March Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Note! The P_SECAUTH_21 Exam is no longer available.

P_SECAUTH_21 SAP Certified Technology Professional - System Security Architect Questions and Answers

Questions 4

What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note: There are 2 correct answers to this question.

Options:

A.

Synchronization of user contexts from ABAP Systems

B.

Predictive threat notification

C.

Pseudonymize user identities for data protection

D.

Baseline detection

Buy Now
Questions 5

Based on your company guidelines you have set the password expiration to 60 days. Unfortunately, there is an RFC user on your SAP system which must not have a password change for 180 days. Which option would you recommend to accomplish such a request?

Options:

A.

Change profile parameter login/password_expiration_time to 180

B.

Create a security policy via SECPOL and assign it to tile RFC users

C.

Create additional authorizations for RFC users and assign it to them

D.

Create enhancement spot I user-exit

Buy Now
Questions 6

Your company is running SAP S/4HANA on premise, with the requirement to run the SAP Fiori Launchpad in the SAP Cloud Platform. What would be the recommended scenario for user authentication for internet browser access to the SAP Fiori Launchpad?

Options:

A.

SAML2 and OData Provisioning

B.

SAP Logon Tickets

C.

Principal Propagation

D.

X.509 Client Certificates

Buy Now
Questions 7

Which measures should we implement to protect the PSEs? Note: There are 2 correct answers to this question

Options:

A.

Review the usage of the S_DATASET object

B.

Restrict access to the opposing system users

C.

Review the usage of the S_ADMI_FCD object

D.

Encyrpt the files with the transaction SNCO

Buy Now
Questions 8

Which users should exist in client 000?

Note: There are 2 correct answers to this question

Options:

A.

SAP*

B.

EARLYWATCH

C.

SAPCPIC

D.

TMSADM

Buy Now
Questions 9

Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question

Options:

A.

/UI2/INTEROP

B.

/UI2/CHIP

C.

/UI2/PAGE_BUILDER_PERS

D.

/UI2/PAGE_BUILDER_CUST

Buy Now
Questions 10

In your SAP HCM system, you are implementing structural authorizations for your users. What are the characteristics of this authorization type? Note: There are 2 correct answers to this question.

Options:

A.

The structural profile is maintained and assigned to users using the Profile Generator

B.

The structural profile determines the access mode which the user can perform

C.

The structural profile is maintained and assigned to users using the Implementation Guide

D.

The structural profile determines the accessible object in the organizational structure

Buy Now
Questions 11

Which authorizations should you restrict when you create a developer role in an AS ABAP production system? Note: There are 2 correct answers to this question.

Options:

A.

The ability to execute class methods through authorization object S_PROGRAM

B.

The ability to execute queries through authorization object S_OUERY

C.

The ability to execute function modules through authorization object S_DEVELOP

D.

The ability to use the ABAP Debugger through authorization object S_DEVELOP

Buy Now
Questions 12

How is the role concept applied in the authorizations for Core Data Services (CDS) views?

Options:

A.

CDS roles are defined in the CDS view and assigned to users in the classic role editor

B.

CDS roles are defined in the WHERE clause when calling a CDS view in Open SOL

C.

CDS roles are defined in the CDS view and implicitly applied to all users

D.

CDS roles are mapped to the CDS view in the access rules

Buy Now
Questions 13

Which tools can you use to troubleshoot an authorization issue with a Fiori application? Note: There are 2 correct answers to this question

Options:

A.

/UI2/FLC

B.

/UI2/GW_APPS_LOG

C.

/IWFND/ERROR_LOG

D.

/IWBEP/ERROR_LOG

Buy Now
Questions 14

How do you check when and by whom profiles were assigned or deleted?

Options:

A.

Run report RSUSR008_009_NEW with appropriate filters

B.

Run report RSUSR100 with appropriate filters

C.

Check system trace using transaction ST01

D.

Check security audit log using transact on SM20

Buy Now
Questions 15

How are security relevant objects related in the Cloud Foundry? Note: There are 2 correct answers to this question

Options:

A.

Role Collections have 0 or many role templates

B.

Role Templates have 0 or many attributes

C.

Role Collections have 0 or many roles

D.

Role Templates have 1 or many scopes

Buy Now
Questions 16

You have implemented CUA in your organization and you want to set the field distribution attribute as follows: Maintain a default value in the central system that is automatically distributed to the child systems when you create a user. After distribution, the data is maintained only locally and is no longer distributed if you change it in the central or child system. Which field distribution parameter do you maintain?

Options:

A.

Redistribution

B.

Local

C.

Global

D.

Proposal

Buy Now
Questions 17

What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.

Options:

A.

They are used for user-to-system trusted login

B.

They are used for system-to-system communication

C.

They have an unconfigurable validity of 2 minutes

D.

They are transmitted as cookies

Buy Now
Questions 18

You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transactions do you have to use to map a back-end system to one of those roles?

Options:

A.

/UI2/GW_SYS_ALIAS

B.

/IWFND/MAINT_SERVICE

C.

SEGW

D.

PFCG

Buy Now
Questions 19

You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad. Which of the following scenarios do you choose?

Options:

A.

Chrome, SAP Enterprise Portal, SAP GUI for Java

B.

Chrome, SAP Cloud Platform, SAP GUI for Java

C.

Internet Explorer, ABAP front-end server, SAP GUI for Windows

D.

Internet Explorer, SAP Business Client, SAP GUI for Windows

Buy Now
Questions 20

The SSO authentication using X.509 client certificates is configured. Users complain that they can't log in to the back-end system. The trace file shows the following error message: "HTTP request [2/5/9] Reject untrusted forwarded certificate". What is missing in the configuration? Note: There are 2 correct answers to this question.

Options:

A.

On the back-end, the profile parameter icm/HTTPS/verify client must NOT be set to 0

B.

On the web-dispatcher, the SAPSSLS.pse must be signed by a trusted certification authority

C.

On the web-dispatcher, the profile parameter icm/HTTPS/verify_client must be set to 0

D.

The web dispatcher's SAPSSLC.PSE certificate must be added to the trusted reverse proxies list in icm/trusted_reverse_proxy_

Buy Now
Exam Code: P_SECAUTH_21
Exam Name: SAP Certified Technology Professional - System Security Architect
Last Update: Mar 26, 2024
Questions: 80