<< Prev Question Next Question >>

Question 5/84

What activities can be assigned to the authorization object S_PROGRAMM?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (84q)
Question 1: What is the goal of SNC in an ITS environment?...
Question 2: What are the 2 types of roles implementation strategy?...
Question 3: What are the transactions to create and monitor background j...
Question 4: The security policies are created by the security team in is...
Question 5: What activities can be assigned to the authorization object ...
Question 6: What are the 2 profile parameters used to configure sso with...
Question 7: Testing and analyzing: SNC information is provided in trace ...
Question 8: How to display the results of the security audit log (transa...
Question 9: What is the standard password of the user Early Watch?...
Question 10: What are the 4 different types of roles?...
Question 11: How to maintain the configuration of the logon tickets?...
Question 12: What are the 2 required steps necessary for operating the pr...
Question 13: Of which fields consist the authorization S_TABU_DIS?...
Question 14: What are the 3 types of encryption?...
Question 15: Which profile parameter set the time for automatic SAPGUI lo...
Question 16: What is the difference between System Access Control and Rol...
Question 17: Which authorization object limit the number of pages a user ...
Question 18: Which profile parameters specifies the number of seconds unt...
Question 19: Which authorithation object determines what table someone ca...
Question 20: Which transaction allows you to maintain the profile paramet...
Question 21: What is the SAP standard role for spool administration?...
Question 22: What are the 2 special users defined in client 000?...
Question 23: Which kind of attack makes the server unavailable? There are...
Question 24: Which are the 2 ways to control the choice of user passwords...
Question 25: 4 activities of the ICF with transaction SICF (Maintain serv...
Question 26: Which are the 2 ways in which we can determine the required ...
Question 27: What are the 5 steps of the ASAP Methodology?...
Question 28: Which authorization objects can you examine to determine if ...
Question 29: Which profile parameters define the location of the secinfo ...
Question 30: What is the default password of the user SAP*?...
Question 31: What are the 4 check indicators?...
Question 32: Which authorizations object do you use to grant access to al...
Question 33: What are the 3 user authentication mechanisms?...
Question 34: Which transaction will be used to choose the granularity of ...
Question 35: ITS, scalability and load balancing, what are the 6 possible...
Question 36: How is the system called to set up a trusted relationship an...
Question 37: Which transaction show which authorizations are currently in...
Question 38: Profile parameter: list containing the users who may log ont...
Question 39: Which table defines for each transaction and for each author...
Question 40: The following logon parameters can be used to ensure your sy...
Question 41: What are the pro and cons of composite roles?...
Question 42: 6 types of information that can be recorded with the securit...
Question 43: Authorization that defines which field values an administrat...
Question 44: To which object type are person assigned to in the organizat...
Question 45: What 3 security goals answer the digital signature?...
Question 46: Which 2 tables control the behavior of the Profile Generator...
Question 47: Which authorization object can be used to ensure the securit...
Question 48: ABAP Workbench components that are protected with S_DEVELOP...
Question 49: The client change option does not override the system change...
Question 50: The following tools are available for conducting thorough sy...
Question 51: Regardless of the release status, after an upgrade you will ...
Question 52: Transaction code to maintain profile parameters?...
Question 53: What is the table for the SNC System access control list...
Question 54: What are the different types of Organization plans objects?...
Question 55: Which kind of servers translates the logical name into the p...
Question 56: What are the main components of the authorization concept?...
Question 57: Which of the following are logs that exist in an SAP system?...
Question 58: What is the profile parameter to define the maximum of filte...
Question 59: The activity "Send User Name and Password" is the first step...
Question 60: Which is the only user in the SAP system for which no user m...
Question 61: Which transaction displays the table change log?...
Question 62: Which transaction allows you to view the assignments of the ...
Question 63: What is the profile of the special user Eearlywatch?...
Question 64: What are the return codes after the authorization check with...
Question 65: 3 enterprise portal authentication mechanisms:...
Question 66: ITS: What are the 4 main functions of the A gate?...
Question 67: Which protocol is used between SAP Servers?...
Question 68: What is the audit log's main objective? (3 points)...
Question 69: Which authorization object is provided to create and maintai...
Question 70: ITS configuration: What is the difference between a single h...
Question 71: Which transaction allows you to approve a transport request?...
Question 72: What are the 3 different fields of the S_LOG_COM authorizati...
Question 73: Which table Specifies which systems are allowed to connect t...
Question 74: What are the 2 main corposants of the ITS...
Question 75: What are the 2 possibilities to establish a trust when using...
Question 76: Which field has the authorization object S_TABU_CLI?...
Question 77: What is the transaction to access the CCMS alert monitor...
Question 78: What is the default Communication RFC user set up for the tr...
Question 79: Which transaction should be used when access to a table and ...
Question 80: In which 4 cases Secure Store and Forward (SSF) provides sec...
Question 81: Is it possible to add composite roles to composite roles?...
Question 82: X.509 client certificates: which table is responsible for th...
Question 83: Which special user is responsible for maintaining the ABAP D...
Question 84: Which SAP Product is used for DIAG/RFC Proxy?...