What are the key capabilities of Event Analyzer in Enterprise Threat Detection 1.0? Note: There are 2 correct answers to this question.
Based on your company guidelines you have set the password expiration to 60 days. Unfortunately, there is an RFC user on your SAP system which must not have a password change for 180 days. Which option would you recommend to accomplish such a request?
Your company is running SAP S/4HANA on premise, with the requirement to run the SAP Fiori Launchpad in the SAP Cloud Platform. What would be the recommended scenario for user authentication for internet browser access to the SAP Fiori Launchpad?
Which measures should we implement to protect the PSEs? Note: There are 2 correct answers to this question
Which users should exist in client 000?
Note: There are 2 correct answers to this question
Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 correct answers to this question
In your SAP HCM system, you are implementing structural authorizations for your users. What are the characteristics of this authorization type? Note: There are 2 correct answers to this question.
Which authorizations should you restrict when you create a developer role in an AS ABAP production system? Note: There are 2 correct answers to this question.
How is the role concept applied in the authorizations for Core Data Services (CDS) views?
Which tools can you use to troubleshoot an authorization issue with a Fiori application? Note: There are 2 correct answers to this question
How are security relevant objects related in the Cloud Foundry? Note: There are 2 correct answers to this question
You have implemented CUA in your organization and you want to set the field distribution attribute as follows: Maintain a default value in the central system that is automatically distributed to the child systems when you create a user. After distribution, the data is maintained only locally and is no longer distributed if you change it in the central or child system. Which field distribution parameter do you maintain?
What are the characteristics of assertion tickets? Note: There are 2 correct answers to this question.
You want to create an SAP Fiori app for multiple users and multiple back-end systems. To support this, you create different roles for the different back-end systems in the SAP Fiori front-end system (central hub). What transactions do you have to use to map a back-end system to one of those roles?
You want to launch classic SAP GUI transactions directly from the SAP Fiori Launchpad. Which of the following scenarios do you choose?
The SSO authentication using X.509 client certificates is configured. Users complain that they can't log in to the back-end system. The trace file shows the following error message: "HTTP request [2/5/9] Reject untrusted forwarded certificate". What is missing in the configuration? Note: There are 2 correct answers to this question.