Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following services does the Identity Authentication Service provide? Note: There are 2correct answers to this question.

A.

Authentication

B.

Single Sign-On

C.

Central User Repository

D.

Policy refinement

Full Access
Question # 5

Which levels of security protection are provided by Secure Network Communication (SNC)? Note: There are 3correct answers to this question.

A.

Authentication

B.

Integrity

C.

Availability

D.

Privacy

E.

Authorization

Full Access
Question # 6

In SAP HANA Cloud, what can you configure in user groups? Note: There are 2correct answers to this question.

A.

Password policy settings

B.

Client connect restrictions

C.

Identity providers

D.

Authorization privileges

Full Access
Question # 7

In which order do you define the security-relevant objects in SAP BTP?

A.

Role collection

B.

Role template

C.

Role3

Full Access
Question # 8

To connect to data sources that are NOT all based on OData, which of the following options does SAP recommend you use?

A.

SAP Process Integration

B.

SAP Integration Suite

C.

Cloud connector

D.

OData Provisioning service

Full Access
Question # 9

An authorization based on what object is required for trusted system access to an SAP Fiori back-end server?

A.

S_RFC

B.

S_RFCACL

C.

S_SERVICE

D.

S_START

Full Access
Question # 10

When you maintain authorizations for SAPUI5 Fiori apps, which of the following object types is the front-end authorization object type?

A.

TADIR G4BA-SAP Gateway Odata V4 Backend Service Group & Assignments

B.

TADIR IWSV - SAP Gateway Business Suite Enablement-Service

C.

TADIR IWSG - SAP Gateway: Service Groups Metadata

D.

TADIR INA1 InA Service

Full Access
Question # 11

Which of the following rules does SAP recommend you consider when you define a role-naming convention for an SAP S/4HANA on-premise system?Note: There are 3correct answers to this question.

A.

Role names must NOT start with "SAP"

B.

Role names are system language-independent

C.

Role names can be no longer than 20 characters

D.

Role names are system language-dependent

E.

Role names can be no longer than 30 characters

Full Access
Question # 12

What must you do before you can use transaction PFCG? Note: There are 2correct answers to this question.

A.

Fill tables USOBT and USOBX with the SAP-delivered authorization default values.

B.

Set the system profile parameter auth/no_check_in_some_cases to Y.

C.

Fill tables USOBT_C and USOBX_C with the SAP-delivered authorization default values.

D.

Set the system profile parameter auth/no_check_in_some_cases to N.

Full Access
Question # 13

After you maintained authorization object S_TABU_DIS and ACTVT field value 02 as authorization defaults for transaction SM30 in your development system, what would be the correct option for transporting only these changes to your quality assurance system?

A.

Save your changes to a Workbench transport request and transport using the Transport Management System.

B.

Save your changes to a Customizing transport request and transport using the Transport Management System.

C.

Save tables USOBT_C and USOBX_C to a transport request and transport using the Transport Management System.

D.

Save your changes and use the transport interface in SU25 to transport the changes using the Transport Management System.

Full Access
Question # 14

In SAP S/4HANA Cloud Public Edition, what can you do with the Display Authorization Trace? Note: There are 3correct answers to this question.

A.

Display business roles granting specific access

B.

Adjust role restrictions to further limit access when performing forensic analysis

C.

Analyze authorization check results for missing authorizations

D.

Adjust role restrictions to account for missing authorizations

E.

Analyze authorization check results for already assigned authorizations

Full Access
Question # 15

What authorization object can be used to restrict which users a security administrator is authorized to maintain?

A.

S_USER_GRD

B.

S_USER_AUTO

C.

S_USER_SASO

D.

S_USER_GRP

Full Access
Question # 16

In the administration console of the Cloud Identity Services, for which system type can you define both read and write transformations?

A.

Source systems

B.

Target systems

C.

Proxy systems

Full Access
Question # 17

When segregating the duties for user and role maintenance, which of the following should be part of a decentralized treble control strategy for a production system? Note: There are 3correct answers to this question.

A.

One authorization data administrator

B.

One user administrator per production system

C.

One authorization profile administrator

D.

One user administrator per application area in the production system

E.

One decentralized role administrator

Full Access
Question # 18

Which of the following user types are excluded from some general password-related rules, such as password validity or initial password? Note: There are 2correct answers to this question.

A.

Dialog

B.

System

C.

Communication

D.

Service

Full Access
Question # 19

Which access categories are available to maintain restrictions in SAP S/4HANA Cloud Public Edition? Note: There are 3correct answers to this question.

A.

Read (read access)

B.

Write, Read (write access)

C.

Read, Value Help (read access)

D.

Value Help (value help access)

E.

Write, Read, Value Help (write access)

Full Access
Question # 20

Which of the following is part of the SAP S/4HANA central UI component?

A.

SAP Fiori launchpad

B.

SAP Fiori object page

C.

SAP Fiori analytical application

D.

SAP Fiori transactional application

Full Access
Question # 21

Which authorization objects can be used to restrict access to SAP Enterprise Search models in the SAP Fiori launchpad? Note: There are 2correct answers to this question.

A.

S_ESH_CONN

B.

SDDLVIEW

C.

S_ESH_ADM

D.

RSDDLTIP

Full Access
Question # 22

How does Rapid Activation support customers during the SAP S/4HANA on-premise implementation process? Note: There are 3correct answers to this question.

A.

By helping customers to start exploring SAP Fiori in SAP S/4HANA on premises as quickly as possible.

B.

By supporting content activation at the business role level, including SAP Fiori apps and all associated Web Dynpro for ABAP applications.

C.

By allowing customers to select individual SAP Fiori apps for their end-to-end business processes.

D.

By allowing customers to select and activate SAP Fiori apps one by one, independent of dependencies needed for app-to-app navigation.

E.

By reducing the SAP Fiori activation effort during the Explore phase of SAP Activate.

Full Access
Question # 23

Following an upgrade of your SAP S/4HANA on-premise system to a higher release, you perform a Modification Comparison using SU25.

What does this comparison do?

A.

It compares your changes to the SAP defaults in USOBX and USOBT with the new SAP defaults in the current release and allows you to make adjustments.

B.

It compares the Role Maintenance data from the current release with the data for the previous release and allows you to adjust any custom default values in tables USOBX and USOBT.

C.

It compares the Role Maintenance data from the previous release with the data for thecurrent release and writes any new default values in tables USOBX_C and USOBT_C.

D.

It compares your changes to the SAP defaults in USOBX_C and USOBT_C with the new SAP defaults in the current release and allows you to make adjustments.

Full Access
Question # 24

In SAP HANA Cloud, who has access to a database object?

A.

The user DBADMIN and the group owner

B.

The user SYSTEM and the creator

C.

The owner and the SAP-owned users

D.

The creator and the schema owner

Full Access