Join the discussion
Question 1/81
What authorization objects do we need to create job steps with external commands in a background job? Note:
There are 2 correct answers to this question.
There are 2 correct answers to this question.
Correct Answer: A,B
Explanation
These are some of the authorization objects that we need to create job steps with external commands in a background job. A background job is a process that runs in the background without user interaction and performs tasks such as data processing or report generation. A job step is a unit of work within a background job that executes a program or an external command. S_BTCH_EXT is an authorization object that controls the execution of external commands or programs in a job step. S_BTCH_ADM is an authorization object that controls the administration of background jobs, such as creating, changing, or deleting jobs. References:
https://help.sap.com/doc/saphelp_nw73ehp1/7.31.19/en-US/c8/e8d53d35fb11d182b90000e829fbfe/content.htm?
These are some of the authorization objects that we need to create job steps with external commands in a background job. A background job is a process that runs in the background without user interaction and performs tasks such as data processing or report generation. A job step is a unit of work within a background job that executes a program or an external command. S_BTCH_EXT is an authorization object that controls the execution of external commands or programs in a job step. S_BTCH_ADM is an authorization object that controls the administration of background jobs, such as creating, changing, or deleting jobs. References:
https://help.sap.com/doc/saphelp_nw73ehp1/7.31.19/en-US/c8/e8d53d35fb11d182b90000e829fbfe/content.htm?
Add Comments
- Other Question (81q)
- Q1. What authorization objects do we need to create job steps with external commands in a back...
- Q2. Which features do SAP HANA SQL-based analytic privileges offer compared to classic XML-bas...
- Q3. The SSO authentication using X.509 client certificates is configured. Users complain that ...
- Q4. What are main characteristics of the Logon ticket throughout an SSO logon procedure? Note:...
- Q5. Which of the following programs can be used to enable ALE Audit using the ALEAUD message t...
- Q6. How are security relevant objects related in the Cloud Foundry? Note: There are 2 correct ...
- Q7. A security consultant has activated a trace via ST01 and is analyzing the authorization er...
- Q8. Which SAP product supports General Data Privacy Regulation (GDPR) compliance through mitig...
- Q9. What are the characteristics of HTTP security session management? Note: There are 3 correc...
- Q10. The security administrator is troubleshooting authorization errors using transaction SU53....
- Q11. Which tasks would you perform to allow increased security for the SAP Web Dispatcher WebAd...
- Q12. What are characteristics of SAP HANA Deployment Infrastructure (HDI) roles? Note: There ar...
- Q13. What are some characteristics of an SAP HANA multitenant database system (MDC) running in ...
- Q14. What benefits does the SAP Cloud Connector have compared to a 3rd partyreverse proxy solut...
- Q15. Which platform services are available in the Cloud Foundry? Note: There are 2 correct answ...
- Q16. You verified the password of the TMSADM user in your SAP landscape to be SAP defaulted. Yo...
- Q17. The security administrator is troubleshooting authorization errors using transaction SU53....
- Q18. A user is authorized to run SP01. What can this user access with authorization object S_ S...
- Q19. How can you describe the hierarchical relationships between technical entities in the Clou...
- Q20. What connection type is used for restricted users?...
- Q21. The security administrator is troubleshooting authorization errors using transaction SU53....
- Q22. What are the key capabilities of Enterprise Threat Detection? Note: There are 2 correct an...
- Q23. Based on your company guidelines you have set the password expiration to 60 days. Unfortun...
- Q24. How does the SAP SSO wizard (transaction SNCWIZARD) simplify the SNC configuration process...
- Q25. For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA sys...
- Q26. How are assertion tickets used?
- Q27. To prevent session fixation and session hijacking attacks, SAP's HTTP security session man...
- Q28. You want to carry out some preparatory work for running the SAP Security Optimization Self...
- Q29. A security consultant has activated a trace via ST01 and is analyzing the authorization er...
- Q30. How does the SAP SSO wizard (transaction SNCWIZARD) simplify the SNC configuration process...
- Q31. While performing an audit of changes to the system and client change options for your prod...
- Q32. What are the characteristics of assertion tickets? Note: There are 2 correct answers to th...
- Q33. The SAP HANA database has its parameters configured with its default values. How can the S...
