authorization data in Business Role Management without changing the existing role attributes. How do you accomplish this?
A. Use the Role Import template.
B. Use the Role Mass Update function.
C. Use the Role Mining function.
D. Use the Mass Role Generation function.
Which process steps should you perform when you define a workflow-related MSMP rule? (Choose two)
A. Save a bottom expression.
B. Select a result data object.
C. Select result parameters.
D. Save condition parameters.
Which transaction do you use to access the general Customizing activities for Access Control?
A. MSMP Workflow Configuration (GRFNMW_CONFIGURE)
B. Customizing Edit Project (SPRO)
C. Launchpad Customizing (LPD_CUST)
D. Call View Maintenance (SM30)