During maintenance of a role you notice that the status text for an authorization object indicates status "Changed New". What does this status text mean?
A. The authorization object has been flagged as a critical object.
B. The authorization object must be maintained again.
C. The authorization object was used to create a new authorization because the initial configuration of the role changed a default value maintained in SU24.
D. The authorization object was used to create a new authorization because the values contained in SU24 differ from the SAP Standard contained in SU25.
Which of the following objects allows you to restrict which users can distribute a role to another system using an RFC destination?
A. S_USER_AGR
B. S_USER_SYS
C. S_USER_STA
D. S_USER_AUT
Which of the following transactions allow you to define role assignments for OData Services that are available on multiple back-end systems? (Choose two.)
A. /IWFND/MAINT_SERVICE
B. /UI2/GW_MAINT_SRV
C. /IWFND/GW_SYS_ALIAS
D. /IWFND/GW_CLIENT
When building a PFCG role for SAP Fiori access on an embedded front-end server configuration, which of the following items should be provided? (Choose three.)
A. UI access to the Apps
B. SAP Favorites
C. Start Authorizations for OData services
D. Catalog for the Start Authorization
E. WAPA Business Server Pages
Which of the following app-specific types of entities do users need to use SAP Fiori apps? (Choose two.)
A. Authorizations
B. Master Data
C. UI
D. Parameters
Which is the frequency of SAP Patch day?
A. Yearly
B. Quarterly
C. Weekly
D. Monthly
Where can you enable the Read Access Logging tools?
A. SWI5
B. SUIM
C. SPRO
D. SICF
Which of the following actions correctly describes the usage of Front Channel Single Sign-On based on (SAML) 2.0?
A. The service provider queries the user for authentication credentials.
B. The identity provider queries the user for authentication credentials.
C. The identity provider returns the user to the service providers with an authentication request.
D. The identity provider presents the requested resource to the user.
Which of the following are core principles of GDPR? (Choose three.)
A. Data Archiving
B. Lawfulnaess, Fairness and Transparency
C. Storage Limitations
D. Data Quality
E. Data Minimization
Which of the following functionalities are supported by SAP Information Lifecycle Management (ILM)? (Choose three.)
A. Data Destruction
B. Data Archiving
C. Data Retention
D. Data Logging
E. Alert Notification