Which of the following are used in SAP Enterprise Threat Detection ( ETD) architecture? Note: There are 2 correct answer to this question.
The report "Search for Application in Role Menu" can be called via which of the following options? Note: There are 2 correct answer to this question.
Which of the following SUIM report can you use to determine if a user has segregation of duty violation? Note: There are 2 correct answer to this question.
What is the main purpose of SAP Access Control, as an enterprise software solution?
Which of the following items are addressed by Configuration Validation? Note: There are 3 correct answer to this question.
How can you enforce an additional transaction start authorization check for custom transaction?
Your system is configured to prohibit a user from logging on multiple times to the system with the same User ID in violation of your SAP licensing agreement. However, certain users need to be exempt from this
limitation. Which instance parameter can you configure to allow small group of user to bypass the limitations of multiple logins?
What are the main features of SAP Enterprise Threat Detection (ETD)? Note: There are 3 correct answer to this question.
If the OData back-end service is located on a remote back-end users need which authorization object to perform the RFC call on the back-end system?
Note: There are 2 correct answer to this question.