<< Prev Question Next Question >>

Question 23/84

Which kind of attack makes the server unavailable?
There are several ways to do this, such as snap the network cable, physically destroy the server, or unplug it from the network.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (84q)
Question 1: What is the goal of SNC in an ITS environment?...
Question 2: What are the 2 types of roles implementation strategy?...
Question 3: What are the transactions to create and monitor background j...
Question 4: The security policies are created by the security team in is...
Question 5: What activities can be assigned to the authorization object ...
Question 6: What are the 2 profile parameters used to configure sso with...
Question 7: Testing and analyzing: SNC information is provided in trace ...
Question 8: How to display the results of the security audit log (transa...
Question 9: What is the standard password of the user Early Watch?...
Question 10: What are the 4 different types of roles?...
Question 11: How to maintain the configuration of the logon tickets?...
Question 12: What are the 2 required steps necessary for operating the pr...
Question 13: Of which fields consist the authorization S_TABU_DIS?...
Question 14: What are the 3 types of encryption?...
Question 15: Which profile parameter set the time for automatic SAPGUI lo...
Question 16: What is the difference between System Access Control and Rol...
Question 17: Which authorization object limit the number of pages a user ...
Question 18: Which profile parameters specifies the number of seconds unt...
Question 19: Which authorithation object determines what table someone ca...
Question 20: Which transaction allows you to maintain the profile paramet...
Question 21: What is the SAP standard role for spool administration?...
Question 22: What are the 2 special users defined in client 000?...
Question 23: Which kind of attack makes the server unavailable? There are...
Question 24: Which are the 2 ways to control the choice of user passwords...
Question 25: 4 activities of the ICF with transaction SICF (Maintain serv...
Question 26: Which are the 2 ways in which we can determine the required ...
Question 27: What are the 5 steps of the ASAP Methodology?...
Question 28: Which authorization objects can you examine to determine if ...
Question 29: Which profile parameters define the location of the secinfo ...
Question 30: What is the default password of the user SAP*?...
Question 31: What are the 4 check indicators?...
Question 32: Which authorizations object do you use to grant access to al...
Question 33: What are the 3 user authentication mechanisms?...
Question 34: Which transaction will be used to choose the granularity of ...
Question 35: ITS, scalability and load balancing, what are the 6 possible...
Question 36: How is the system called to set up a trusted relationship an...
Question 37: Which transaction show which authorizations are currently in...
Question 38: Profile parameter: list containing the users who may log ont...
Question 39: Which table defines for each transaction and for each author...
Question 40: The following logon parameters can be used to ensure your sy...
Question 41: What are the pro and cons of composite roles?...
Question 42: 6 types of information that can be recorded with the securit...
Question 43: Authorization that defines which field values an administrat...
Question 44: To which object type are person assigned to in the organizat...
Question 45: What 3 security goals answer the digital signature?...
Question 46: Which 2 tables control the behavior of the Profile Generator...
Question 47: Which authorization object can be used to ensure the securit...
Question 48: ABAP Workbench components that are protected with S_DEVELOP...
Question 49: The client change option does not override the system change...
Question 50: The following tools are available for conducting thorough sy...
Question 51: Regardless of the release status, after an upgrade you will ...
Question 52: Transaction code to maintain profile parameters?...
Question 53: What is the table for the SNC System access control list...
Question 54: What are the different types of Organization plans objects?...
Question 55: Which kind of servers translates the logical name into the p...
Question 56: What are the main components of the authorization concept?...
Question 57: Which of the following are logs that exist in an SAP system?...
Question 58: What is the profile parameter to define the maximum of filte...
Question 59: The activity "Send User Name and Password" is the first step...
Question 60: Which is the only user in the SAP system for which no user m...
Question 61: Which transaction displays the table change log?...
Question 62: Which transaction allows you to view the assignments of the ...
Question 63: What is the profile of the special user Eearlywatch?...
Question 64: What are the return codes after the authorization check with...
Question 65: 3 enterprise portal authentication mechanisms:...
Question 66: ITS: What are the 4 main functions of the A gate?...
Question 67: Which protocol is used between SAP Servers?...
Question 68: What is the audit log's main objective? (3 points)...
Question 69: Which authorization object is provided to create and maintai...
Question 70: ITS configuration: What is the difference between a single h...
Question 71: Which transaction allows you to approve a transport request?...
Question 72: What are the 3 different fields of the S_LOG_COM authorizati...
Question 73: Which table Specifies which systems are allowed to connect t...
Question 74: What are the 2 main corposants of the ITS...
Question 75: What are the 2 possibilities to establish a trust when using...
Question 76: Which field has the authorization object S_TABU_CLI?...
Question 77: What is the transaction to access the CCMS alert monitor...
Question 78: What is the default Communication RFC user set up for the tr...
Question 79: Which transaction should be used when access to a table and ...
Question 80: In which 4 cases Secure Store and Forward (SSF) provides sec...
Question 81: Is it possible to add composite roles to composite roles?...
Question 82: X.509 client certificates: which table is responsible for th...
Question 83: Which special user is responsible for maintaining the ABAP D...
Question 84: Which SAP Product is used for DIAG/RFC Proxy?...