- Q34. Based on your company guidelines you have set the password expiration to 60 days. Unfortun...
- Q35. How are security relevant objects related in the Cloud Foundry?Note: There are 2 correct a...
- Q36. SAP GRC Access Control provides risk analysis for which of the following? Note: There are ...
- Q37. What connection type is used for restricted users?...
- Q38. How is the role concept applied in the authorizations for Core Data Services (CDS) views?...
- Q39. You are setting up your SAP NetWeaver AS in a SSL client scenario. What are the reasons to...
- Q40. How would you control access to the ABAP RFC function modules? Note: There are 2 correct a...
- Q41. You are asked to set up controls to monitor sensitive objects (such as programs, user exit...
- Q42. Under which group can you find the 'System Recommendations' tile in the Solution Manager l...
- Q43. User1 grants role 1 to user2. Who can revoke role 1 role from user2?...
- Q44. How are user group administrators and user groups related in SAP HANA? Note: there are 2 c...
- Q45. You have delimited a single role that is part of a composite role, and a user comparison f...
- Q46. You want to create an SAP Fiori app for multiple users and multiple back-end systems. To s...
- Q47. A system user created a User1 and a schema on the HANA database with some dat a. User2 is ...
- Q48. A user reports an issue with data not showing up in the visualization of the SAP Fiori til...
- Q49. Which of the following user types can be used to log on interactively? Note: There are 2 c...
- Q50. What are characteristics of SAP HANA Deployment Infrastructure (HDI) roles? Note: there ar...
- Q51. For which purpose do you use instance Secure Storage File System (SSFS) in an SAP HANA sys...
- Q52. Who can revoke a runtime role from a user in the SAP HANA tenant database? Note: There are...
- Q53. You want to create a role to provide users the ability to display and change an HR table's...
- Q54. What is the purpose of the parameter rec/client in an AS ABAP based SAP system?...
- Q55. What reference is used to connect multiple Cloud Connectors to one SAP Cloud Platform suba...
- Q56. Under which group can you find the "System Recommendations" file in the Solution Manager l...
- Q57. You want to check the custom ABAP codes in your system for security vulnerabilities and yo...
- Q58. You want to carry out some preparatory work for executing the SAP Security Optimization Se...
- Q59. Which transaction or report can be used to audit profile assignments in an SU01 user maste...
- Q60. Which of the following function can be used to troubleshoot authorization errors for ABAP ...
- Q61. Which communication methods does the SAP Fiori Launchpad use to retrieve business data? No...
- Q62. Where can you store Security Audit Log Events? Note: There are 2 correct answers to this q...
- Q63. What information constitutes an indirect connection to an individual, in the context of GD...
- Q64. Which of the 7 core principals of the General Data Privacy Regulation (GDPR) requires thor...
- Q65. What are the requirements of SPNego SSO configuration in an SAP Fiori front-end system? No...
- Q66. How can you describe static and dynamic assignments? Note: There are 2 correct answers to ...
- Q67. Your customer runs a 3-tier environment You are asked to set up controls around monitoring...
- Q68. Which of the following user types can be used to log on interactively? Note: There are 2 c...
- Q69. Which OData authorizations are required for a user to see business data in the SAP Fiori L...
- Q70. You have delimited a single role which is part of a composite role, and a user comparison ...
- Q71. Which authorization object is required to support trusted system access by an RFC user fol...
- Q72. What is required when you configure the PFCG role for an end-user on the front-end server?...
- Q73. Which communication methods does the SAP Fiori Launchpad use to retrieve business data? No...
- Q74. What must be included in a PFCG role for an end user on the Fiori front-end server to run ...
- Q75. Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 corre...
- Q76. Which tools can you use to troubleshoot an authorization issue with a Fiori application? N...
- Q77. How is the role concept applied for modeled authorizations based on Core Data Services (CD...
- Q78. What authorization objects do we need to create job steps with external commands in a back...
- Q79. Which authorizations are required for an SAP Fiori Launchpad user? Note: There are 2 corre...
- Q80. Which users should exist in client 000? Note: There are 2 correct answers to this question...
- Q81. Your company is running SAP S/4HANA on premise, with the requirement to run the SAP Fiori ...
