What are the 2 required steps necessary for operating the profile generator?
A. Profile parameter auth/no_check_in_some_cases has the value Y
B. The default tables USOBX_C and USOBT_C are filled
C. The default tables UQWFX_C and UKDBT_C are filled
How can you protect the target system with an import lock in order to avoid transporting the user assignments to roles?
A. PRGN_CUST
B. USER_REL_IMPORT:=NO.
C. USER_REL_IMPORT:=YES.
What are the different types of Organization plans objects?
A. Organizational Unit
B. Position
C. Job
D. Task
E. Work
The security policies are created by the security team in isolation from the business team. Determine whether this statement is true or false.
A. True
B. False
What are the 5 majors authorisation objects used to protect which transaction codes a user can access and for which product are they meant to be?
A. S_TCODE
B. Q_TCODE
C. I_TCODE
D. E_TCODE
Which authorization object is provided to create and maintain users and assignments in a decentralized fashion with user groups?
A. S_USER_GRP
B. S_CHANGE_GRP
C. S_CHATLOG_GRP
D. S_PROFESSION_GRP
Which transaction lists each RFC destination and the user involved?
A. RSRFCCHK
B. object S_RFC
Which profile parameter set the time for automatic SAPGUI logout?
A. rdisp/gui_auto_Signin
B. rdisp/gui_auto_logout
What is an ITS service?
A. Multiple ITS instances connect to single systems
B. An ITS service is the set of components needed to call an SAP transaction via the ITS
Which table Specifies which systems are allowed to connect to the SAP system using SNC?
A. SNCSYSACL
B. SNDFKEERL
C. SLOKUHTDL