Summer Sale - Special Discounts Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 63r59951

Note! The C_SECAUTH_20 Exam is no longer available.

C_SECAUTH_20 SAP Certified Technology Associate - SAP System Security and Authorizations Questions and Answers

Questions 4

Which of the following are used in SAP Enterprise Threat Detection ( ETD) architecture? Note: There are 2 correct answer to this question.

Options:

A.

SAP HANA Smart Data Streaming

B.

SAP IQ

C.

Forensic Lab

D.

SAP ASE

Buy Now
Questions 5

The report "Search for Application in Role Menu" can be called via which of the following options? Note: There are 2 correct answer to this question.

Options:

A.

Transaction SUIM (menu node "Roles")

B.

Transaction RSUSR_ROLE_MENU

C.

Transaction RSUSR_START_APPL

D.

Transaction SUIM, (Menu node " Change Documents")

Buy Now
Questions 6

Which of the following SUIM report can you use to determine if a user has segregation of duty violation? Note: There are 2 correct answer to this question.

Options:

A.

User Level Access Risk Analysis

B.

User with Critical Authorizations

C.

User Comparision

D.

User by Complex Search

Buy Now
Questions 7

What is the main purpose of SAP Access Control, as an enterprise software solution?

Options:

A.

Manage corporate social media presence

B.

Secure authentication for cloud and on-premise

C.

Identify security risk and document compliance

D.

Deployment of encryption services

Buy Now
Questions 8

Which of the following items are addressed by Configuration Validation? Note: There are 3 correct answer to this question.

Options:

A.

Database Parameters

B.

Critical Roles

C.

Failed Transport

D.

Software Packages

E.

RFC Logins

Buy Now
Questions 9

How can you enforce an additional transaction start authorization check for custom transaction?

Options:

A.

Without additional custom development it is not possible to add another check during transaction start.

B.

Maintain the SU24 entry for the custom transaction and adding the desired authorization object, setting the Check Indicator to "Check" and setting Proposal to Yes.

C.

For each role containing the custom transaction, add the desired authorization object manually in transaction PFCG, maintained the field values and then generate the profile.

D.

Using Transaction SE93 , update the custom transaction definition by specifying the desired authorization object and maintaining the desired field values.

Buy Now
Questions 10

Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this

limitation. Which instance parameter can you configure to allow small group of user to bypass the limitations of multiple logins?

Options:

A.

login/disable_multi_rfc_login

B.

login/disable_multi_gui_lgoin

C.

Login/server_logon_restriction

D.

Login/ multi_login_users

Buy Now
Questions 11

What are the main features of SAP Enterprise Threat Detection (ETD)? Note: There are 3 correct answer to this question.

Options:

A.

Forensic investigations

B.

Monitoring of GDPR Compliance

C.

Segregation of Duty Analysis

D.

Monitoring of security events

E.

Realtime Alerts

Buy Now
Questions 12

If the OData back-end service is located on a remote back-end users need which authorization object to perform the RFC call on the back-end system?

Note: There are 2 correct answer to this question.

Options:

A.

S_START

B.

S_SERVICE

C.

S_RFCACL

D.

S_RFC

Buy Now
Exam Code: C_SECAUTH_20
Exam Name: SAP Certified Technology Associate - SAP System Security and Authorizations
Last Update: Mar 26, 2024
Questions: 80