πŸ§ͺ SAP GRC MCQ Quiz Hub

SAP Security Multiple choice Questions

Choose a topic to test your knowledge and improve your SAP GRC skills

Which of the following SAP tables can help in determining the single roles which are assigned to a given composite role?





βœ… Correct Answer: 3

A new single role is created and only one custom transaction code Z123 is added to the role menu. How many authorization objects should be available in the authorization data when a user goes to generate the role?





βœ… Correct Answer: 3

Which of the following actions are not present in user action field for authorization object S_PROGRAM?





βœ… Correct Answer: 3

What reports/programs can be used to regenerate SAP_ALL profile?





βœ… Correct Answer: 3

Old Security audit logs can be deleted using tcode:





βœ… Correct Answer: 4

Transaction code text can be displayed using table:





βœ… Correct Answer: 1

Default password for SAP standard user SAP* is :





βœ… Correct Answer: 2

RFC ABAP Type 3 is created between two systems using transaction code SM59. During RFC call, what authorization object will be checked in the source system?





βœ… Correct Answer: 3

Which of the following is false?





βœ… Correct Answer: 3

As per the options given below, please select the one which is checked second when a user executes a transaction code? |





βœ… Correct Answer: 2

The user buffer can be displayed using transaction code:





βœ… Correct Answer: 2

A role contains several profiles. Which of the following tables can fetch that list?





βœ… Correct Answer: 2

The AS ABAP categorizes users into several types for different purposes. Which of the following are NOT valid user types in AS ABAP.





βœ… Correct Answer: 3

Security Java security roles on the AS Java can be defined either globally or locally. Which of the following are globally defined security roles in AS Java?





βœ… Correct Answer: 4

The As ABAP communicates with its communication partners using various protocols. Each of these protocols use a specific security mechanism. which of the following protocols are matched up correctly with the security mechanism?





βœ… Correct Answer: 4

With reference to the LDAP directory, and the UME, which of the following are true?





βœ… Correct Answer: 1

You have a mixed system landscape including both SAP and non-SAP systems, or you have an existing corporate LDAP directory in your system landscape. User management data is stored in a combination of an LDAP server and a database. Which of the following data is written to and read from the IDAP server?





βœ… Correct Answer: 3

The User Management Engine (UME) allows you to define a security policy, with reference to this, which of the following statements are true?





βœ… Correct Answer: 2

What are the best practices for establishing a connection type Establishing Trust for Server-Sideauthentication?





βœ… Correct Answer: 4